PerpetuityARC Training, part of Linx International Group announces that security management professionals operating in Dubai and the wider UAE, will have the opportunity to train for the internationally recognized ASIS Certified Protection Professional (CPP®) accreditation, when it runs its renowned five-day intensive bootcamp from 3rd to 7th November 2019. ASIS International is an organization for security professionals and its CPP® qualification is widely acknowledged at the ‘go...
Sisense, the analytics platform for builders, achieves a series of new security compliance standards that will provide its customers with the highest levels of protection for their data. Sisense and Periscope Data, who merged with Sisense this spring, both achieved ISO 27001 compliance, the internationally recognized standard for information security programs. ISO 27001 is a systematic approach to managing sensitive information and assets so they remain secure. Continual improvement of securit...
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the cu...
Interlogix, a division of UTC Climate, Controls & Security, announces a plan to dismantle its businesses in the United States and Canada by the end of the year. Here is a statement from the company: “After a thorough portfolio review of our security business, we have communicated our plans to wind down our Interlogix U.S. and Canada businesses. This decision will allow us to focus on the significant growth opportunities for our other fire and security businesses, including LenelS2.&rd...
National Security Inspectorate (NSI), the UK’s third party certification body for the security and fire safety sectors, was a proud sponsor of the 2019 Women in Security Awards which took place on 12 September, recognizing the significant contribution and achievements of women within the wider world of security. Organized by Professional Security Magazine and Patron, Una Riley, almost 250 security professionals gathered aboard the Dixie Queen riverboat on the River Thames to celebrate and...
RiverSafe, globally renowned cyber security and analytics consulting company is celebrating a move to brand new purpose built offices in Canary Wharf to accommodate its rapidly expanding team. RiverSafe offers a range of services and capabilities that help customers understand and respond to security threats across their digital enterprise. The move provides RiverSafe with larger office space to accommodate the firm’ growing team. Based in Canary Wharf, the new offices are more strategica...
Cobalt Iron Inc., a provider of SaaS-based enterprise data protection, announces the appointment of Rodney Foreman to the newly created position of chief revenue officer. In this role, Foreman will be responsible for all sales initiatives for the company, including direct and indirect sales channels. "Cobalt Iron has an outstanding reputation in the market for providing customer solutions that deliver exceptional ROI and performance. We added the chief revenue officer position so we can become more agile and better leverage the channel and top industry partners to extend our market reach, which means we can solve data protection challenges for more customers," said Richard Spurlock, CEO and founder of Cobalt Iron. Creating high-Performance sales organizations "Rodney is known in the software industry as a leader that drives transformation within software companies in order to deliver results, capture market share, and win new customers. He develops growth strategies and operational processes and empowers people to drive the business and grow revenue with a focus on customer success," Spurlock continued. Foreman has a global software sales and product management background "His remarkable track record and reputation for creating high-performance sales organizations and innovative channel programs will serve us well as we expand our sales organization." Foreman has a global software sales and product management background. He spent 16 years as an executive at IBM, where he drew on his extensive experience and success in the data management and data protection markets. Automated and intelligent solution After that, he led the design, development, and implementation of channel and midmarket sales programs as senior vice president at Informatica, and then he built a multitier global channel program as vice president of global channel sales at Nutanix. "I am thrilled to join Cobalt Iron at this exciting time. Cobalt Iron has a clear strategy and solid momentum and is challenging the industry to think differently about data protection," Foreman said. "I look forward to working with our teams globally to advance Cobalt Iron's mission of transforming how businesses manage their data with an automated and intelligent solution. We will enhance our customers' experiences as we deliver value and drive business outcomes with our trusted partners." Foreman will report to Spurlock.
Nets, renowned company in the European payments industry, has collaborated with multinational professional services provider, KPMG, to develop Nets Fraud Ensemble, a next-generation fraud monitoring and prevention solution. As the total annual value of fraudulent transactions across Europe hits €1.8 billion, the need to step up fraud prevention, particularly in card not present (CNP) transactions, has never been greater. Reducing transaction fraud is an increasingly convoluted and nuanced business, however, as factors such as the mass adoption of e-commerce, increasing cross-border payments, and the growing popularity of new digital payment methods combine to add new layers of complexity. Nets Fraud Ensemble AI-enabled anti-fraud solution Nets Fraud Ensemble is an AI-powered anti-fraud engine that assists fraud prevention teams Nets Fraud Ensemble is an AI-powered anti-fraud engine that assists fraud prevention teams to navigate this ever-changing landscape in real time. By deploying true machine learning (i.e. a system that identifies emerging fraud indicators as well as established patterns), it represents a significant step forward from the rules-based models that are currently in use across the international banking industry. Sune Gabelgård, Head of Digital Fraud, Intelligence & Research, Nets, said “Although initiatives such as 3D-Secure have done much to make it more secure for people to shop online across Europe, the industry still faces challenges. Many issuing banks have focused on fraud prevention through consumer education, but the industry must also tackle the problem where it starts and where it is orchestrated by organized criminal enterprises: on the internet.” Fraud monitoring and prevention “Nets has significant and proven capabilities in fraud monitoring and prevention, and has been utilizing AI in this area for several years. Nets Fraud Ensemble takes this to the next level. It brings security and value to issuers, merchants and cardholders by blocking fraudulent card-present and card-not-present transactions in real time, creating a real societal benefit by keeping illegally obtained funds out of the hands of criminals. We look forward to our continued collaboration with KPMG to stay ahead of the curve and prevent fraud throughout the value chain.” The ‘brain’ of Nets Fraud Ensemble consists of multiple models working together to analyze each individual transaction within ten milliseconds – the time frame in which a transaction can be safely blocked. Artificial Intelligence solution Nets Fraud Ensemble also decreases operating costs and chargebacks for a better cardholder experienceThe solution learns from the results of its analysis and adjusts accordingly, meaning the longer that it is operational the more fraudulent transactions are blocked, and the fewer false positives are granted. In initial pilot programs, it reduced fraudulent payments by 25% within weeks and up to 40% in the long-term. The benefits to issuers extend beyond achieving significant reductions in fraud. Nets Fraud Ensemble also decreases operating costs and chargebacks, creating an improved cardholder experience. Furthermore, to balance accuracy with customer convenience, issuers can implement customized decision thresholds to minimize false declines. Preventing financial fraud Bent Dalager, Nordic Head of NewTech and Financial Services, KPMG, adds “In terms of tangible reduction of fraudulent transactions, Nets Fraud Ensemble is surpassing all other products currently available. The development of Fraud Ensemble and its state-of-the-art algorithms is the result of Nets’ and KPMG's combined innovation capabilities, AI experience and fraud monitoring and prevention expertise. It's a big step forward in the use of AI to fight fraud."
