Fujitsu Limited and Upstream Security, cutting-edge security solution provider for connected vehicles, have announced a partnership for vehicle cyber security. The companies will collaborate in the development of security operations solutions for connected vehicles. Vehicle security As more vehicles are connected to the network, they are increasingly prone to the growing risk of cyber-attacks. International and domestic committees such as UNECE/WP.29 (The UNECE World Forum for Harmonization of...
Member companies and representatives of the Open Security & Safety Alliance (OSSA) will be present at the INTERSEC 2020 show in Dubai next month. OSSA – an industry body comprised of leaders, influencers and innovative organizations from all facets within the security, safety and surveillance space – formed to help the industry focus on creating new value by reducing market fragmentation and addressing common challenges. The aim is to bring together the industry to move forward...
ADT, a provider of security, automation, and smart home solutions serving consumer and business customers in the United States, will showcase new products and security services at the 2020 International CES designed to serve the lifestyles of more consumers, wherever they are, whether in their homes, apartments, cars, online or on the go. Innovations from ADT include a new DIY smart home security brand and products, new smart home integrations for the award-winning ADT Command and Control smart...
Sophos, a globally renowned provider of next-generation cyber security solutions, has announced introducing Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defense for Android and iOS devices. Fleeceware applications Sophos has also published research, Fleeceware Apps Persist on the Play Store, which details new findings on Fleeceware applications that overcharge unsuspecting consumers for functionality widely available in other fre...
Genea has announced that it has acquired cloud-based physical access control company, Sequr, Inc., thereby further expanding its portfolio of commercial real estate technology solutions. Submeter billing software solutions “Sequr is an ideal fit for us,” said Michael Wong, CEO of Genea. He stated, “Almost all of our customers who use our OTHVAC and/or submeter billing software solutions have been searching for help with access control. Similar to our other offerings, Sequr&rs...
It’s not just a new year, it’s a new decade. And somehow this makes it feel bigger. Almost like we’re moving faster or reaching farther. Technology is certainly advancing at an unprecedented pace. While there’s a lot to talk about, there are three big security trends that we think will continue to have a huge impact in the year to come. 1. What is artificial intelligence and is it going to take over? We’ve seen countless versions of artificial intelligence (AI) in...
March Networks, a global renowned video security and video-based business intelligence solutions company, is pleased to announce the expansion of its Retail Solution to include fraudulent return investigations through the Zebra Savanna data intelligence platform. March Networks’ new integration – between its Searchlight for Retail software and Doddle, which designs, develops and integrates consumer fulfilment technology – is powered by Zebra Savanna, a cloud-based platform that enables the real-time collection of data from Zebra Technologies’ sensors and devices. March Networks Searchlight March Networks Searchlight logs events from Zebra Savanna and other systems within the retail environment Through this unique collaboration, March Networks Searchlight logs events from Zebra Savanna and other systems within the retail environment, like Doddle, that are powered by the Zebra platform. Searchlight can then match those events with corresponding video clips for greater enterprise-wide visibility. For example, with the Searchlight-Doddle integration, retailers using Doddle can keep a record of all of their product returns in Searchlight. When a customer arrives in-store to return a product facilitated by Doddle’s returns technology, Searchlight records that event, allowing retailers to quickly and easily pull up the surveillance video associated with the return. This allows retailers to visually verify the details of all product returns, including the individuals involved and the condition of the product at the time of the return. Zebra Savanna cloud-based platform In addition, the integration also tracks other retail events such as coupon use at the point-of-sale (POS). Retailers offering coupons through fulfillment partners like Doddle that are powered by Zebra Savanna can track the full buying cycle in Searchlight. When a customer uses a coupon, it’s recorded in Zebra Savanna and visible in Searchlight, allowing retailers to track the success of promotions offered through third-party vendors. “As more consumers turn to online channels for their retail purchases and returns, these latest Searchlight capabilities bridge the gap between digital and in-store transactions, providing retailers with complete visibility into the buying cycle,” said Jeff Corrall, Director of Strategic Partnerships and Integrations for March Networks. “According to the National Retail Federation (NRF), 11% of retail purchases are returned and an average 8% of returns are fraudulent. With Searchlight, retailers can proactively detect and target this fraud, and recoup associated losses.” Power of integrated data and video “By working with leading retail manufacturers like Zebra Technologies and fulfillment technology companies like Doddle, March Networks is proving the true power of integrated data and video, and its ability to positively impact the retail bottom line.” Returns can have an impact on retailers’ margins, especially over peak periods" “Returns can have an impact on retailers’ margins, especially over peak periods,” said Gary O’Connor, Chief Technology Officer (CTO) at Doddle. “Working with partners like March Networks means the Doddle platform can provide deeper insight. Retailers have the ability to re-convert customers through personalized digital journeys, while also having access to more capability to prevent fraud.” Integration with RFID data from Zebra sensors March Networks’ Retail Solution is used by more than 300 retailers worldwide to facilitate improved efficiency and compliance, reduction in losses and risk management, thereby enhancing customer service and compete more successfully in the market. Searchlight is the centerpiece of the solution that helps retailers to improve performance and profitability through the integration of clear surveillance video, relevant business data, including POS transactions, and highly accurate analytics. March Networks’ Searchlight also integrates with radio frequency identification (RFID) data from Zebra sensors and devices for enhanced product tracking, loss prevention and inventory management. March Networks will showcase the Searchlight for Retail-Doddle integration powered by Zebra Savanna in Zebra Technologies’ booth #3301 at NRF 2020: Retail’s Big Show Expo, January 12-14 in New York, NY.
