Electronic security systems
Auth0, the modern identity platform solutions provider, has announced the Auth0 identity operating system (identity OS), a cloud-native and adaptable platform for development teams. Auth0 identity OS Built with extensible building blocks, the Auth0 identity OS enables organizations to manage the complexities of modern identity management, while also prioritizing the security, privacy and convenience of their end users. Striking the perfect balance among these priorities requires identity to i...
Alcatraz AI and Netronix Integration have announced a strategic partnership to expand their access control solutions to security business users. The two companies are partnering to deliver Alcatraz’s industry-renowned facial authentication solutions, through Netronix Integration’s global network and customer base. Alcatraz AI and Netronix partnership The new, innovative partnership leverages the respective technology and leadership strengths of Alcatraz AI and Netronix Integration...
Gozio Health, an industry-renowned, customizable end-to-end mobile platform, and CriticalArc, creators of SafeZone, the unified safety, security and emergency management solution, have announced a partnership that enables hospitals and health systems to enhance security and safety, by adding CriticalArc’s SafeZone to Gozio’s location-based services platform. SafeZone - Gozio integration Nearly 75% of workplace assaults occur in a healthcare setting, according to the Bureau of Labor...
No matter if the speaker is 8 Ohm, 25 Volt, or 70 Volt – any option works with the new PSA-IP analog to IP speaker adapter. “The PSA-IP adapter will be the go-to for customers looking for a cost-effective way to convert their existing analog paging speakers to SIP/multicast speakers,” said Greg Yocom, Engineering Manager, Viking Electronics. Key features The PSA-IP features a high-efficiency 6 Watt class D amplifier. This allows a single PSA-IP to power up to six paging spea...
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors announced the resumption of on-site entry evaluations, a building or campus analysis that aids security managers in creating a defensible physical security entrance strategy against the costly liabilities associated with tailgating and piggybacking. These evaluations have proven to be critical to the success of entrance projects. During the COVID pandemic, to support community health and safe...
Suprema, a global pioneer in access control, biometrics, and time & attendance solutions, announced the new product launch of the X-Station 2, a versatile intelligent terminal with credential options of cellphone access, QR, and barcodes as well as RFID cards and PIN. Multiple credential options X-Station 2 enables flexible access control system design by supporting multiple credential options. The terminal is compatible with most types of existing RFID cards including EM, MIFARE, iCLASS,...
Aqua Security, the pure-play cloud native security solutions company, has published new research from Team Nautilus revealing that a significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services. According to the new findings from Aqua Security’s ‘2021 Cloud Security Report: Cloud Configuration Risks Exposed’, these misconfigurations, for example leaving bucket or blog storage open, can open companies up to critical security breaches. 2021 Cloud Security Report When you consider that a single cloud misconfiguration can expose organizations to severe cyber risk" Reflecting the overwhelming amount of configurations that practitioners must address, even when companies are aware of errors, most have not addressed the bulk of these issues in a timely manner. Especially larger enterprises, as they take an average of 88 days to address issues after discovery. “When you consider that a single cloud misconfiguration can expose organizations to severe cyber risk, such as data breaches, resource hijacking and denial of service (DoS) attacks, the consequences of failing to address misconfiguration issues are all too real to ignore,” said Assaf Morag, Lead Data Analyst with Aqua Security’s Team Nautilus. Aqua Security’s research methodology & findings Over a period of 12 months, Aqua Security’s research team analyzed anonymized cloud infrastructure data from hundreds of organizations. Users were divided into two groups, based on the volume of cloud resources that they scanned - SMB (small and midsize business), who scanned between one and several hundred resources, and enterprise users, who scanned from several hundred up to a few hundred thousand distinct resources. The research findings point to important security gaps including: Less than 1% of enterprise organizations fixed all detected issues, while less than 8% of SMBs fixed all detected issues. More than 50% of all organizations receive alerts about misconfigured services, with all ports open to the world, but only 68% of these issues were fixed, taking 24 days on average. Over 40% of users had at least one misconfigured Docker API, taking an average of 60 days to remediate. Security posture issues across IaaS and PaaS accounts These findings point to numerous security posture issues across Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) accounts, which suggest both a lack of understanding, as well as an overwhelming number of issues requiring attention. Cloud-native applications improve agility by giving more people access to define the environment" “Cloud-native applications improve agility by giving more people access to define the environment, but we see many organizations move away from a centralized approach to security,” said Morag, adding “The traditional model of permitting only a small, highly skilled team of security practitioners to make all configuration changes has given way to a modern, decentralized approach. Development teams are making configuration decisions or applying services, and that can have dramatic implications for the security posture of an organization’s production environment.” Causes of cloud-setting misconfigurations The Aqua report examines the mistakes that lead to five common types of cloud-setting misconfigurations - storage (bucket/blob) misconfigurations, identity and access management (IAM) misconfigurations, data encryption issues, exploitable services behind open ports, and container technology exploitation. The Aqua 2021 Security Report also provides recommendations on the best practices and policies that organizations can implement immediately, in order to mitigate the risk of cloud misconfigurations, including: Instituting a formal remediation process to prioritize issues. Treating all API issues as critical, as adversaries actively scanning for exposed API ports. Applying various IAM controls to establish layers of access control, such as multi-factor authentication (MFA) and identity federation. Proactively fixing cloud misconfiguration issues “Whether an organization adopts a single or multi-cloud environment, it must be proactive in monitoring for and fixing service configuration issues that can unnecessarily expose it to threats,” said Ehud Amiri, Senior Director of Product Management at Aqua Security. Ehud Amiri adds, “Failure to do so will inevitably result in damage that can be much greater than the traditional OS or on-premises workloads.” Aqua Security’s '2021 Security Report: Assessing Cloud Infrastructure Risks' is available now.