The Open Security & Safety Alliance (OSSA), an industry body comprised of leaders, influencers and innovative organizations from all facets within the security, safety and building automation space, celebrates its one-year anniversary. Within its first 12 months, OSSA attracted 30+ members ranging from device manufacturers, software developers and system integrators to distributors and system on a chip (SoC) companies – helping lay the groundwork for improved security, safety, building automation and business intelligence solutions. Open security and safety ecosystem We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem" “Through OSSA, we have competing and complementary institutions reaching across aisles and stepping outside of their brands to work together to push our whole industry into a new, more prosperous and efficient direction,” said Johan Jubbega, President, Open Security & Safety Alliance. “We’re truly pleased at the progress achieved in just our first year by establishing an open security and safety ecosystem comprised of 30+ renown companies, and having a market-changing digital marketplace and first commercially available video security camera offerings underway for year two as the Alliance continues to provide guidance and interpretation of common standards and specifications to promote more intelligent, productive solutions for users.” Operation and maintenance of products Currently, security and safety solutions are fragmented and there is no collaborative approach to systems working together for bigger-picture success. Large amounts of data are left untapped in siloed systems that through cooperation can instead be utilized for better living, safety and security purposes. OSSA’s mission is to work with market players to all start from the same ‘recipe’ when it comes to the development, deployment, operation and maintenance of products, software and services. The Alliance’s vision is that the majority of the security and safety industry works with a common, vendor-agnostic operating system (OS) and IoT infrastructure – and agrees to implement or adhere to common approaches defined for common challenges like data security, privacy, product performance and easy consumption of data across multiple solutions. Collaborative digital marketplace They also started to define the common approaches and establishment of a shared IoT infrastructure This will substantially fuel usability and trust when it comes to security and safety solutions that are built on the foundations set forth by OSSA. From there, companies can differentiate through apps by way of a collaborative digital marketplace – similar to how we all access/download/use applications between an app store and our smart phones and other digital devices. Already within its first year, OSSA member companies created the first common Technology Stack specification including the definition of a common operating system for video security devices. They also started to define the common approaches and establishment of a shared IoT infrastructure, including a digital marketplace. This framework allows the trapped – and mostly unused – data captured by any brand of device to be unleashed and available for good purpose. It also reduces friction when conceiving, deploying and maintaining security and safety devices, systems and settings and inspires innovation by opening the doors to data interpretation and possibilities. This platform revolution that OSSA envisions will benefit everyone involved. Significant outputs from Alliance workgroups Significant outputs from Alliance workgroups over the past 12 months include: Documentation of a common Technology Stack including the definition of a common vendor-agnostic OS. First description of a common market approach to data security and privacy. OSSA member Security and Safety Things GmbH (SAST) realized a first version of its OS as set forth in the common Technology Stack defined by OSSA – enabling the creation of prototype cameras. Together with SAST’s first open app store for security cameras, various innovative applications were showcased this year from ISC West 2019, IFSEC 2019 and GSX 2019. The commercial launch of the platform is planned for Q1 2020. OSSA members fulfilled their first prototype cameras based on the commonly defined Technology Stack and OS, and showcased them throughout 2019 at ISC West, IFSEC and last week from GSX. Change for the betterment of the industry The Open Security & Safety Alliance’s five founding companies – Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco™ and VIVOTEK Inc – are joined by 25+ other inventive international players that currently comprise the OSSA member roster. The Alliance is designed to include everyone and offers membership levels to meet the needs of companies big or small. Benefits of joining OSSA include access to the Alliance framework and the ability to connect, discuss, influence and collaborate with other Alliance members to steer change for the betterment of the industry.