Synology Inc. has announced the availability of the SA3600 storage system, the latest device in the SA family of high-performance and versatile, petabyte-capable network attached storage servers. Built to tackle both existing and future data storage requirements, SA3600 provides businesses with access to faster and larger on-premises storage in a cost-effective package. "In response to the rising demand for on-premises data storage, we built the SA series to help businesses reach petabyte-scale storage," said Michael Wang, Product Manager at Synology Inc. "SA3600 provides massive storage and high performance to meet the ever-growing compute requirements and to facilitate IT transformation for large-scale businesses." Versatile architecture to accelerate workload Powered by an Intel Xeon 12-core processor, the SA3600 is scalable up to 180 drives. SA3600 provides petabyte-scale storage capacity, suitable for massive surveillance deployments, video post-production, and other business environments. Support of both 2.5" and 3.5" SAS/SATA drives increases flexibility and prevents vendor lock-in, minimizing total cost of ownership (TCO). Performance: Over 5,500 MB/s sequential throughput and 176,000 4K random write IOPS1 Scalability: Up to 1,536 TB storage capacity with 7 expansion units2 10GbE built-in: 2 x 10GbE and 4 x 1GbE Ethernet ports PCIe 3.0 expansion: 2 x PCIe slots for additional network interface card support Virtualization-ready: Certified for VMware vSphere, Microsoft Hyper-V, Citrix XenServer, and OpenStack Cinder Easy to deploy by IT departments and greatly simplifies operations with comprehensive tools designed for businesses to safeguard their data. Integrated data protection and availability VM, SaaS, and endpoint protection Centralized backup solution to protect VMware and Windows Server virtual machines, Windows endpoints, Office 365, and G Suite accounts. Manage all the backup tasks from one single console and restore data instantly with flexible recovery methods. Prevent data loss with snapshots and replication Synology Snapshot Manager integrates with VMware and Windows for application-consistent data protection. Snapshot Replication enables Shared Folder and LUN protection for all other workloads. Maximize availability Add in another SA3600 to combine two servers into a single high-availability cluster. The active/passive structure ensures smooth service transition between clustered servers in the event of hardware failure.
As it is a new year and decade, it is prime time to assess the state of the video content analytics industry and ponder how it might evolve in the coming 12-18 months. The video surveillance market has been booming for many years, but the introduction of complementary video intelligence technology has enabled users to derive more value from their video surveillance investments, transforming video into actionable intelligence based on deep learning techniques and artificial intelligence. This is why a variety of industries, including retail, financial services, and shipping, are enthusiastically embracing video content analytics. Video content analysis Artificial intelligence (AI) and deep learning continue to be the key enabling technologies behind video content analysis, effectively transforming live or recorded video into structured metadata that can deliver actionable and quantifiable insights. Ongoing algorithm research and development continues to make the extraction and analysis of data increasingly efficient and accurate and the innovation in this area will progress as the world moves into 2020 and beyond. Algorithm research and development continues to make the extraction and analysis of data increasingly efficient and accurate Because real-time video processing continues to provide significant benefit to end users – based on advances in the sophistication of real-time alerting – a top priority for organizations already leveraging video analytics is expanding the camera coverage for real-time video processing. By expanding the scope of real-time video processing, users can trigger alerts for broader environments and also increase data aggregation and visualization into dashboards in real time to drive business insights based on continuous processing with integrated video data sources. Real-time information The market demand for real-time information and immediacy will only grow, especially as users become more reliant on video intelligence dashboards for deriving current business intelligence, and – in parallel – the technology to support this will continue to improve. Facial recognition, which matches faces by correlating biometric features against a compiled watchlist or database of digital images, either extracted from video frames or uploaded to the system. With so many significant applications – from pinpointing missing persons or criminal suspects, to identifying VIP customers in a loyalty program – this technology is posed for increased adoption, as access to ideal video and conditions to support face matching become more mainstream: As higher resolution video and more efficient processing technologies evolve, face recognition solutions are becoming more effective and accurate. While the progress in this field has been significant, face recognition remains controversial and will continue to do so until regulations around its use become more definitive. Accurate video analytics The increasing availability of high-resolution video (4k, 8k) is enabling more sophisticated and accurate video analytics. Higher resolution video makes it possible to more accurately analyze and identify objects in crowds, for triggering real-time rule-based alerts when certain conditions are met, searching and filtering video, and drawing intelligence from video metadata. Technological advances drive precise analytic capabilities, such as face recognition and count-based alerting. However, the steep hardware requirements to support heavier video processing remain a barrier. As long as the cost of hardware is high, mass market adoption of higher resolution cameras will be somewhat stilted, but it’s definitely an evolution we’ll continue to monitor in the coming years. Video surveillance networks The migration to cloud platforms offer end users the freedom of choice when it comes to video content analytics deployment Cloud-based video analytics is a trend that’s often discussed, but as of yet there has not been significant