Traffic management takes many forms. Traffic management can involve closing a roadway during a major city event such as a motion picture awards show or traffic management can simply entail a traffic arm that raises and lowers after a fee has been paid in a parking garage. Traffic management can include directing traffic in one direction during peak hours or closing a facility to vehicle traffic after hours. It can also prevent wrong-way entry or ensuring vehicles cannot encroach on pedestrian areas. Barriers for security In most cases, it is quite easy to breach the entrance to the parking lot. Once entered, the vehicle can pick up speed to crash through one of the gates or entrances to get within the stadium itself. To provide increased security, Delta Scientific DSC501 barriers are used at the Mercedes Benz Stadium in Atlanta at main entrances where players and VIPs, among others, enter with their cars. K54 certification The DSC501 protects against a “second hit” risk from a second vehicle The DSC501 is the only K54-certified retractable vehicle barricade in the world. Set in a foundation only 18 inches deep, it will survive and operate after a 5.4-million foot-pound impact. That’s equivalent to a 65,000-pound truck hitting it at 50 mph. Stopping the truck or car dead in its tracks, the DSC501 protects against a “second hit” risk from a second vehicle. Deployable vehicle crash barriers In another example, on May 22, 2020, an armed assailant attempted to drive through entryway gates at the Naval Air Station-Corpus Christi. The suspect was stopped almost instantaneously. A wounded sailor, a security team member, managed to raise a barricade despite her injuries. The shooter, the would-be trespasser, died in the incident, which could have been made much worse had the station not taken appropriate measures to keep intruders at bay. At this location, the totally self-contained Delta Scientific MP5000 mobile deployable vehicle crash barriers guarding that base carries an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). The barricade tows into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. To remove, procedures are reversed and the barriers are towed away. Traffic control devices With so many traffic management scenarios, it is no wonder that Delta Scientific manufacturer’s more than fifty types of barriers and traffic control devices. Delta can assist any facility in controlling the flow of traffic through devices such as traffic arms, lights, spike teeth or even crash tested vehicle barricades.
Could the data that the access control system generates reveal priceless business insights? In many businesses, the answer is affirmative. The problem is how to analyze that data quickly and accurately to bring valuable, digestible business benefits. As reported by the Houston Chronicle, ‘Data is at the core of nearly every business decision made. A new Reporting & Analytics Tool for CLIQ access control systems enables security and facility managers to extract, visualize and analyze the data from their own premises. CLIQ wireless access control system ASSA ABLOY’s CLIQ is a wireless access control system based on programmable electronic and electromechanical keys, cylinders, and padlocks. The system can be managed securely from anywhere with an internet connection via the CLIQ Web Manager (CWM). The CWM’s new tool makes all system data easy to understand and to export, and share with staff and stakeholders across the business. If data really is the ‘new oil of the digital economy, this new tool helps CLIQ wireless access control customers tap it efficiently. CWM Reporting & Analytics Tool The new CWM Reporting & Analytics Tool streamlines decision-making, informing it with data drawn from the security system. It also frees security managers from their desk, with all of the tool’s data and functionality available inside the Amazon QuickSight app for Apple and Android systems. Any authorized person within the organization can access its valuable insights, from anywhere in the world. Visual dashboards for faster analysis A clear, visual layout helps managers to spot relevant data and any anomalies, at a glance This new tool helps an access control system to do more than just keep people and assets safe. Data that the system generates every day can contribute to business success. A clear, visual layout helps managers to spot relevant data and any anomalies, at a glance. A bespoke dashboard offers a rapid system overview, in order to help identify the most used keys, view heat and cold maps of lock usage, and spot keys whose access has been denied most often, for example. Granular, single lock, and key level Drilling down to a more granular, single lock or key level helps managers identify who is using which openings and when, and decide whether staff or contractors have the appropriate access rights. These tasks become simpler and even instant. At a glance, the tool helps security managers track a relevant business activity. They will spot critical patterns in weekly or monthly access use, so as to help plan maintenance schedules more efficiently, for example, among many more bespoke insights into what is happening on site. Access management integration with process software The new Reporting and Analytics Tool is available as a simple subscription add-on to new or current CWM users. CWM already enables a wide range of security workflows, including real-time access management. It can integrate access management with existing business process software to build a single interface, which controls everything. Now, its new Reporting & Analytics Tool can help businesses make smarter, better, data-informed decisions.
Allegion US, a globally renowned provider of security products and solutions, has announced that it has received federal government approval for its Schlage Multi-Technology (MT-485) Readers, when paired with the LenelS2 OnGuard version 7.6 access control system. Schlage MT Readers Schlage’s MT Readers simplify access control solutions by recognizing magnetic stripe, proximity, Schlage smart card and NFC-enabled smart devices with a firmware update, ensuring a seamless transition to high-security smart technology in the future. The readers are fully OSDP compliant, when ordered with RS-485 and have an open architecture platform, which is designed to work with industry standards and common access control system interfaces, fitting a variety of placement needs. LenelS2 OnGuard version 7.6 access control system LenelS2 OnGuard version 7.6 access control system offers rich feature and operability enhancements The LenelS2 OnGuard version 7.6 access control system offers rich feature and operability enhancements, while also extending its cloud compatibility, integration capability and convenience. LenelS2 is the first partner to complete certification for the Government Service Administration’s (GSA) Approved Product List (APL), with the OnGuard system paired with Allegion’s Schlage MT Readers. This integration allows for expanded access to key government clients. Easy-to-deploy, interoperable solution “As federal agencies are only permitted to procure qualified products and services listed on the GSA APL, we’re happy to be able to offer this integration that provides an easy-to-deploy, interoperable solution for government facilities,” said Terry Collins, Director of Government Sales at Allegion. Terry adds, “The integration is FIPS 201-2 compliant for easy procurement, with a quick-connect design for easy installation, OSDP for efficient software updates and meets the highest testing standards in place.” Security standards compliance Following rigorous government and third-party security vulnerability and interoperability testing for the Federal Identity, Credential and Access Management (FICAM) program, the integrated solution meets the commercial compliance, consistency and alignment requirements for the functional needs of the government ICAM implementer. The Schlage Mullion Reader and Single Gang Reader are now on the APL and have been authorized for use by the federal government. Federally approved integration “Our government clients demand the highest standards, which drives us to continually innovate with leading players like Allegion, to offer the very best in access control,” said Derek Greenland, Director of Federal Government Solutions at LenelS2. This federally approved integration is part of the next wave in Allegion's mission to work with major providers in the government sector, to spearhead smart lock and mobile access adoption, making seamless, all-encompassing security the new standard.