MOBOTIX has taken another step towards making its technology available and integrating it in partner systems. After extensive development processes and testing, all MOBOTIX IoT camera solutions have been integrated in Genetec’s cloud-based Stratocast video management system. Genetec, global provider of video management systems solutions, has been one of MOBOTIX’s most important technology partners for many years. Integration with MOBOTIX IoT camera solutions The integration of our camera systems in Stratocast, whose high level of cyber security is put to the test in annual stress tests" “The integration of our camera systems in Stratocast, whose high level of cyber security is put to the test in annual stress tests and evaluations, is another milestone in the long-term cooperative relationship between MOBOTIX and Genetec,” says Hartmut Sprave, CTO of MOBOTIX AG. “When we make our technology available and integrate it into other solutions, it is paramount to us that we do not compromise on the cyber security of our systems,” Thomas Dieregsweiler, Head of Product Management at MOBOTIX AG, adds. “Genetec and MOBOTIX speak the same language: We are one of the world’s first camera manufacturers to successfully integrate in Stratocast,” Dieregsweiler further points out. Stratocast cloud-based video management system The cloud-based video management system Stratocast (VSaaS) is designed especially for small and medium-sized businesses. When using Stratocast, customers can always rest assured that their company is protected and that seamless operation is ensured. Using a PC, laptop, tablet, or smartphone, Stratocast guarantees access to live videos and video recordings that are stored cyber-safe in the cloud. Many customers across the world rely on the cloud solution, which is tailored to small applications under 50 cameras, or in other words, small and medium-sized companies. The end customer themselves requires only basic computer expertise, as no computer infrastructure such as additional servers have to be installed on site and no maintenance or updates are required. This makes the solutions affordable and very transparent for the customer. They only pay by usage. Genetec and MOBOTIX technologies synergy Stratocast allows the customer to circumvent typical server-based problems such as additional IT infrastructure or employees, lack of storage space, loss of records, and unscalable prices or functionalities. The scope of functions provided can also be extended by using the Genetec Security Center for central monitoring. This means the cloud-based network can grow and develop according to the customer’s needs. As is the case for MOBOTIX, cyber security and data protection are the highest priority at Genetec. For example, all communication between the on-site system and the cloud is fully encrypted with TLS (Transport Layer Security). Genetec guarantees 99.5 percent availability (availability and access to video). Data back up and cyber security Camera solutions from MOBOTIX have an excellent reputation around the world for good reason All data is backed up three-fold in the cloud. Genetec works exclusively with hardware and software partners who meet the high quality standards for cyber security and data protection. Camera solutions from MOBOTIX have an excellent reputation around the world for good reason. They are robust, durable, and cyber-safe. No successful hacking attacks have been recorded anywhere in the world to date. “We have integrated our technology into Stratocast’s technology over the last six months. All test series were completed successfully,” explains Thomas Lausten, CEO of MOBOTIX AG. He adds, “The excellent quality of our video solutions combined with a keen focus on cyber security and our global sales network is how we became one of the first camera manufacturers to integrate our technology in the cloud-based Stratocast video surveillance system from globally renowned video management solutions firm, Genetec. It proves once again that the decentralized intelligence of our camera systems makes MOBOTIX one of the most important players on the global market.”
Ping Identity, a globally renowned pioneer in intelligent identity solutions, has announced details of its 2019 IDENTIFY customer conference series, taking place in multiple international cities, including Chicago, London, New York, Sydney and Melbourne. With a focus on driving innovation across the enterprise, attendees will hear from CISOs and identity and access management (IAM) thought leaders at some of the world’s most prominent organizations, including Allied Irish Banks, BlueCross BlueShield of Tennessee, TDC, Thomson Reuters and TIAA. Experts from Ping Identity will underscore how identity solutions can help achieve digital transformation Cloud and hybrid IT solutions In their presentations, experts from Ping Identity, customers and partners will underscore how identity solutions can help drive revenue, achieve digital transformation and simplify cloud, on-premises and hybrid IT deployments. The discussions will explore a variety of themes and trends, such as: Methods to secure APIs, an exponentially growing attack vector. Ways to implement risk-aware, password-less authentication. Paths to take toward a mature Zero Trust architecture. Approaches to simplify and automate cloud identity deployments. Strategies designed to help meet the demands of data protection regulations and more. Identity security “At Ping Identity, we power exceptional user experiences for our customers. The IDENTIFY customer conference series provides the opportunity to connect as a community, and explore the critical impact identity security continues to have across the modern digital enterprise,” said Kevin Sellers, CMO, Ping Identity. IDENTIFY events are exclusive for Ping Identity customers, partners and prospects. Register for one of the following locations: Chicago, October 2 London, October 9 New York, October 22 Sydney, October 29 Melbourne, October 31, IDENTIFY on Tour Ping Identity partners Ping is delighted to welcome as sponsors members of its global Ping Identity Partner Network, CTI Global, CyberArk, Delivery Centric, Focal Point, iC Consult, IDMWORKS, intragen, iovation, KPMG, LikeMinds Consulting, Persistent Systems, ProofID, Raidiam, SailPoint, Versent and Zscaler. The sponsorship of these partners demonstrates their innovative work as critical members of the Ping Identity ecosystem to support the organization’s customers.