market penetration. Nonetheless, this industry – among other software solutions – is still moving in this direction, because cloud implementations offer ease of deployment and a low cost of entry. With advances to cloud development, in general, cloud platforms now boast robust cybersecurity, as well. Cloud services incur a fraction of the capital expenditures, procurement procedures, and installation and deployment expenses of on-premises implementations, and are well-suited to serving the needs of a multi-site deployment. At the very least, the migration to cloud platforms will offer end users the freedom of choice when it comes to video content analytics deployment, whether the cloud, on-premises or hybrid of the two is most suited to maximize their existing video surveillance networks. Hardware and software progress The video analytics field is posed for continued evolution in 2020, because of rapid enabling hardware and software progress that is making the technology more accessible and more valuable. BriefCam is looking forward to continuing to contribute towards the advances in video content analytics in 2020 and to evolve with the market as it grows to serve new types of end users, business units and organizations across a broad range of industries in 2020 and beyond.
The Security Industry Association (SIA) has selected five recipients for the 2020 SIA RISE Scholarship, a program offered through SIA’s RISE community of young security professionals that supports the education and career development goals of young industry talent. Through this scholarship program – open to SIA student members and RISE members who are employees at SIA member companies – each awardee will receive a $3,000 scholarship to use toward continuing education and professional development courses, SIA program offerings and/or other academic or education programs. SIA RISE community and scholarship Scholarship funds can be used to expand knowledge in the areas of business, human resources, information technology, marketing/sales, project management, security engineering and/or risk management. SIA is proud to help foster the careers of young talent in the industry through SIA RISE community and scholarship" “SIA is proud to help foster the careers of young talent in the security industry through the SIA RISE community and scholarship,” said Don Erickson, CEO of SIA. “This year’s scholarship honorees are an impressive group of dedicated, accomplished young professionals that represent the next generation of security leaders, and I look forward to supporting their professional growth and celebrating their many successes ahead.” Robust security program The winners for the 2020 SIA RISE Scholarship are: Dr. Hanna Farah, Chief Technology Officer (CTO), Feenics In his role as CTO at Feenics, Hanna Farah is responsible for creating a security and access control platform and developing quality and security processes. Prior to his time at Feenics, Farah has held positions at Deloitte, Graphite Software, the University of Ottawa, Electronic Health Information Laboratory and IBM. He holds a Ph.D., a master’s degree and a bachelor’s degree in software engineering from the University of Ottawa. Farah plans to use the SIA RISE Scholarship to develop further knowledge to build a robust security program at Feenics that ensures the company’s practice and products adhere to high security standards, including acquiring expertise and certifications such as the Certified Cloud Security Professional credential. Integrated security system Kyle Gansemer, Systems Designer, VTI Security At VTI Security, Kyle Gansemer is responsible for integrated security system design and review of system functionality to determine proper operation of access control, IP video and other security systems and controls. Prior to his time at VTI Security, he served as a design/manufacturing engineer at Optical Mechanics Incorporated. Gansemer holds a bachelor’s degree in aerospace engineering from Iowa State University and CompTIA’s Security+ and Network+ credentials. He plans to use the scholarship funds to expand his cybersecurity expertise through completing courses related to cloud services, ethical hacking/defenses and systems analysis. Data integration Suzanne Holmberg, Data & Analytics Manager – EMEIA & APAC, Allegion Suzanne is responsible for creating teams in Europe and Asia to deliver on data integration and data science projectsIn her role at Allegion, Suzanne Holmberg is responsible for creating new teams in Europe and Asia to deliver on data integration, analysis and data science projects. Prior to her current role, Holmberg served as global analytics manager, analytics leader and sales business analyst at Allegion and held sales operations and marketing positions at Belden, Inc. She holds a bachelor’s degree in business administration from the University of South Carolina and is currently enrolled in the Global Executive MBA program at Duke University’s Fuqua School of Business. Holmberg will use the scholarship funds toward completion of the MBA program, which brings working professionals from around the globe together and grows individuals beyond their comfort zones through international residencies that emphasize how culture and institutions shape business in Asia, Latin America, Europe and North America. Research and development Nelson Jenkins, Mechanical Engineer, Allegion Nelson Jenkins is a design engineer with diverse experience across project lifecycle, including research and development, manufacturing and product leadership. At Allegion, he has started a grassroots organization to help promote a culture of innovation at the company. Prior to his role as product designer at Allegion, Jenkins served as design strategist consultant at Zeren Fitness and as a researcher with Carnegie Mellon University’s CSSI program; he holds a bachelor’s degree in mechanical engineering from the University of Michigan and a Bachelor of Science in applied physics from Morehouse College. He will use the scholarship funds to complete a course on disruptive theory offered through Harvard Business School. Executing marketing techniques Jessica Sargo, Channel Marketing Manager, Brivo SIA’s RISE community fosters the careers of young professionals in the security industry through fun, in-person networking events In her role at Brivo, Jessica Sargo leads efforts for a cross-departmental partner training program, supports