Last year marked another step in the slow discontinuation of CCD sensors. The biggest impact had the announcement of ‘End of Life’ status for large format KAI sensors from ON Semiconductor (originally from Kodak and later Truesense), including the 11 Mpix KAI-11002, 16 Mpix KAI-16000 or KAI-16070 and 29 Mpix KAI-29052. XIMEA was utilizing these sensors among others in the family of compact X-ray cameras called xiRAY. Next-gen scientific CMOS sensors To offer equivalent or even better substitutes, the XIMEA team started working on several replacement models. These cameras include the latest generation of scientific CMOS sensors for increased performance over CCDs in many categories. Fiber optic tapers and faceplates are bonded to these sensors to enable light transmission from the coupled scintillators and phosphors to the sensors in the camera. One important factor for choosing the right sensor is physical size complemented by high speed, but then integrated into a small package. Applications, such as x-ray computed tomography (CT) will greatly benefit from small size and high speed with large field of view, as will many non-destructive testing (NDT) applications. Gpixel sCMOS sensors One of the primary benefits that sCMOS and CMOS sensors hold over their CCD counterparts is speed This process started with the arrival of the most interesting scientific CMOS (sCMOS) sensors from Gpixel, in their GSENSE family. The XIMEA engineers chose to start with the models based on GSENSE5130, GSENSE6060 and GMAX4651, due to their speed, high resolution, and large physical size, plus scientific imaging attributes. One of the primary benefits that sCMOS and CMOS sensors hold over their CCD counterparts is speed, which is harnessed using fast interfaces, such as USB3, PCIe or Thunderbolt. High dynamic range, crystal clear 16-bit images are provided from these sensors, thanks to the combined high and low gain readout. Multiple imaging modes available Image output can also be adjusted, utilizing various imaging modes that are provided by the camera software, in order to optimize for single pixel full-well capacity and noise to maximize SNR. Long exposures are enabled by cooling the sensors with Peltier coolers, to again match or exceed the capability of CCD-based cameras. XIMEA constantly modifies existing models to better accommodate different applications and customers. Available options can include customizing the size or shape of the fiber optic faceplate or taper, utilizing different materials at the front of the camera for protection from high energy photons or particles (such as the tungsten copper alloy used in the example picture), or just utilizing the myriad ways that XIMEA has developed to connect via the interfaces already in use (ribbon cables, shielded cables, and fiber optics). To summarize, the models planned for introduction into XIMEA portfolio of X-ray cameras are developed with the following parameters: 15 Mpix, Gpixel GSENSE5130, X-ray camera, FOV 21.5 x 12.6 mm, 4.25 μm pixel, GadOx:Eu 10 μm thick, 17 Fps with USB3 15 Mpix, Gpixel GSENSE5130, X-ray camera, FOV 43 x 25.2 mm, 4.25 μm pixel, with Taper and GadOx:Eu 10 μm thick, 17 Fps with USB3 7 Mpix, Gpixel GSENSE6060, X-ray camera, FOV 61.4 x 61.4 mm, 10 μm pixel, GadOx:Eu, 46 Fps with PCIe and Air or Water cooling 51 Mpix, Gpixel GMAX4651, X-ray camera, FOV 38.75 x 27.75 mm, 4.6 μm pixel, GadOx:Eu 22 μm thick, 30 Fps with PCIe 51 Mpix, Gpixel GMAX4651, X-ray camera, FOV 70.5 x 50.4 mm, 8.5 μm pixel, with Taper GadOx:Eu 35 μm thick, 30 Fps with PCIe High speed and large sensors High speed and resolution, large sensors and pixels, low light sensitivity and 16 bit image quality, plus overall small size make these cameras ideal for micro CT and many other scientific x-ray applications. With a plethora of variations, it is important to understand the exact requirements of the specific customer and setup of the application.
Fugue, the company helping organizations innovate faster and more securely in the cloud, announced support for AWS CloudFormation in Regula, the open-source infrastructure as code (IaC) policy engine. Cloud engineering and security teams can now use Regula to secure their AWS CloudFormation and Terraform configurations before deployment and apply those same rules to running cloud environments using the Fugue platform to secure the entire cloud development lifecycle. Expanding Regula capabilities represents Fugue’s continued leadership in innovating on the policy as code for IaC and running cloud infrastructure since 2015. Ideal for multi-cloud environments Regula is ideal for organizations with DevOps teams that use both AWS CloudFormation and Terraform and those operating multi-cloud environments. Regula is the only AWS CloudFormation security tool that can address vulnerabilities involving multiple resources, and the only one that helps teams meet the CIS AWS Foundations Benchmarks 1.2.0 and 1.3.0. Regula easily integrates into CI/CD pipelines and enables pre-commit IaC checks and provides pull request feedback Regula easily integrates into CI/CD pipelines and enables pre-commit IaC checks and provides pull request feedback. Fugue provides examples of Regula working with GitHub Actions for CI/CD. Code security requirements “At Cadwell, we needed an effective way to check our infrastructure as code to ensure our cloud infrastructure deployments are secure so we can move faster in the cloud with confidence,” said Sawyer Ward, Enterprise Support Specialist at Cadwell Industries, Inc. “Regula is ideal for our infrastructure as code security requirements, and the ability to apply those same rules to our cloud environment with Fugue means we can keep our infrastructure in continuous compliance and avoid the risks and overhead of maintaining multiple policy frameworks.” Independent working software While Regula works independently of Fugue, teams can use Fugue to apply the same Regula rules to assess the security posture of their running AWS, Azure, and Google Cloud cloud infrastructure environments, eliminating the investment and cloud risk associated with using and reconciling different policy frameworks for different stages of the cloud development lifecycle and different cloud platforms. Unified cloud policy framework Regula can be used across cloud platforms at every stage of the cloud development lifecycle “Companies operating at scale in the cloud need a policy as code framework that’s flexible, works with the leading infrastructure as code tools, and can be used across cloud platforms at every stage of the cloud development lifecycle,” said Josh Stella, co-founder, and CEO of Fugue. “By extending Regula support to AWS CloudFormation, cloud engineering and security teams now have a unified cloud policy framework that works with their tools and workflows, giving them the confidence to move faster in the cloud—without breaking the rules needed to keep cloud infrastructure secure and in compliance.” Rules are user-defined Regula’s rule library checks for a wide variety of cloud misconfiguration vulnerabilities, such as dangerously permissive AWS IAM policies and security group rules, S3 buckets without “block public access” options enabled, Lambda function policies allowing global access, VPCs with flow logs disabled, EBS volumes with encryption disabled, and untagged cloud resources. Regula supports user-defined rules using the Rego query language developed by the Open Policy Agent project and includes helper libraries that enable users to easily build their own rules that conform to enterprise policies. Fugue created and open-sourced Fregot, a tool that enables developers to easily evaluate Rego expressions, debug code, and test policies.