Professionals from varied spheres in the security, safety and fire protection industry gathered for the second edition of the Intersec Awards during a gala event to celebrate their achievements in the global fire safety and security industry. The ceremony which was hosted by Messe Frankfurt Middle East, the organizers of Intersec – was held at Dubai’s Habtoor Palace Ballroom and saw more than 250 guests attend. Commercial security and fire protection The awards saw 130 entrants across nine categories, with entries received from companies across the globe, including the UAE, Saudi Arabia, Lebanon, Mozambique, Germany, Canada and Singapore. The Intersec Security, Safety & Fire Protection Awards celebrate innovation, excellence and teamwork" Simon Mellor, CEO of Messe Frankfurt Middle East, said, “The Intersec Security, Safety & Fire Protection Awards are a celebration of innovation, excellence, perseverance, teamwork, and of the dedication by the entire commercial security and fire protection community that continuously keep our societies safe and secure.” Intersec awards Spread across five security and four fire categories, entries went through a rigorous judging process which took place over two days and required shortlisted nominees to present their projects and products and attend a question and answer interview in front of an independent panel. The panel of judges including industry leaders and experts from companies such as Khalifa University, the Security Industry Regulatory Agency (SIRA), Dubai Civil Defense and EMAAR. Axis Communications - 'Video Surveillance/Camera System of the Year' winner Swedish manufacturer Axis Communications won the Video Surveillance / Camera System of the Year, for its AXIS Q6215-LE PTZ Network Camera. Philippe Kubbinga, Regional Director - Middle East & Africa, Axis Communications, said: “We are immensely proud of this recognition. It is a testament of the hard work, vision and excellent engineering of our teams. “With the AXIS Q6215-LE PTZ Network Camera, we have once again gone beyond the status quo and delivered a product that we believe will bring great value to our focus industry segments which are Critical Infrastructure, Transportation and Smart & Safe Cities. We look forward to continue innovating for a smarter and safer world.” Ejadah - ‘Security Project of the Year’ winner Ejadah was the only company to win across two categories on the night, walking away with the ‘Security Project of the Year’ and ‘Innovative Security Product of the Year’ awards. The UAE-based provider of community solutions for real estate assets was awarded for its work on upgrading the CCTVs across Jumeirah Beach Residences and their Security Robotic Service, respectively. Zainab Al Rahma, Marketing and Communications Manager for EJADAH, said, “Our robots will now offer the security industry and our customers the opportunity to purchase or rent assets that will enhance and improve the standard and quality of security services provided. They are an excellent example of utilizing the latest technology that can be easily integrated into any existing security systems. Once integrated these products will certainly compliment any of our customers’ security plans for their developments.” Engineering firm, WSP added to its two award wins from 2018, taking home the ‘Fire Project of the Year’ award Engineering firm, WSP added to its two award wins from 2018, taking home the ‘Fire Project of the Year’ award for its work on The Wharf in Bluewaters Island. Alexander Castellanos, a consultant from WSP, said, “This project is a change from the super and mega high rises and posed unique fire and life safety strategy elements which had to be considered. Life safety solutions “With the project being focused on delivering a pedestrian experience and its low-rise nature, the fire strategy took advantage of this design element in order to address life safety elements such as fire service access, phased evacuation, and evacuation discharge as an integral part of the design and allowing for efficiencies while maintaining a high standard of safety.” In addition to returning award categories, the ceremony saw the introduction of new categories such as the ‘Humanitarian Project Award’, won by Sicuro Group for their Mozambique Crisis Response & Operation Strategy. Maxxess – ‘System Integrator of the Year’ award Provider of security management systems, Maxxess, took home another of the newly introduced award categories, the ‘System Integrator of the Year’, for its work on Bluewaters Island. “The eFusion security management platform was chosen by Bluewaters, and it uses versatile, open-technology software without the need for complex or bespoke integration,” said Lee Copland, Managing Director EMEA, Maxxess. “This project benefited from the cost advantage of a modular, building block approach that gives maximum freedom to integrate, customize and adapt security systems to meet both current needs and emerging risks." Off-the-shelf, plug-and-play integration Off-the-shelf, plug-and-play integration is much less expensive than a customized solution" Lee adds, “The reduced costs therefore apply not just to the present implementation, but also to future adaptations which will also be achieved much more easily. Off-the-shelf, plug-and-play integration is much less expensive than a customized solution, and eFusion already integrates with more than 60 leading security technologies, with more being added continuously.” The 22nd edition of Intersec will take place from 19-21 January 2020 at the Dubai World Trade Center, featuring more than 1,300 exhibitors from 59 countries, covering the seven key show sections of Commercial Security, Fire & Rescue, Homeland Security & Policing, Physical & Perimeter Security, Safety & Health, Cyber Security, and Smart Home & building Automation. Intersec 2019 Awards winners Fire safety categories Fire project of the Year: WSP, Bluewaters Island - The Wharf Fire Alarm Detection of the Year: RPMANETWORKS, Hassantuk Smart Fire Solution Fire Suppression System of the Year: NAFFCO, NAFFCO Inert Gas System (IG01, IG41, IG55, IG100) Innovative Fire Protection Product of the Year: Waterfall Pumps Manufacturing, WF Fire Pump House (Pre-packaged Fire Systems) Security categories Security Project of the Year: Ejadah, Jumeirah Beach Residences CCTV Upgrade Access Control Product of the Year: Uhlmann and Zacher, Access solution with Bluetooth Video Surveillance / Camera System of the Year: Axis Communications, AXIS Q6215-LE PTZ Network Camera Innovative Security Product of the Year: Ejadah, Security Robotic Service System Integrator of the Year: Maxxess Systems, A Sustainable and Future-proof Integrated Maxxess Solution at Bluewaters Island Humanitarian Project Award: Sicuro Group, Mozambique Crisis Response & Operation Continuity Strategy
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campusFinally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT Increases Threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organization recognize and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organizations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organizations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognizing and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embraces more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centered around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offers complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasized systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognize a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the big picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.”Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorized, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorized that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarizes the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organizations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command center space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimize these centers. Stay tuned for the full GSX 2019 show review.