partner recruitment and retention campaigns, develops web and cellphone applications for partner conferences, creates communications plans and manages logistics for trade shows and partner events. Prior to her time at Brivo, she held marketing positions with TwentyEighty Strategy Execution and Teaching Strategies, LLC; she holds a bachelor’s degree in public relations from the University of Florida. Sargo plans to use the scholarship funds to complete a digital marketing education course and further her knowledge of executing marketing techniques through social media, cellphone applications, search engines and other digital channels. Business skills development In addition to awarding the RISE Scholarship, SIA’s RISE community fosters the careers of young professionals in the security industry through fun, in-person networking events held during top trade shows and in major cities across the country; thought leadership opportunities; career growth webinars on topics of interest; career tracks at ISC West and East each year; and the AcceleRISE conference for tomorrow’s security leaders, featuring top-quality idea sharing, coaching, business skills development, networking and inspiration. SIA RISE is open to all young security professionals employed at SIA member companies who are under 40 and/or have been in the security for less than two years.
Sunstone Systems and DETASAD are pleased to announce they have entered into a strategic partnership, combining Sunstone technologies and DETASAD’s world class experience as an end-to-end ICT solution provider and a leading contributor to ICT sector of Kingdom of Saudi Arabia with a track record of 37-years. The Sunstone - DETASAD partnership brings together innovative clean technologies, which are deployed in tandem with DETASAD engineering and telecommunications services, providing remote surveillance and internet connectivity across highways, defense, transport and construction sectors in the Middle East. Remote wireless networks “This partnership is a powerful combination, together we can provide remote wireless networks anywhere in the region,” said Paul Schelhaas, CEO of Sunstone Systems. “Our systems are quick to deploy, can withstand incredibly high temperatures and generate significant amounts of power for WIFI and surveillance cameras. DETASAD are at the cutting edge of innovation and telecommunications services in the region and we believe our partnership will be truly transformative for a range of sectors and customers across the Middle East.” DETASAD President & CEO Felix Wass commented ‘’We are excited about this partnership with Sunstone, a visionary in reliable, grid independent, rapid deployment wireless and CCTV solutions. Pre-integrated solutions with VSAT backhauling, Wi-Fi and 5G platforms combined with advanced AI based analytics and IOT enablers give our customers the flexibility to react to business needs. From the initial deployment, the business is provided with a 24/7 guaranteed SLA and online access to all operational data in a highly secure environment with all data complying with the local data sovereignty laws. This flexibility extends to commercial models including purchase as well as short and long term rent.”
Pulse Secure, the provider of software-defined Secure Access solutions, announces a new distribution partnership with SecureWave, a data security and IT infrastructure value added distributor, to grow its sales channel across the Israel to meet accelerating demand for Zero Trust access security. SecureWave, part of the Exclusive Networks Group is present in more than 30 countries around the world, and maintains an active community of more than 350 partners. The company will offer the integrated portfolio of Pulse Secure solutions, including virtual private network (VPN), software defined perimeter (SDP), network access control (NAC), and virtual application delivery controllers (ADC). Sales and technical enablement SecureWave will support Pulse Secure partners with sales and technical enablement The agreement will include Pulse Secure’s Zero Trust-based Access Suite which delivers protected connectivity, operational intelligence and threat response across mobile, network and cloud environments. “Pulse Secure has been a driving force behind the adoption of Zero Trust Secure Access and we look forward to helping our channel partners to benefit from its visionary position through our expertise, knowledge and experience within this market,” says Moran Gerassi, CEO for SecureWave. As part of the new distribution agreement, SecureWave will support Pulse Secure partners with sales and technical enablement, lead generation and a full educational program. Global distributor network “SecureWave is a highly respected distributor that is well suited to help us expand and support our partner community to match our growing solution portfolio,” said Laurent Delattre, Sales South EMEA for Pulse Secure, “The addition of SecureWave to our global distributor network is a recognition that the move to Zero Trust is prompting significant change in the security landscape and provides a major and untapped opportunity for the channel to capitalize upon.” The Zero Trust security market size is projected to grow from USD 15.6 billion in 2019 to USD 38.6 billion by 2024, at a CAGR of 19.9% from 2019 to 2024 according to MarketsandMarkets Research. Pulse Secure’s Zero Trust focus is delivered with the Pulse Access Suites. Virtual application delivery controller This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability The Suites provide remote, mobile, cloud, network and application security with comprehensive VPN, mobile device management (MDM), single sign-on (SSO), endpoint and IOT device security, network access control (NAC) and virtual application delivery controller (ADC) functionality. Pulse SDP is a Suite add-on which activates software defined perimeter (SDP) components within existing Pulse solutions to provide direct device-to-application trusted connectivity only after successful user, device and security state verification. This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability, deployment flexibility, automated provisioning and resource optimization. In November, Pulse Secure won the Software Defined Vendor of the Year at CRN Channel Awards 2019 recognizing its development of new software defined technologies to help the channel meet growing demand for Zero Trust security.