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.
The Annual Fraud Indicator estimates that fraud costs the United Kingdom approximately £190 billion every year. The private sector is hit the hardest and loses around £140 billion a year, while the public sector loses more than £40 billion, and individuals lose roughly £7 billion. The effects of fraud can be devastating on both individuals and organizations. Companies can suffer irreversible damage to reputation and be forced to close, and individuals can experience significant personal losses. Everyone should be aware of the risks and take steps to protect themselves against fraudulent activity. Fraud detection technology Fraud detection technology has advanced rapidly, over the years and made it easier for security professionals to detect and prevent fraud. Here are some of the key ways that Artificial Intelligence (AI) is revolutionising fraud detection - with insight from Tessema Tesfachew, the Head of Product at Avora. An anomaly can be described as a behavior that deviates from the expected An anomaly can be described as a behavior that deviates from the expected. According to Tessema Tesfachew, “Autonomous monitoring and anomaly detection specifically, have made detecting fraudulent activity faster and more accurate. Machines can monitor data 24/7 as it comes in, build patterns of behavior that take into account seasonality and shifting trends, and identify events that don’t fit the norm.” For example, banks can use AI software to gain an overview of a customer’s spending habits online. Having this level of insight allows an anomaly detection system to determine whether a transaction is normal or not. Suspicious transactions can be flagged for further investigation and verified by the customer. If the transaction is not fraudulent, then the information can be put into the anomaly detection system to learn more about the customer’s spending behavior online. Accurate root cause analysis Root cause analysis goes one step further than anomaly detection, by allowing security professionals to pinpoint what caused the anomaly. Tessema explains how an example of this would be if a system detects that the rate of fraudulent transactions has increased. Root cause analysis would pinpoint the specific ATM or point of sale, where this increase is occurring. Swift action can then be taken to prevent fraudulent activity at that location in the future. Fewer false positives As mentioned, false positives can occur if a fraud detection system identifies behavior that goes against the norm, for instance, if a customer makes a transaction in a new location. In many cases, customers are required to complete identity verification to prove that a transaction is not fraudulent. Digital customer identity verification can help brands build a strong and reputable image. That said, forcing users to complete identify certifications regularly can cause frustration and harm the customer experience. AI anomaly detection AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data AI anomaly detection is far more accurate and results in fewer false positives. Increasing the accuracy of anomaly detection helps companies improve customer relationships and build a strong reputation. This will have a positive impact on brand image and sales revenue. AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data. Machines are more efficient than even the most skilled fraud analysts and make fewer errors. This is why AI fraud detection software is the preferred option in larger organizations. Importance of fraud analysts However, fraud analysts still play an important role in fraud prevention. Using a combination of human intervention and AI is usually the most effective approach when it comes to fraud detection. According to pymnts.com, innovative organizations now use a variety of AI and supervised and unsupervised machine learning to identify and protect against fraud. AI systems can complete time-consuming and repetitive tasks, such as data collection and analysis. This means that fraud analysts can focus their time and attention on critical tasks that require human intervention, e.g. monitoring risk scores. AI can automate processes and enhance the quality of the fraud analysts’ work. Conclusion In to Tessema Tesfachew’s opinion, “Fraud detection has become vastly more efficient and effective with the introduction of Artificial Intelligence (AI). Previously, methods for detecting fraudulent activities were still data-rich, but relied more on human intervention and expert bias, and were thus, more time consuming and prone to error.” AI technology, particular anomaly detection, has streamlined fraud detection and created a more efficient, and accurate system for detecting and preventing fraud. Covid-19 has increased the number of online transactions, which creates more opportunities for fraudulent activity. However, it also allows businesses to gain more information on their customers and enhance the capabilities of AI security software. It is more important than ever for organizations to utilize AI technology in fraud detection strategies.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
Imagine a world where video cameras are not just watching and reporting for security, but have an even wider positive impact on our lives. Imagine that cameras control street and building lights, as people come and go, that traffic jams are predicted and vehicles are automatically rerouted, and more tills are opened, just before a queue starts to form. Cameras with AI capabilities Cameras in stores can show us how we might look in the latest outfit as we browse. That’s the vision from Panasonic about current and future uses for their cameras that provide artificial intelligence (AI) capabilities at the edge. Panasonic feels that these types of intelligent camera applications are also the basis for automation and introduction of Industry 4.0, in which processes are automated, monitored and controlled by AI-driven systems. 