Video is a more common feature of security systems than ever before, driven by implementation of Internet Protocol (IP) networks. In addition, various computer analytics systems are now being implemented as a matter of course. The combination of the two trends is changing – and expanding – the operation of security operations centers (SOCs). Intelligent security operations "Intelligence is central to the next evolution of security", says Alan Stoddard, Vice President and General Manager, Situational Intelligence Solutions, Verint. An architecture is needed that can gather information from multiple devices and process it using intelligence and analytics engines. Cross-domain analytics create a higher level of security. Exposing data to best-in-class analytics provides information tailored to each security operator" “Exposing data to best-in-class analytics provides information tailored to each security operator,” says Stoddard. “There is so much data, and people need to react to it.” The result is the emergence of intelligent security operations centers (iSOCs). Consider, for example, any recent security event: “As people look to understand and get ahead of these incidents, how do they synthesize information? How do they move ahead from response to prevention?” asks Stoddard. Video-centric command-and-control Because of the expanding uses for video, Stoddard sees movement in the industry toward video systems being the focal point for integration of data sources into a command-and-control environment. “Everyone is visual, and video provides a mechanism to understand your environment,” says Stoddard. “Video-centric command-and-control marries the value of video with a map that is easy to navigate and understand. He adds, "Video is pulled in from each location, and various subsystems are integrated into a unified environment. The video management system (VMS) is a natural integration point.” To serve the combined emphasis on analytics and video management, Verint has introduced its VMS One system, a single product that combines video and integrated command-and-control for iSOC environments. The new product serves a need in the marketplace to manage diverse data streams, to analyze data for greater intelligence and to automate workflows. Integration with third party VMS VMSOne combines a VMS with a command-and-control system and is targeted to large facilities and campus-like environments with SOCs. Examples include transportation hubs, large manufacturing sites, critical infrastructure, safe cities and higher education. For even larger, enterprise-type customers with multiple locations and plenty of subsystems, Verint offers its Situational Awareness Platform, which can integrate with third party VMSs and other systems. The scalable system for very high-end customers can manage tens of thousands of devices and subsystems. VMSOne, which had a preliminary launch at ISC West and is featured at the 2019 GSX show in Chicago, is targeted to the next lower tier of customers. Customer shipments will begin in September 2019. Verint’s Situational Awareness Platform can integrate with third-party VMSs Physical and cyber security Increasingly, the security needs of end users are being converged, says Stoddard. They encompass information technology (IT), physical security and cyber security, combined with a corporate security officer (CSO) in charge of decision-making. More sensors and subsystems create the possibility of data overload for security operators, and more intelligence and analytics are tools to filter and manage that data and present it in useful form for better decision-making. Verint recently hired Jeffrey Lewis as Vice President, Marketing, to lead its marketing effort from an IT-centric perspective and talk to customers in a new way about the concepts of converged security. New technologies and a more converged environment create higher expectations and greater demands on the integrator/installer community, too. In response, Verint has launched a VIP Partner program to develop stronger and closer relationships with a select group of integrators. These “VIPs” are the “best of the best” – the most capable in the industry, knowledgeable about new technologies, and able to provide more value to end-customers. VIP Partner program Dealers are screened based on modest volume sales requirements and whether they have the right skillsets, technical capability and training. There are currently several dozen VIP partners, who “lead with” Verint solutions where they make sense in the marketplace. The VIP Partner initiative complements Verint’s other partner channels. Providing another tool to manage the flow of data in an organization, Verint recently acquired Nowforce, a small Israeli company, that provides an enhanced computer-automated dispatch system. Verint offers the integrated dispatch and response capability as either a stand-alone product or as part of the larger Situational Awareness Platform. Situational Awareness Platform Getting ahead [of security threats] requires looking at social media and other data sources" “It allows SOCs to take information in and handle response in an integrated fashion,” says Stoddard. “It also extends the security workforce, enabling customers and employees to take part in the security environment.” Stoddard adds, “Getting ahead [of security threats] requires looking at social media and other data sources, information on site, and creating a holistic security view for greater understanding,” says Stoddard. Verint’s Situational Awareness Platform integrates with third-part systems that track social media, such as Liferaft Navigator, NC4 and Dataminr,” Nowforce creates 360 degrees of control, extends the control center into the virtual workforce, and enables everyone to be managed. Information such as visuals and maps are pushed to security personnel on smart phones, and security officers get to the scene faster.
As police use of live facial recognition (LFR) is called into question in the United Kingdom, the concerns can overshadow another use of facial recognition by police officers. Facial recognition is incorporated into day-to-day police operations to identify an individual standing in front of them. This more common usage should not be called into question, says Simon Hall, CEO of Coeus Software, which developed PoliceBox, a software that enables police officers to complete the majority of their daily tasks from an app operating on a smart phone. Time-Consuming process There are two different use cases for facial recognition in the context of law enforcement" “Verifying the identity of an individual standing in front of you via facial recognition should be no more controversial than taking a fingerprint for the same purpose,” says Hall. “We are not talking about mass surveillance here, but the opportunity to use technology to make an officer’s day more efficient. Verifying a person’s ID is a time-consuming process if you have to take them to the station, so being able to do this more quickly should be welcomed as a positive step to modernize policing.” Because the use of facial recognition by police has proven to be a divisive topic, Simon is eager to highlight the distinction between the use of facial recognition for ID verification and the more controversial mass surveillance that some police forces have trialed. “There are two different use cases for facial recognition in the context of law enforcement,” says Hall. Number-Plate recognition “Firstly, there is facial recognition to verify a person’s identity (typically done face-to-face with the individual concerned and using the Police National Computer [PNC] database). This is no more controversial than taking an individual’s fingerprint to verify their ID but can be conducted more quickly if the officer has the capability on their smart phone. The second common use of facial recognition is to identify suspects quickly via mass surveillance. This is more controversial.” The focus for PoliceBox is ID verification only, he adds. The focus of facial recognition for PoliceBox is ID verification only First, there is the matter of consent. In the context of facial recognition in public situations, it is very difficult to inform everyone that they are being observed, so they cannot give their informed consent, says Hall. Then there is the inability for people to ‘opt out’ of the process. Unlike with driving a car, where one can technically opt-out of the rules of the road (and avoid technologies like number-plate recognition) by choosing not to drive, there is no such option for facial recognition. National surveillance system Secondly, many-to-many matching (matching lots of images to lots of database records) is more likely to produce false matches, resulting in possible perceived harassment of individuals who happen to match a person of