It seems that only a few days pass between cyber security stories of concern to the public such as personal data leaks and DIY home camera hacks. With this in mind and the need for increased connectivity, the industry is in need for guidance in cyber security. 2020 is set to be a year of change for the physical security industry. Here are the top four predictions to stay head of market trends in the year ahead. 1. There will be more clarity for installers about industry-standard for cyber security The professional security industry will next year see the launch of a new set of cybersecurity guidelines Through the work being conducted by the BSIA Cyber Security Product Assurance Group (CySPAG), the professional security industry will next year see the launch of a new set of cybersecurity guidelines. This will provide the industry with the guidance and clarity that is currently missing. A key area of clarification is the chain of responsibility. It is not just the responsibility of the manufacturer to keep everything secure from a cyber-perspective. The whole supply chain is responsible - once a product leaves the lab where they’re manufactured, conditions change. Those who maintain, install and operate the product have a shared responsibility to ensure that a product or system remains cyber secure. As the sector develops and more cyber-enabled products become available to the market, this cyber security approach will become more important, and a key differentiator to the DIY market, which can only be a good thing. 2. Cloud and 4G connectivity are giving end-customers better physical security The percentage of panels connected to cloud services is now increasing every year Manufactures have been producing cloud-ready products for several years. Initially, not all installers had been taking advantage of benefits of cloud-connected panels, however the percentage of panels connected to cloud services is now increasing every year. Trust and education have improved, meaning that installers and end-users have realised that connectivity is positive, enabling consumers to check on their properties remotely and allow installer to remotely support their customers. However, one area of constraint has been the dependency on customers networks which may, or may not, offer the level of performance that a robust and resilient security system demands. With the introduction of mobile data connectivity to connected products over the past few years, and as connectivity becomes more widespread across physical security products there will also be a greater shift toward mobile technologies such as 4G, either as a back up to a router connection or for complete network independence. 3. Connectivity is changing the way installers work Installers are a vital part of the chain of when a new alarm system is fitted into a property Installers are a vital part of the chain of when a new alarm system is fitted into a property, providing both installation and maintenance services. Traditionally maintenance activities have always been delivered on-site. With the increased ease of connectivity for security systems and the advancements in how these systems are used, installers are provided further opportunity to enhance customer service around the delivery of maintenance. It is no longer a requirement to have a customer wait until an engineer can attend a property to remedy a fault, as many can now be addressed within minutes from any location in the world. This ability allows installation businesses to focus their engineers on more critical tasks while delivering an overall higher level of customer service. Indeed, some installation businesses are moving to a model of having dedicated remote support engineers in addition to the road-based team. 4. Manufacturers are ready for IP-only alarms, ahead of the 2025 analog switch off The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 as part of the move to Next Generation Networks, ending the use of analog phone lines and moves communications technology into an all IP-only space. Although some service providers have indicated that there may be some type of initial PSTN simulation, those providers that are doing this are also making it clear that this is only a temporary solution. The switch off will be a huge change for the security industry. Where heritage, analog alarm systems are in use, installers will need to plan to reconfigure existing systems to use the temporary PSTN simulation functions (where available) or upgrade systems to an all IP solution. Although 2025 feels a long way off, installers and end-users need to start planning now and taking the necessary action. In our sector, manufacturers are ready for IP-only alarms through the provision of cloud-based solutions and the use of techniques such as SIA IP for ARC monitoring.