4K network security cameras The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications Panasonic’s 4K network security cameras have built-in AI capabilities suitable for this next generation of intelligent applications in business and society. The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications. The AI engine is directly embedded into the camera, thus reducing costs and Panasonic’s image quality ensures the accuracy of the analytics outcome. FacePRO facial recognition technology Panasonic began advancing AI technology on the server side with FacePRO, the in-house facial recognition application, which uses AI deep learning capabilities. Moving ahead, they transitioned their knowledge of AI from the server side to the edge, introducing i-PRO security cameras with built-in AI capabilities last summer, alongside their own in-house analytics. Moreover, in line with the Panasonic approach to focus more on collaboration with specialist AI software developers, a partnership with Italian software company, A.I. Tech followed in September, with a range of intelligent applications, partially based on deep learning. Additional collaborations are already in place with more than 10 other developers, across the European Union, working on more future applications. i-PRO AI-capable security cameras Open systems are an important part of Panasonic’s current approach. The company’s i-PRO AI-capable cameras are an open platform and designed for third-party application development, therefore, applications can be built or tailored to the needs of an individual customer. Panasonic use to be a company that developed everything in-house, including all the analytics and applications. “However, now we have turned around our strategy by making our i-PRO security cameras open to integrate applications and analytics from third-party companies,” says Gerard Figols, Head of Security Solutions at Panasonic Business Europe. Flexible and adapting to specific customer needs This new approach allows the company to be more flexible and adaptable to customers’ needs. “At the same time, we can be quicker and much more tailored to the market trend,” said Gerard Figols. He adds, “For example, in the retail space, enabling retailers to enhance the customer experience, in smart cities for traffic monitoring and smart parking, and by event organizers and transport hubs to monitor and ensure safety.” Edge-based analytics offer multiple benefits over server-based systems Edge-based analytics Edge-based analytics offer multiple benefits over server-based systems. On one hand, there are monetary benefits - a cost reduction results from the decreased amount of more powerful hardware required on the server side to process the data, on top of reduction in the infrastructure costs, as not all the full video stream needs to be sent for analysis, we can work solely with the metadata. On the other hand, there are also advantages of flexibility, as well as reliability. Each camera can have its own individual analytic setup and in case of any issue on the communication or server side, the camera can keep running the analysis at the edge, thereby making sure the CCTV system is still fully operational. Most importantly, systems can keep the same high level of accuracy. Explosion of AI camera applications We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications" “We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications,” said Gerard Figols, adding “However, it doesn’t mean the hardware is not important anymore, as I believe it’s more important than ever. Working with poor picture quality or if the hardware is not reliable, and works 24/7, software cannot run or deliver the outcome it has been designed for.” As hardware specialists, Figols believes that Panasonic seeks to focus on what they do best - Building long-lasting, open network cameras, which are capable of capturing the highest quality images that are required for the latest AI applications, while software developers can concentrate on bringing specialist applications to the market. Same as for smartphones, AI applications will proliferate based on market demand and succeed or fail, based on the value that they deliver. Facial recognition, privacy protection and cross line technologies Panasonic has been in the forefront in developing essential AI applications for CCTV, such as facial recognition, privacy protection and cross line. However, with the market developing so rapidly and the potential applications of AI-driven camera systems being so varied and widespread, Panasonic quickly realized that the future of their network cameras was going to be in open systems, which allow specialist developers and their customers to use their sector expertise to develop their own applications for specific vertical market applications, while using i-PRO hardware. Metadata for detection and recognition Regarding privacy, consider that the use of AI in cameras is about generating metadata for the detection and recognition of patterns, rather than identifying individual identities. “However, there are legitimate privacy concerns, but I firmly believe that attitudes will change quickly when people see the incredible benefits that this technology can deliver,” said Gerard Figols, adding “I hope that we will be able to redefine our view of cameras and AI, not just as insurance, but as life advancing and enhancing.” i-PRO AI Privacy Guard One of the AI applications that Panasonic developed was i-PRO AI Privacy Guard Seeking to understand and appreciate privacy concerns, one of the AI applications that Panasonic developed was i-PRO AI Privacy Guard that generates data without capturing individual identities, following European privacy regulations that are among the strictest in the world. Gerard Fogils said, “The combination of artificial intelligence and the latest generation open camera technology will change the world’s perceptions from Big Brother to Big Benefits. New applications will emerge as the existing generation of cameras is updated to the new open and intelligent next generation devices, and the existing role of the security camera will also continue.” Future scope of AI and cameras He adds, “Not just relying on the security cameras for evidence when things have gone wrong, end users will increasingly be able to use AI and the cameras with much higher accuracy to prevent false alarms and in a proactive way to prevent incidents." Gerard Fogils concludes, “That could be monitoring and alerting when health and safety guidelines are being breached or spotting and flagging patterns of suspicious behavior before incidents occur.”