interest, notes Hall. The government is openly exploring plans to develop a national surveillance system using facial recognition Lastly, Hall says there are legitimate concerns that the technology could be misused for discrimination or exerting control over populations. In China, for example, where facial recognition technology is already widely used in the commercial sector, the government is openly exploring plans to develop a national surveillance system using facial recognition. “Mass surveillance can be used in two ways; real-time, whereby ‘people of interest’ are flagged up as soon as a match is detected, and historical, where the movements of individuals around the time of a reported crime are established after the event,” says Hall. Repeated false matches “These two modes probably require different types of safeguards. For example, it may be appropriate to obtain a warrant to search historical data, to prevent Cambridge-Analytica style mining of personal data. For real time data, safeguards against repeated false matches are needed to prevent harassment of falsely matched individuals.” Properly implemented, facial recognition can be consistent with the GDPR. The principles are no different from obtaining a fingerprint to confirm identity, where consent would normally be given. For PoliceBox, using fingerprint or facial identification is typically a time-saving solution, benefitting both parties, instead of going to the police station and establishing identity there. Signed consent can be obtained on the spot using a secure on-screen signature. The PoliceBox solution is based on the UK legal framework and would also be appropriate for countries whose laws are similar to the UK Facial recognition algorithms Fingerprints and facial images can be automatically deleted once used to establish identity. There are special provisions for the collection of personal data for law enforcement purposes without consent, and some test cases for mass surveillance could go through the Information Commissioner’s Office (ICO). This is particularly significant where private operators are concerned. PoliceBox solution is also internationalized and can be used in different languages The PoliceBox solution is based on the UK legal framework and would also be appropriate for countries whose laws are similar to the UK. It is also internationalized and can be used in different languages. Facial recognition algorithms and databases are typically implemented by the relevant law enforcement body (such as the Home Office) and not directly within the product, which acts as a front-end to those systems. Public sector organizations Hall sees several remaining challenges related to police use of facial recognition: The adoption of cloud-based software-as-a-service (SaaS) solutions within the public sector. The existing infrastructure in the public sector has evolved over a number of years and there are significant legacy systems in place that need to be refreshed/replaced; Need for proven technology. Public sector organizations are risk-averse and often insist on being able to reference existing installations, which creates a Catch 22 problem when introducing new technology as someone has to be first; Interrupting business-as-usual. Most organizations already have some form of an existing solution. Even if this system provides poor ROI and is extremely dated, one must still overcome ‘the better the devil you know’ policy; A reluctance by some suppliers to share information with other solutions via APIs. This has stifled innovation for some time. Improving officers’ wellbeing These challenges are slowly being overcome. “I am confident we will soon see an accelerated adoption of platforms such as ours to deliver the financial and efficiency savings that are needed to bring the public sector into the 21st century,” says Hall. One of the biggest themes to come out of the recent Home Office Review into frontline policing was the need to improve officers’ wellbeing. Law enforcement has to deal with some of the most difficult and harrowing situations on an almost daily basis. The administrative burden can also be problematic, says Hall. “If we can help to reduce the administrative burden placed on officers – even by a little bit – the overall improvements in effectiveness and well-being when magnified across a whole force will be significant.”
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence has announced that the city of New Orleans (NOLA) is relying on Security Center, the company’s unified IP security platform, to improve public safety and enhance city-wide collaboration. With about 400,000 residents, New Orleans (NOLA) is the most populous city in the State of Louisiana. Like other big cities, NOLA is focused on enhancing public safety for its citizens and the 1.2 million visitors who flock to the city’s French Quarter for Mardi Gras celebrations. Using Security Center, the NOHSEP agency has saved police officers about 2000 hrs of investigative work in just a year Genetec Security Center As part of a Citywide Public Safety Improvement Plan that included the deployment of a new citywide public safety system and the construction of a Real-Time Crime Center (RTCC), the New Orleans Homeland Security and Emergency Preparedness (NOHSEP) chose the Genetec Security Center unified platform to support all city agencies. Using Security Center, the NOHSEP agency has saved police officers about 2000 hours of on-foot investigative work in just one year. “It might take a police officer over an hour to visit business locations, speak with owners, look through video, find what they are looking for, get a copy of video onto USB keys, drive back to the precinct, and then submit that into evidence." said George Barlow Brown, IT Manager at the New Orleans Real Time Crime Center. Video and ALPR cameras He adds, “So, we have essentially saved the department over 2000 hours of manual labor in physically collecting and storing video evidence. That’s more time for officers to respond to calls of service and be present in our many neighborhoods, which helps build community confidence. The ROI is there for us in terms of the efficiency,” The team can now easily retrieve evidence from over 325 city-owned video cameras and 100 automatic license plate recognition (ALPR) cameras (60 of which are Security Center AutoVu cameras) from the Real-Time Crime Center. The new security platform is integrated with other public safety solutions such as a Briefcam analytics system and a computer-assisted dispatch (CAD) system. All this information gets routed through to a central command center, speeding up emergency response. Share video access with RTCC “Our operators do the full investigative work right from within Security Center. It’s just one of the most intuitive solutions that I have ever seen. We can display up to six video tiles and hit ‘synchronize video’ to see various angles of the same scene playing at the same time. We can then select the segment of video we need and hit export. Each 10-minute segment from all the video tiles is then archived for viewing later on,” said Brown. NOLA is also leveraging Security Center to foster a true public-private partnership. The city launched a platinum version of the SafeCam project, which allows businesses to share access to external video cameras with the RTCC. Motion-detection alarms Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems. Participating businesses can be identified by discrete signage at their front entrances. This tells on-the-ground officers that this business has shared their outdoor cameras with the RTCC, and there is no reason to disturb the establishment or their customers. The officer can simply call RTCC operators to get the evidence they need. Brown and his team also have motion-detection alarms set up on cameras facing some known illegal dumping sites. As soon as someone dumps refuge in these locations, the team can proactively notify the Sanitation Department so they can collect the debris. Mining video and data NOLA is making the most of its security investments to improve city life too. For one, the RTCC operates a backup emergency operations center for the city of New Orleans. The NOHSEP team has also shared video feeds with other city departments such as the Sewage and Water Board, so they can determine the rate at which an intersection floods. As plans continue to evolve, the RTCC team is taking full advantage of the new technology to keep NOLA safer. “As far as investigations and the ability to mine video and data, Security Center is hands-down the best product out there. With this platform, we’re extending greater efficiency to responding officers, and we’re also forging stronger partnerships with our community. Together, we’re all working smarter and faster to keep New Orleans safe,” concluded Brown.