As we surpass 2019, it’s high time we realize that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices. IoT in every day life I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a cellphone app or web. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices It may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to: By 2020, 50 billion devices are expected to connect to the internet In 2015, 3.5 connected devices per person have now reached almost 7 8 billion cellphone broadband access points by 2019 5 million IoT jobs by 2020 70 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion $3.3 trillion market for ‘Smart City’ applications and services by 2025 The impact of smart homes Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us. Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking. The benefits of IoT Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies. This simply leads to: More efficient office operations Energy savings Comfortable work environments Consequently increased employee productivity The dark side of the Internet of Things The potential risks Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats. IoT can be integrated into anything, leading to make our lives more convenient Devices, systems and the lack of security It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before. Collecting information at a cost But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured. The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimizes security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimized operational costs; and an improved passenger experience. AI for Object Recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
PACOM Systems, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments, announces that Hancock Whitney Corporation continues to roll out the PACOM GMS security management platform to their growing number of bank financial centers and ATMs. Hancock Whitney Corporation operates bank offices and financial centers in Mississippi, Alabama, Florida, Louisiana, and Texas, offering comprehensive financial products and services, including traditional and online banking; commercial and small business banking; private banking; trust and investment services; healthcare banking; certain insurance services; and mortgage services. Multi-Site security management platform GMS meets end-user demands for a multi-site security system with multiple integrations PACOM’s relationship began with Hancock Bank in Mississippi and, after Hancock’s acquisition of Louisiana-based Whitney Bank in 2011, blossomed further still. Currently, the PACOM GMS software platform manages card access and intrusion monitoring at 258 locations and growing. Hancock Whitney does all its own 24/7/365 alarm monitoring from a central location in Gulfport, Mississippi. There are also two company data centers monitored and protected by PACOM GMS. GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry-leading availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. Third-Party monitoring companies “One of the biggest advantages of the PACOM system,” commented Al Tapper, CPP, Manager, Bank Protective Services for Hancock Whitney Corporation, “is it’s all-inclusive with integrated card access and alarms. We have our entire company on a single, integrated platform. We do our own alarm monitoring, which is a big plus because we can immediately verify what is going on in any of our financial centers.” One of our banking acquisitions had two third-party monitoring companies" Tapper continued, “One of our banking acquisitions had two third-party monitoring companies. It was one false alarm after another. That’s dangerous, and it can be quite expensive. With PACOM and self-monitoring, we avoid that. The PACOM system also helps with disaster recovery. We can see what’s going on in our financial centers and know if our alarms are working.” Central monitoring station Hancock Whitney has launched another phase to their company-wide security platform: video integration. When an alarm goes off in any branch, the central monitoring station will automatically be able to see events associated with that alarm. Eventually, all branches and ATMs will have video monitoring with a number of integrated cameras at each location. The system currently provides access to more than 5,000 card holders with varying levels of access privileges. Alarm protocols are in place for each location, with Tapper and his team managing and monitoring the system. “PACOM helps us adapt the system to our changing needs; and when we provide feedback, PACOM listens and will consistently respond directly to that feedback, said Tapper.”
Brienon-sur-Armançon is a city in the Burgundy-Franche-Comté region of north-central France, with a population of about 3,300. Located at the intersection of two rivers – Créanton and 'Armançon, Brienon-sur-Armançon enjoys an advanced road network which is vulnerable to illegal activities. To make the city safer, the local government, with far less than sufficient police force at hand, chose to secure its city and residents with Dahua Safe City Solution. There were two main pressing issues that needed to be addressed. Firstly, the city had far less than insufficient police force, only one policeman was supposed to look after the whole 3,300 dwellers. Secondly, Brienon-sur-Armançon had not prepared itself with necessary cables needed for modern surveillance systems, requiring the Dahua Team to design a tailored solution according to the unique local environment and limited human resources of this city. Wireless transmission device This solution aids them in obtaining video recordings that can be used as evidence in case of an incident To make up for the shortage of police force and network cables, Dahua Technology delivered a customized solution covering the whole city with various kinds of video surveillance devices. These equipment are linked by a wireless device combining PTZ camera and antenna that transmits all the collected information to the highest point in the city center. These data are then transmitted to the control center, making it easy for the police to achieve round-the-clock monitoring. To monitor major sections of the city, an array of modern devices were utilised including Starlight IR PTZ AI Network Camera, Multi-Sensor Panoramic Camera, Eyeball Camera, Thermal Camera, ANPR Camera, Wireless transmission device, keyboard, etc. From the control center in the police station, the police can check real-time situation and decide whether to take action. This solution also aids them in obtaining video recordings that can be used as evidence in case of an incident. Vehicles trigger detection In addition, the combined strength of the Dahua general camera and PTZ camera created a smart capture mechanism for the police. General cameras were installed to monitor fixed scenes, once human or vehicles trigger detection rules set by the operator (like tripwire and intrusion), the PTZ camera will automatically zoom-in and start tracking. For low-light applications, the Dahua Starlight Technology of the PTZ camera also offers outstanding light sensitivity, capturing color details even under ultra-low light condition. Moreover, ANPR Cameras were deployed for road safety enforcement on main roads. Embedded with License Plate Recognition (LPR) algorithm, the cameras have the ability to detect and recognize moving vehicle's plate number within low speed. Furthermore, installing Thermal Cameras took care of the job of monitoring the BBQ sites in the park with their built-in fire detection functionality that can detect fires even at long range distance. Effectively monitor major areas The police has solved a cemetery theft case with evidence recorded by the Dahua PTZ cameraWireless transmission device made it possible for all cameras in all locations to connect to the control center without the cost and trouble of wiring. NKB 5000 HD Network Control Keyboard was installed in the control center to help the police achieve split screen operation of both general and PTZ cameras. Some Seagate hard disks were also used to store recorded videos for future use. The Brienon-sur-Armançon police can now sit remotely in the control room and operate in an efficient way with the help of Dahua Safe City Solution, which allows them to effectively monitor major areas in the city and respond in time when an incident takes place. Dahua PTZ camera The recorded videos also serve as crucial evidence and help the police to crack a case with much less effort. In the first week of the test run of this smart system, the police has already solved a cemetery theft case with evidence recorded by the Dahua PTZ camera. “The origin of our cooperation with Dahua dates back to the visit to China a year ago. This visit to the Dahua headquarters in Hangzhou concluded with a reciprocal commitment – to equip the city of Brienon with video surveillance. We welcomed this agreement, which allowed the installation of the system and improved the daily life of our residents.” said Mr. Jean-Claude M.CARRA, Mayor of Brienon-sur-Armançon.