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
Consolidation continued in the physical security marketplace in the turbulent year 2020. There were several mega-deals in addition to shuffling among small and medium-sized companies. Here is a sampling of M&A from this year, compiled from our archive of company news. With the changing economic climate, how much more is ahead in 2021? Stay tuned. Wesco merges with Anixter WESCO International, Inc., a provider of business-to-business (B2B) distribution, logistics services and supply chain solutions, announced it completed its merger with Anixter International Inc., creating a premier, global B2B distribution and supply chain solutions company. Anixter becomes a wholly owned subsidiary of WESCO International. ACRE acquires Razberi ACRE acquired Razberi Technologies, Farmers Branch, Texas, and the product line of intelligent video appliances, automated security software and health monitoring software will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Motorola acquires IndigoVision Among the benefits is enhanced geographical reach across a wider customer base Motorola Solutions says the IndigoVision range of products, global presence and customer base are ‘highly complementary’ to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. Motorola acquires Pelco “Pelco’s track record of innovation, internationally recognized brand, global channel and customer installed base enable us to further expand our global footprint with enterprise and public safety customers,” said Greg Brown, Motorola Solutions’ Chairman and CEO, about the iconic brand. Johnson Controls swallows Qolsys Qolsys Inc., residential and commercial security and smart-home manufacturer, enhances Johnson Controls global innovation platform, delivering next generation security and smart building solutions. JCI had already owned a majority stake in the company since 2014. ADT and Google Home partnership The partnership will combine Nest’s award-winning hardware and services, powered by Google’s machine learning technology, with ADT’s installation, service and professional monitoring network to create a more helpful smart home and integrated experience for customers across the United States. Upon the closing of Google’s equity investment in ADT, Google will own 6.6% of ADT’s outstanding aggregate common equity. Securitas acquires STANLEY in Five Countries The acquisition is aligned with Securitas’ ambition to double the size of its security solutions Securitas acquired STANLEY Security’s electronic security businesses in Germany, Portugal, Switzerland, Singapore and India. The acquisition is aligned with Securitas’ ambition to double the size of its security solutions and electronic security business and expands Securitas’ electronic security footprint and capabilities. Allied Universal to Buy G4S Ending the year on a high note, the boards of directors managing Allied Universal and G4S reached an agreement on the terms of a recommended cash offer. The deal brings to a close a six-month bidding war for G4S. The combined business is expected to generate approximately $18 billion in annual revenues with a global workforce of more than 750,000 people in 85 countries. Quantum acquires Western Digital business line Quantum Corporation entered into an agreement with Western Digital Technologies, Inc., a subsidiary of Western Digital Corp., to acquire its ActiveScale object storage business. The acquisition demonstrates Quantum’s commitment to innovation and growth, extending the company’s leadership role in storing and managing video and unstructured data using a software-defined approach. AVA/Vaion/Jazz Networks Ava, a unified security company, announced the completion of the merger between Jazz Networks, renowned cyber security insider threat detection and response firm; and Vaion, an end-to-end video security solutions provider. Ava is now positioned to deliver unified cyber and physical security solutions to organizations worldwide.
An intelligent network of 20 Axis EN fire panels from fire and life safety systems manufacturer, Advanced, have been installed at HaDo Centrosa Garden in the heart of Ho Chi Minh City, Vietnam. HaDo Centrosa Garden is a 70,000 sq. m development of eight 30-story luxury residential towers and 115 townhouses, located in the heart of Vietnam’s Ho Chi Minh City. The upscale condominium complex’s facilities will include a swimming pool, tennis and basketball courts, fitness center, rooftop gardens, a park, school, library and commercial center. System with high-speed networking capabilities Vietsafe and KP Technology were confident in Axis EN’s ability to deliver the seamless networking needed A key requirement for this large-scale complex was a system with high-speed networking capabilities, to enable instantaneous sharing of communications between panels. To meet this need, fire protection companies Vietsafe and KP Technology chose 20 Advanced Axis EN fire alarm control panels, alongside 3,000 addressable devices, for installation in the eight residential towers. With many successful installations of Advanced products undertaken by both companies, Vietsafe and KP Technology were confident in Axis EN’s ability to deliver the seamless networking needed, while its ease of installation, testing, commissioning and operation would ensure minimal issues once the panels were on site. Axis EN fire alarm control panels installed Le Manh Dung, Director of Vietsafe, said “An Axis EN fire system was the clear choice for a project of this nature. Advanced is well respected in the fire industry, and its solutions are straightforward in terms of installation and operation, thanks to features such as built-in isolators for sequence addressing, which considerably reduces installation time.” Axis EN is EN54 parts 2, 4 and 13 approved and its panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop networks of up to 200 nodes covering huge areas. Advanced’s reputation for ease of installation and configuration, as well as its wide peripheral range make its products customizable to almost any application. False alarm management and reduction Pham Thanh Phong, Director of KP Technology, said “As a key partner to KP Technology, Advanced is a fire system supplier we can trust, to deliver high-performing, high-quality solutions that are easy to install and to use. Features such as Axis EN’s false alarm management and reduction capabilities are extremely useful in high-rise residential sites, such as HaDo Centrosa Garden.” Pham Thanh Phong adds, “Repeated false alarms are not only intrusive, they can also lead to complacency and delayed reactions to real fire alarms. Having the ability to refine and configure protection so specifically, and according to the requirements of specific areas within a building, helps to keep unwanted alarms to a minimum and reduces disruption and risk for residents.” AlarmCalm software and MxPro 5 fire system AlarmCalm software comes as standard with any Axis EN and MxPro 5 fire system AlarmCalm software comes as standard with any Axis EN and MxPro 5 fire system, taking advantage of Advanced’s high-speed robust panels and networks to offer a best-in-class solution for managing verification and investigation delays to outputs. It allows the false alarm management strategy for a site to be refined precisely and to take account of occupants’ needs and area usage. It also includes the optional AlarmCalm button, a loop device that allows residents or trained staff to indicate whether they believe a signal in their area is due to a false alarm. Axis EN fire system Tin Le Than, Advanced’s Sales and Business Development Manager for South East Asia, said “As a modern, vibrant complex for thousands of people living and working in the center of Ho Chi Minh, the fire protection for the HaDo Centrosa Garden development is a key priority.” Tin Le Than adds, “As an industry-renowned solution, the Axis EN fire system will deliver complete peace of mind to the building owners and residents of the complex. I am pleased to have been able to support our fantastic partners at Vietsafe and KP Technology with the equipment needed to fulfill their requirements.” Global projects Advanced, owned by FTSE 100 Company, Halma PLC, protects a wide range of sites across South East Asia including the Hong Kong-Zhuhai-Macau Bridge, University of Macau and Hong Kong Central Library. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