The independent sensor house HENSOLDT has been commissioned by Airbus Helicopters to provide the EuroGrid Tactical Mission Computer (ETMC) for helicopters with new functions. The two-year further development contract includes a guarantee for the acquisition of 200 production units in the subsequent years. The new ETMC generation, ETMC-NG, will be based on the computer which HENSOLDT has delivered for a long time to Airbus Helicopters for integration into the NH90, Tiger and CH-53 helicopters. Higher storage capacity for future system extensions Based on the experience gained during their many years of cooperation, HENSOLDT has defined the follow-up model, ETMC-NG, together with Airbus Helicopters and has launched the process to develop this system. Apart from the elimination of obsolete characteristics, the new model will have more computing power, higher storage capacity for future system extensions and new interfaces. For example, a new function for identifying ships and boats will be incorporated, which will allow the relevant data from the crew to be shown in the ETMC-NG display and to be used for mission planning, border surveillance or maritime search and rescue operations.
Delfina Chain, Sr Associate Customer Engagement & Development at Flashpoint, discusses what resources defenders must access to in order to keep a finger on the pulse of the cybercriminal underground. Artificial intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices - such as voice-controlled personal assistants and self-directed vacuum cleaners - to ground-breaking business applications that optimize everything from drug discovery to financial portfolio management. So naturally, there is growing interest within the information security community around how we can leverage AI - which encompasses the concepts of machine learning (ML) and deep learning (DL) - to combat cyber threats. AI-enhanced cyber security The effectiveness and scalability of cybersecurity-related tasks has already been enhanced by AI The effectiveness and scalability of cybersecurity-related tasks, such as malware and spam detection, has already been enhanced by AI, and many expect ongoing AI innovations to have a transformative impact on cyber defence capabilities. However, security practitioners must also recognize that the rise of AI presents a potent opportunity for cybercriminals to optimize their malicious activities. Much like the rise of cybercrime-as-a-service offerings in the underground economy, threat-actor adoption of AI technology is expected to lower barriers to entry for lower-skilled actors seeking to conduct advanced malicious operations. A report from the Future of Humanity Institute emphasizes the potential for AI to be used toward beneficial and harmful ends within the cyber realm, which is amplified by its efficiency, scalability, diffusibility, and potential to exceed human capabilities. Encrypted chat services Potential uses of AI among cybercriminals could include the development of highly evasive malware, the ability for automated systems to exhibit human-like behaviour during denial-of-service attacks, and the optimization of activities such as vulnerability discovery and target prioritization. Fortunately, defenders have a leg up over adversaries in this arms race to harness the power of AI technology, largely due to the time- and resource-intensive nature of deploying AI at its current stage in development. The purpose of intelligence is to inform a course of action. For defenders, this course of action should be guided by the level of risk (likelihood x potential impact) posed by a threat. The best way to evaluate how likely a threat is to manifest is by monitoring threat-actor activity on the deep-and-dark-web (DDW) forums, underground marketplaces, and encrypted chat services on which they exchange resources and discuss their tactics, techniques, and procedures (TTPs). Cobalt Strike threat-emulation software Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of way Cybercriminal abuse of technology is nothing new, and by gaining visibility into adversaries’ ongoing efforts to develop more advanced TTPs, defenders can better anticipate and defend against evolving attack methods. Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of ways, ranging from the use of pirated versions of the Cobalt Strike threat-emulation software to elude server fingerprinting to the use of tools designed to aid visually impaired or dyslexic individuals to bypass CAPTCHA in order to deliver automated spam. EMV-chip technology Flashpoint analysts also observe adversaries adapting their TTPs in response to evolving security technologies, such as the rise of ATM shimmers in response to EMV-chip technology. In all of these instances, Flashpoint analysts provided customers with the technical and contextual details needed take proactive action in defending their networks against these TTPs. When adversaries’ abuse of AI technology begins to escalate, their activity within DDW and encrypted channels will be one of the earliest and most telling indicators. So by establishing access to the resources needed to keep a finger on the pulse of the cybercriminal underground, defenders can rest easy knowing they’re laying the groundwork needed to be among the first to know when threat actors develop new ways of abusing AI and other emerging technologies.