HID Global, globally renowned provider of trusted identity solutions, has announced that the government of Argentina has selected its HID goID citizen identity technology to power the country’s digital version of its mandatory National Identity Document for its Mi Argentina app. The collaborative effort between HID, Argentina’s Ministry of Interior, Public Works and Housing through the National Registry of Persons (Renaper), and the Ministry of Modernization makes Argentina the first country in the world to offer a true national identity credential within a mobile app to its citizens. Currently, there are 47 million DNI cards in circulation and recent legislation has accorded full legal equivalence to the smartphone version of the card. Mi Argentina app The Mi Argentina app, which houses the National Identity Document, was developed by the Ministry of Modernization and allows citizens who download the app on their mobile devices to request appointments, receive health information and access credentials, such as their drivers’ license. Powered by HID goID technology, citizens can also access their National Identity Document on a mobile device on the app while offline. The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens" “The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens,” said José D’Amico, director of Renaper, adding “This innovative application is not only easy to get, but we also believe this could be the first step in digitiszng identity across the government in Argentina and potentially other countries in years to come.” Enhanced security of citizens’ mobile identity Citizens with the ‘Mi Argentina’ app can initiate their request for a mobile ID by visiting a Renaper office, where their identity is verified and authenticated. Once approved, they receive an email with a code to activate their National Identity Document. In the event a smartphone is lost or stolen, credentials can be immediately revoked, safeguarding the citizen from potential identity theft. The mobile ID is securely stored on the citizen’s smartphone, meaning it can still be accessed if the cell phone has no data plan or when connection to a network or Wi-Fi is not available. Storage on the phone brings additional security for the mobile ID ecosystem, as a channel back to the central database is never required. Superior identity solutions Renaper issues all citizens a National Identity Document at birth and requires two mandatory renewals: between the ages of 5 and 8, and at the age of 14. Adults are required to renew it every 15 years. Argentina’s implementation of our technology provides its citizens with innovative ID access" “HID Global is committed to providing identity solutions that meet the evolving standards of the 21st century,” said Jessica Westerouen van Meeteren, VP & Managing Director, Citizen Identity with HID Global. “The government of Argentina’s implementation of our technology provides its citizens with innovative ID access and the ease of a completely mobile experience from registration to issuance.” Enhancing Border Security The government of Argentina previously partnered with HID to upgrade the country’s ICAO electronic passport to a newer generation that was more cost efficient, improved security and enhanced data reading at border control checkpoints. The successful partnership was a key factor in the government’s decision to collaborate with HID Global and deploy the HID goID mobile identity solution. The HID goID technology mobile ID ecosystem powers a more secure and connected world based on field-proven identity technology. It enables the issuance, lifecycle management and verification of mobile identities, and is a customizable solution that delivers many more functions than physical identity documents.
Use of iTrak solution by casino operators in both Macau and Las Vegas for reporting, security and loss prevention expands Omnigo’s global footprint. Omnigo’s security system “One of the major benefits of penetrating a market like Macau with Omnigo’s security system is that casinos can draw from a shared database of banned patrons, advantaged players, and VIP guests from Day One of implementation,” said Mark Kornegay, CRO of Omnigo Software. He adds, “Sharing data across properties enhances security and surveillance for everyone by allowing casino operators to exchange critical information with each other and with law enforcement.” Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting iTrak security solution Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting and data analysis. Casinos can function more efficiently using iTrak thanks to its simplified reporting and notification process. The system also empowers casino employees to leverage data-driven security intelligence to address incidents in real-time, track persons of interest and mitigate risk and exposure to liability. Various modules within iTrak include Facial Recognition, Visitor Management, Lost and Found and more. Security and risk management system In addition to the Macau expansion, Omnigo’s casino portfolio also includes 100% of the Las Vegas Strip casinos and 65% of the Canadian gaming market. Each casino uses iTrak, Omnigo’s security and risk management system for incident reporting, property surveillance and security and loss prevention. “It’s a true testimony that these casino operators have put their full confidence into Omnigo’s offerings to keep their properties safe. With that level of trust, we’re able to prioritize innovation and bring the latest technology like facial recognition software and advanced data analytics to market faster for our customers, both large and small,” Kornegay added.