Two renowned systems integrators have improved their ability to more effectively specify and design advanced physical security systems, using the dedicated tool, AXIS Site Designer. AXIS Site Designer AXIS Site Designer is a unique and free web application from Axis Communications, a market renowned company in network video solutions, which makes the specification and design of complex security systems quicker and easier. Having recently deployed the solution, two of Axis partners, Southern Fire & Security Ltd. and Acctive Systems, have been able to evidence a more sophisticated process and have won clients as a result. Security devices and sensors As physical security technology continues to advance, in order to keep up with the ever-evolving threat landscape, coupled with more security devices and sensors being added to IT networks, the task of specifying such systems has become more complex. The principal challenges for those working in the industry are to be able to properly illustrate to buyers the capabilities of such devices and also to demonstrate how they can work together to secure a site. This web application holds the solution. Powerful and versatile design tool AXIS Site Designer revolutionizes the specification and design process AXIS Site Designer revolutionizes the specification and design process, by allowing an entire solution to be mapped out to the finest detail. The powerful and highly versatile tool removes any guesswork or element of trial and error, making it easy to create the right system to fit the exact operational requirements and needs of a prospect or client. The application even allows floor plans of the target site to be added, and virtual placement of cameras and devices enables viewing of the coverage they will provide, once installed. Partner with Southern Fire & Security and Acctive Systems Sean Mcnaboe, Axis Communications’ Key Account Manager, explains “The benefits of AXIS Site Designer are numerous. It helps streamline design workflow, simplify demos of security products and accessories, and even generate quotations and change items in a bill of materials within minutes.” Sean Mcnaboe adds, “Axis has been working closely with two partners, Southern Fire & Security and Acctive Systems, to help them drive their businesses forward while meeting, and often exceeding, the evolving requirements of customers.” Security and surveillance systems specification Southern Fire & Security has recently taken on the specification of security and surveillance systems for several high value properties around the London area, so being able to accurately specify dedicated solutions is critical to secure ongoing business. Acctive Systems, a renowned integrator of electronic security systems, needed a method of specifying security systems that would allow it to demonstrate an entire setup and its component parts via digital means. Efficient designing of surveillance systems AXIS Site Designer is an empowering leap forward in the design of surveillance systems Steve Wilson, Director at Southern Fire & Security, explains “Being able to make only basic recommendations around the use of appropriate technologies has been a key challenge for us. It’s very difficult to plan some of the more involved projects in detail, so we desperately needed a way to be able to visualize an entire estate and how a solution would operate.” AXIS Site Designer is an empowering leap forward in the design of surveillance systems, allowing for greater speed and efficiency, and enabling more effective management of any project. Enhancing customer satisfaction High quality designs and other outputs create a level of professionalism that is a major plus point when vying for business, ultimately improving customer satisfaction and pointing towards greater revenue prospects. Gerry Numa, the Chief Technical Officer (CTO) of Acctive Systems, said “AXIS Site Designer delivers everything we anticipated, and more, setting us ahead of our competitors when it comes to slick, professional looking project design. I would encourage other businesses to reach out to Axis to find out how the application can benefit them too.”
Adani Group is a multi-national conglomerate headquartered in Ahmedabad, Gujarat, India and has a diversified portfolio of businesses, including resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with Mundra being the country's largest commercial port. With multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders across 25+ business units. Managing staff attendance and diverse shifts Adani Group is widely engaged in multiple business units and ports with 50,000+ workers under 900+ contractors, employed at various locations. Maintaining and managing entire attendance, diverse shifts and leave policies for the various locations, and numerous workers at a central place was critical for them. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management. To provide approved and appropriate induction of each worker at a defined level, monitor the progress status of each work order and its segregation based on reports were quite challenging. Report generation to eliminate the fraudulent and erroneous payment of wages at contractors' end had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. COSEC Contract Workers Management COSEC Contract Workers Management offers centralized attendance management solution for various branches After comprehensive discussion regarding problems and requirements, Matrix offered COSEC Contract Workers Management solution for their 50,000+ workers, who have been employed under 900+ contractors, spread across four locations in India. COSEC Contract Workers Management offers centralized attendance management solution for various branches, spread across multiple locations, which automates all processes, right from recording entries and exits up to processing salaries. Enrolment of the worker credentials COSEC Contract Workers Management facilitates enrolment of the worker credentials, along with a photograph, documents, and induction details. It helps contractors to manage workers efficiently, using contractors' self-service portal. The solution provides multiple connectivity possibilities via Ethernet, Wi-Fi and mobile broadband. It eases the tracking of work order progress. It offers seamless integration with SAP using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations via email and SMS. Results: Enhanced security with effective worker's enrollment process abiding by various induction levels. Increase in productivity of admin by 20%. Easy decision making due to the generation of customized reports. Smooth and effective monitoring of work orders. Improved security with centralized control and monitoring - Reduced time spent by the security department. Error-free man hours' computation for quick & effective wages' calculation. Minimized manual interventions. Matrix products and solutions Offered: COSEC CENTRA LE - Application Software Platform expandable up to one million users. COSEC LE CWM - Contract Workers Management Module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF Card-based Door Controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare Card and NFC-based Door Controller. COSEC VEGA FAX - Fingerprint and RF Card-based Premium Door Controller with Touch Sense LCD, IP65, Wi-Fi, PoE. COSEC DOOR FOP - Fingerprint and RF Card-based Premium Door Controller with LCD and Keypad.