Pulse Secure, the provider of software-defined Secure Access solutions, has announced the successful delivery of a project to help Hogarth Worldwide refresh its secure access platform as part of a Zero Trust approach to security. Hogarth Worldwide is a creative production business, providing marketing production and adaptation services for some of the world’s most recognizable brands and global multinationals. Security is a critical part of this service and Hogarth manages its own multi-layered secure access platform. Having grown rapidly over the last decade, the company had reached capacity on its legacy Juniper VPN solution that was also heading towards end of support. With the need to upgrade fast approaching, Hogarth decided to both refresh its secure access platforms to meet greater demand and gain access to more advanced capabilities. Requirement of VPN and NAC platform Hogarth contacted ANSecurity, a trusted cyber security advisor that it had worked with previously on several projectsPeter Smith, Global Network Architect at Hogarth, said, “We initially created a shortlist of vendors from the Gartner Magic Quadrant and started examining a few options. Our key criteria was a VPN and NAC platform that was easy to deploy and manage, with strong compatibility across a wide range of devices, plus the ability to adapt.” Hogarth contacted ANSecurity, a trusted cyber security advisor that it had worked with previously on several projects. The team at ANSecurity provided guidance to help scope the project and design a technical implementation. “We looked at a number of options, but we felt that Pulse Secure offered the best combination of features and compatibility along with the flexibility we needed to meet our current requirements and future needs,” said Smith. Pulse Connect Secure (PCS) virtual appliances Based on these requirements, Hogarth selected Pulse Connect Secure (PCS) virtual appliances deployed within its main data centers in London and several branch offices across the world to provide VPN access. This is supported by Pulse Policy Secure (PPS), a next-generation NAC appliance that enables Hogarth to gain deeper visibility and understanding of its security posture. The combined solution is deployed as part of a Zero Trust approach to security allowing Hogarth to ensure its distributed workforce is authenticated, authorized and secure when accessing applications and resources across its own data center and cloud-based resources. The data from all these systems is passed to a SIEM to allow the IT department to quickly detect any issues The solution is integrated into its Ruckus based Wi-Fi network, Radius authentication server and multi-factor authentication which runs in Azure. The data from all these systems is passed to a SIEM to allow the IT department to quickly detect any issues and automate threat response to mitigate malware, rogue devices, unauthorized access and data leakage risks. Meeting the requirements of TISAX “The virtual appliance offered better performance than our legacy solution and the Pulse Secure VPN and NAC appliances were easy to deploy with a low management overhead,” commented Smith. “We have a high availability configuration and the built-in license server makes it easy to add more users or devices as needed.” The new solution has also helped Hogarth to meet the requirements of TISAX (Trusted Information Security Assessment Exchange) that enables mutual acceptance of Information Security Assessments which was a key requirement for several of its clients within the automotive industry. “The upgrade to Pulse Secure has gone very smoothly, we have had no issues and the solution has delivered as expected with the potential to adapt as our security needs evolve,” Smith concluded.
ANSecurity, a specialist in advanced network and data security, announces the successful delivery of a project with New College Oxford to streamline its network architecture and strengthen its security by moving to a Zero Trust model. Founded in 1379, New College is one of the largest Oxford colleges, with some 430 undergraduates and 360 graduates. The college, together with 37 other academic institutions across Oxford, uses the University’s switched Gigabit backbone along with some centralized services, such as e-mail for students, backup, remote access, VPN systems and more while the individual colleges runs their own core servers and applications. Good technical knowledge The project aim was to join two separate networks that had multiple subnets in the same native VLAN The college decided it needed to upgrade its aging 3COM networking kit and after an evaluation process selected ANSecurity to help it specify, design and upgrade to new switches and a firewall from Juniper. James Dore, IT officer of New College at Oxford University, commented: “ANSecurity was a great company to deal with. It had good technical knowledge around the Juniper products and managed the project efficiently from start to end.” The project aim was to join two separate networks that had multiple subnets in the same native VLAN. This was overcomplicating the network because of how the VLANs had to be tagged and untagged when traversing the networks. As part of the move to a Zero Trust model, all users and server VLANs would be routed through the firewall. In addition, the project would also free up IP addresses from one of the subnets in order to re-allocate them to other colleges. High availability solution ANSecurity implemented a high availability solution using technology from Fortinet and designed and implemented a VLAN migration processes that by leaving the hosts in their original VLAN, allowed them to pick up IP addresses from a different subnet freeing up addresses to be re-allocated. The team from ANSecurity was easy to work with and had a deep knowledge of the network" “The design allows us to set up VLANs in a much simpler fashion, and is easier to manage while allowing us to better share resources across multiple colleges,” said Dore. “The team from ANSecurity was easy to work with and had a deep knowledge of the network and all the technologies we used. They have fielded questions from us at odd hours of the day and have kept us updated about new technologies on a regular basis.” Reducing annual charges It is estimated that the project will reduce annual charges related to client licenses, hardware and maintenance fees by several thousand pounds annually. The project would also offer the benefit of allowing three of the colleges to share access to core security platforms to better utilize the technology and reduce upfront and ongoing maintenance contract costs. The successful project, delivered on time and within budget, allowed the college to refresh its infrastructure and start a relationship with ANSecurity that resulted in it becoming the trusted provider for the college’s networking and security needs. “It is fair to say that they have never let us down and we value the relationship which is now into its 7th year and look forward to working with them on future projects,” concluded Dore.
Kings Secure Technologies has provided high-level security and protection to one of its leading clients since 2011. Due to this successful long-term relationship, Kings was commissioned to begin a project, which started in 2019, to update the existing access control system with the latest high security card and card reader technology. With facilities working 24/7 the challenge faced was to find an easy-to-install edge technology card reader that could be configured onsite to read multiple card technologies where required and be field upgradable with any new advances in security. With these complex requirements in mind, Kings turned to Third Millennium to provide the most advanced technical solution available in the market. RX range of card readers The project also required the implementation of biometric dual authentication for the more secure areas Kings utilized Third Millennium’s RX range of card readers which incorporates the second evolution of NXP industry-leading MIFARE® DESFire® EV2 open architecture platform. Third Millennium’s PC09 Mifare DESFire EV2 cards offer superior performance, state-of- the-art security, privacy and enhanced multi-application support such as follow me printing and vending, to name just two. In addition to the RX4 and RX1K readers, the project also required the implementation of biometric dual authentication for the more secure areas. Third Millennium’s RX6 biometric reader uses a template on card application which means that there is no requirement to maintain a separate database of biometric information. The RX6 compares the finger template on the card with the finger being scanned and releases the card data if the two match. Because of the high security requirement, a custom encrypted key ties the readers to the cards thereby preventing card cloning or data bugging.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom." However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?