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyzer, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analyzing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Idesco devised a transparent reader to simplify Infobric’s construction site system management, making it powerfully adaptable to widely different market needs and technology standards. For a while, construction sites have provided a textbook example of how much electronic access control systems can benefit managers. Controlling access to a site, including restricted zones, machinery access (such as lifts and elevators), increases both security and safety, while also helping track authorized personnel and even equipment utilization. Ensuring regulatory compliance Infobric Ease possesses a wide range of functionality, from site access to energy control and much more An automatic, electric system, with that much functionality combined in a single service meets a high-value need in the construction industry. Today, Infobric provides a cloud-based digital platform, Infobric Ease, to help construction site managers monitor and secure key elements, such as site safety, while increasing worker productivity and ensuring regulatory compliance. Infobric Ease possesses a wide range of functionality, from site access to energy control and much more. In addition to simplifying site management and boosting worker productivity, it simplifies sites’ compliance with staff ledger regulation across a number of European countries. Worker productivity has been enhanced by the elimination of queues to register new staff on site and attendance. Lastly, controlled access increases worker safety while reducing theft and vandalism. Simplifying worker attendance monitoring Cloud management contributes even more to time and labor cost savings while also letting site owners conveniently fulfill their law-mandated employer obligations. To prevent tax avoidance and illegal workers, some European countries require construction site managers to upload the employee data registered in their staff ledgers – which Infobric Ease also provides, thereby also simplifying worker attendance monitoring. In short, the digital tracking of all this data saves significant time and money. The RFID industry commonly labels this type of reader ‘transparent’, because it seamlessly transmits transponder data Infobric integrated Idesco’s 9 CD 2.0 Slim Pin T reader into Infobric Ease as its vital front-end interface with construction workers. The RFID industry commonly labels this type of reader ‘transparent’, because it seamlessly transmits transponder data – fully-encrypted to ANSSI Level 1 Architecture specification – directly to a system, without any mediating keys. This lets systems themselves directly control all aspects of transactions – including data collection and reader response – resulting in both a highly secure and a cost-effective solution. Several identification card standards For integrators like Infobric, 9 CD 2.0 Slim Pin T’s direct, ‘transparent’, interaction between transponder and system not only simplifies transactions. It also lets them use more of the available features in the chips in workers’ transponders. This further benefits site owners and security managers because system updates can be implemented with greater agility and cost savings. “There are several identification card standards we adapt our products and systems to work with. So, we really wanted a card reader we could use in all our markets, without needing different hardware updates after a system upgrade or launching a new functionality across our different markets. The ‘transparent’ reader from Idesco turned out to be the perfect solution”, says Björn Hilliges, IT & Electronics Director at Infobric. Product design and expertise Every month, the Infobric Ease system handles approx. 11,000,000 card readings" “Infobric and Idesco have been co-operating for more than 10 years and through several product development projects. Over the years, Idesco repeatedly demonstrated their excellent quality in both product design and expertise, always providing us with products and solutions that reliably withstood very rough, inclement conditions amid frequent use at our customers’ construction sites,” says Björn Hilliges, IT & Electronics Director at Infobric. “Every month, the Infobric Ease system handles approx. 11,000,000 card readings. So, Idesco is a key partner for Infobric, and each day their readers fill a vital role at approx. 15,000 construction sites,” says Björn Hilliges, IT & Electronics Director at Infobric. Convenient regulatory compliance Infobric ease benefits for construction sites Convenient regulatory compliance on staff ledger registration in numerous European countries Increased productivity by reducing administrative tasks Time savings from agile system updating (despite differing card standards in different markets) because reader updates are no longer needed Enhanced reader functionality for workers with included keypads Reliability of Scandinavian-designed readers that are robust, weather-proof, maintenance-free Sites can now substantively help prevent undocumented labor and unprofessional contractors Infobric Ease features: Cloud-mediated service Seamless data collection Energy control Regulatory-compliant staff ledger Automated electronic access Mobile attendance & access Staff access control Vehicle access control Machine control Smart locks Making construction sites safer Infobric designs systems that make construction sites safer, more productive and reduce costs. Infobric’s solutions ensure the right people are in the right place at the right time at the site. Infobric provides with the best-working solution for the worksite, for both work hours and after, in packages that have been serving successfully on European construction sites large and small. Their goal is to become the digitization partner for the construction industry in the Nordics. With 30 years of experience, RFID technology pioneer Idesco Oy makes RFID readers, transponders, controllers and touch screen devices. Every day, for customers around the world, their devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory systems.
Round table discussion
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: Which security markets are likely to embrace the cloud?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?