Marriott International Inc. is a hospitality company and the Gaylord Opryland Resort and Convention Center is a Marriott property in the world. Located in Nashville, Tennessee, Gaylord Opryland offers visitors the chance to experience Music City under a single roof. The resort has a hotel with over 3000 suites and rooms and a smaller adjacent hotel with more than 300. Risk assessment Ryman Hospitality, the organization that owns Gaylord Brand Hotels, decided to embark on a risk assessment of their properties in 2017. The third-party assessors discovered that CCTV systems were lacking in all of the hotels, including at the Gaylord Opryland Resort. According to Greg Pezzo, Gaylord Opryland Resort and Attractions’ Safety and Security Director, “The system consisted of old operating systems and cameras that didn’t all work. The security team could not get consistent playback from all of their cameras, and they were not able to store data for more than a few weeks at a time.” As a result of the risk assessment, ownership decided to invest in a complete upgrade of all its hotels and chose the Gaylord Opryland as its test case. Their strategy was to use Opryland as the model and then upgrade their other five Gaylord hotels following its success. Installation of multidirectional cameras Working with integrator Herring Technology, Ryman Hospitality designed a solution that features a new video management system (VMS) from Milestone Systems and 400 state-of-the-art cameras from Hanwha Techwin. The Resort purchased a variety of Hanwha cameras, including 145 XND-6010 full HD cameras with video analytics, 182 Q series indoor and outdoor dome cameras with IR, and more than 20 PNM 7000 and 9000 multi-directional cameras. Deciding where to place their cameras was a relatively simple process. Pezzo explains, “We added cameras where we had high volume, where we had experienced problems in the past, and where we didn’t previously have cameras at all.” They also looked at their own data relating to theft and other incidents to help determine camera location. High-quality imaging camera The surveillance system and the cameras are helping to protect the resort against liability from potential lawsuits According to Pezzo, one of the main functions of their upgraded system is protecting the resort against false claims. He states, “From a claims perspective, this surveillance system and, specifically, these cameras are helping to protect us against liability from potential lawsuits.” He explains, “Our older security camera images are grainy or black and white, which means we could not get the level of detail we needed. But, with Hanwha cameras, we are able to capture high-quality images in real-time that show us, for example, how a guest fell: whether there was an obstruction, water on the floor, an indentation, or whether the guest simply tripped.” The ability to protect the organization against potential lawsuits equates to significant ROI for the Resort. Easy to keep track of movement As a result of the upgrade, security is easily able to track persons of interest clearly as they move throughout the resort. Says Pezzo, “With 3000 rooms and a million square feet of property, the ability to see an individual this clearly as they move through our spaces is incredible. In the past, we would lose people in uncovered sections. They would just disappear. But that doesn’t happen anymore.” For the Gaylord Opryland Resort and Convention Center, the upgrade had an immediate impact. According to Pezzo, “On the first day after installing the new cameras, someone attempted a false claim, but we were easily able to prove that it was not our fault.” For 2021, the Resort plans to invest in more new cameras every few months as the budget becomes available.
March Networks, a global video surveillance and video-based business intelligence solutions provider, is pleased to announce that one of California’s busiest transportation authorities will standardize its entire bus fleet on the company’s RideSafe mobile solution. RideSafe solution The US$ 4 million contract will see more than 400 buses deployed with March Networks’ complete end-to-end RideSafe solution. The contract includes cloud-based monitoring of all of the transportation authority’s mobile cameras and recorders, a services contract providing annual and recurring revenue for March Networks for up to 7 years. RideSafe solution enables transit operators to maintain the highest security for passengers and employees, respond quickly to emergency situations, and resolve liability claims faster with integrated surveillance video and vehicle metadata. It also provides peace of mind with sophisticated monitoring through March Networks’ Insight Monitoring and Resolution Service. Insight Monitoring and Resolution Service With Insight, March Networks’ managed services professionals proactively monitor all video devices and troubleshoot issues remotely, saving customers’ time and money by eliminating unnecessary truck rolls. If a physical update is required, March Networks immediately dispatches a technician to conduct onsite repair services. All activity is logged online, giving customers a complete view of their network via a secure web browser. RideSafe GT Series Hybrid Transit NVRs Fully integrated with Insight is March Networks’ RideSafe GT Series Hybrid Transit NVRs Fully integrated with Insight is March Networks’ RideSafe GT Series Hybrid Transit NVRs (Network Video Recorders), the backbone of the RideSafe solution. The highly reliable, Linux-based recording platforms are purpose-built for transportation environments, with industry-recognized SAE J1455-standards and tamper-proof enclosures that protect against dust and moisture. They allow operators to quickly access live and recorded video and search for incidents based on vehicle information, such as GPS location, when managed by March Networks Command for Transit video management software (VMS). Mobile cameras deployed As true hybrid appliances, the NVRs support a mix of analog and IP cameras, allowing transportation agencies to migrate to IP video cost-effectively and at their own pace. The California transportation authority will also deploy March Networks’ ruggedized mobile cameras, including its new SE2 Fleet Dash Camera and SE2 Fleet Wedge Camera. Both cameras deliver 2MP resolution and feature industry-first LED flicker mitigation technology, which suppresses the strobing in the recorded video caused by LED light sources. Eliminating flicker in surveillance video ensures brake lights and other light sources are not mistaken for flicker and allows for more accurate post-incident investigations. Cloud-based monitoring solution “By offering the most reliable video surveillance technology and secure cloud-based monitoring services, March Networks is meeting the needs of transportation customers and rapidly growing the services side of our business,” said Net Payne, March Networks’ Chief Sales & Marketing Officer. Net Payne adds, “Almost 27 million people rely on this transportation authority’s buses each year. We are proud that our RideSafe solution was chosen to help safeguard this ridership.”
The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential, for both internal and external users. The museums needed a system that will be able to cope easily with changes, site extensions and two-site operation, and a solution that would remove the need to change all cylinders, when an employee loses a key. eCLIQ locking cylinders installed Now, the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders, across the two sites. ASSA ABLOY’s eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights, and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Designed for museum security Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact, and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers, along with their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. eCLIQ locking system Fitting eCLIQ locking system was a simple and wire-free task, and the museum staff, performed the installation themselves. One training session, with the admin software, was sufficient, to put them at ease with their new system. Looking after eCLIQ components is also easy, an integrated lubricant reservoir ensures cylinders, don’t require maintenance for up to 200,000 cycles. AES encryption, rapid processing, and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. Easy and effective access control “I am very happy with the eCLIQ solution,” said M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums, adding “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council, to show the effectiveness and simplicity of the eCLIQ solution.” Guyot adds, “Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
Round table discussion
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyze that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Electronic security systems: Manufacturers & Suppliers
- CyberLock Electronic security systems
- ACT Electronic security systems
- Alpro Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- HID Electronic security systems
- Morse Watchmans Electronic security systems
- CLIQ - ASSA ABLOY Electronic security systems
- SALTO Electronic security systems
- TDSi Electronic security systems
- Dahua Technology Electronic security systems
- Corbin Russwin Electronic security systems
- AMAG Electronic security systems
- EVVA Electronic security systems
- Baxall Electronic security systems
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload