“Organizations should never have to choose between protecting the privacy of individuals and their physical security,” said Pierre Racz, President of Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions. Putting these principles into practice, Genetec provides the necessary tools for security professionals to responsibly gather and manage data, particularly video while supporting compliance with privacy laws...
Digital Guardian, a globally renowned company in data loss prevention solutions, has announced it significantly enhanced its relationship with Amazon Web Services (AWS) through several key initiatives and achievements. Integration with Amazon Macie Digital Guardian has announced the general availability of their integration with Amazon Macie, a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and provide additional protection for...
HID Global, a front-runner in trusted identity solutions, announced it has been recognized as the overall top challenger and included in the market leadership category in the KuppingerCole’s Leadership Compass for Enterprise Authentication Solutions report. The analyst firm’s new report examines the product/service functionality and relative market share of 18 companies in this space as well as their innovative approaches to providing modern solutions. Serving consumers and enterpr...
The capabilities of miniature surveillance cameras are growing constantly - this is why for more than twelve years "the little ones" have also been among the most popular products made by the German manufacturer Dallmeier. With the new Dallmeier Picoline 5050 series, users in various industries can enjoy the benefits of a camera system which delivers 5 MP performance in an exceptionally compact format. Intelligent functions offer further added value. The cameras are available in in-ceiling moun...
Globally renowned IP video surveillance integrator, NW Security (NW Systems Group) has signed a partnership agreement with the major unified, intelligent security-as-a-service solutions provider, Arcules. Arcules VSaaS platform The Arcules Video Surveillance as a Service (VSaaS) platform provides organizations with an underlying cloud infrastructure, which offers features such as compatibility between sites, low video latency, data encryption, redundancy, streamlined maintenance, automatic fir...
Fugue, the company putting engineers in command of cloud security and compliance, announces new capabilities for bringing public cloud container resources into compliance and ensuring the continuous security of container runtime configurations. The new capabilities deliver security and compliance visibility and reporting for managed container services offered by Amazon Web Services and Microsoft Azure and turnkey support for the CIS Docker Benchmark. The new Fugue features provide continuous co...
Arrow Electronics has announced that the company has entered into an exclusive distribution agreement with global Artificial Intelligence (AI) security company, 8th Sensus Inc. in the United Kingdom & Ireland regions. As the first distributor for 8th Sensus Inc. in the countries, Arrow Electronics will offer its channel customers 8th Sensus Inc.’ next-gen identity access management software, EVE. EVE, identity access management software EVE identity access management software uses patented machine-learning software embedded in end-point agents EVE identity access control management software uses patented machine-learning software embedded in end-point agents to bond end point assets to authorized users. It gives customers the ability to completely remove passwords, pins, tokens, complicated hardware and recovery procedures by using a customer’s unique behaviors. Arrow Electronics adds 8th Sensus Inc. to its solutions portfolio that is designed to help businesses to work from home, grow faster, operate efficiently and transform in a dynamic market. End-point and data security “This agreement combines 8th Sensus Inc.’s innovative approach to next-generation identity access management with Arrow’s already strong portfolio and strength in the channel. EVE software offers value to our customers and will enable them to secure their end-point devices and protect the data on the screen at all times,” said Mark McHale, Vice President (Sales) of Arrow`s enterprise computing solutions business, North-West EMEA. Kevin McNamara, Chief Executive Officer (CEO) and Founder of 8th Sensus Inc. said, “This agreement enables Arrow and 8th Sensus Inc. to bring the benefits of next-generation Identity Access Management to businesses in the UK & Ireland. This technology is especially needed during the current unprecedented situation and will continue to be beneficial once we enter the new normality providing customers with innovative and trend-setting technology.”
Check Point® Software Technologies Ltd., a foremost provider of cyber-security solutions globally, has announced that it has been chosen by NHS National Services Scotland, the publicly funded healthcare service in Scotland to secure and streamline the management of its public cloud data, and provide complete threat prevention for vital public services such as Scotland’s Test & Protect and vaccine management services. About NHS Scotland NHS Scotland provides public health and social care services to the country’s population and has been transitioning healthcare data and services to Microsoft’s Azure public cloud for the past 18 months. The start of the COVID-19 pandemic highlighted the need for security that seamlessly expands on-demand to hyperscale capacity. NHS Scotland’s cloud infrastructure powers the country’s Test & Protect services, which has over a million users, as well as the Protect Scotland proximity app, so it was critical these services were completely secured against threats and attacks. Vaccination management The organization is also developing systems for scheduling and managing Covid-19 vaccinations in Scotland as the vaccines become available. “Check Point’s CloudGuard has been key in enabling us to add new cloud workloads and services without needing to constantly review or deploy new security infrastructure. This means we can focus on the critical public-facing tasks where we can add real value, such as developing and running Scotland’s ‘Test & Protect’ services,” said Deryck Mitchelson, Chief Information Security Officer, NHS Scotland. “Right now, we are building our vaccination management systems, and our cloud-first approach gives us the agility and scalability we need to roll it out nationally while being sure that data and services are secured.” Securing healthcare data and services As it runs multiple essential healthcare systems, NHS Scotland also needs to have full visibility of who is accessing data, where it is being shared, and how it is used to comply with GDPR and national data security legislation. To secure its healthcare data and services to the public cloud, NHS Scotland has implemented: CloudGuard IaaS which delivers the same advanced threat prevention and data security in public clouds as the organization’s on-premises security gateways, through the same management interface Check Point Maestro orchestration delivers the hyperscale features that NHS Scotland requires, enabling it to seamlessly expand the capacity of existing security gateways to meet growing demands Implementing Check Point solutions “Health data is probably Scotland’s most valuable asset, so it’s essential that it remains absolutely secure wherever it is being stored or accessed. We now have much more visibility than we had before we implemented the Check Point solutions,” added Mitchelson. “We can really understand where the data is and who is accessing it, from where, and ensure it is protected at every point of entry.” SIEM solution NHS Scotland also uses a Security information and event management (SIEM) solution. “One of the things I liked with Check Point is its integration with the SIEM vendor we’re working with,” said Mitchelson. “That means that we don’t have to go and actually start writing and creating configurations, it just links to the SIEM system and automatically starts to work, giving us the information, we need in a single console.”
Tavcom Training, one of the world’s pioneering provider of accredited security systems training courses and part of the Linx International Group, announced the addition of two one-day CCTV courses to its extensive online learning platform. The CCTV Control Room Refresher and CCTV Legislation courses are available now, with the option of accredited (BTEC) and non-accredited certificates, as well as CPD points available. The CCTV Control Room Refresher Course is essential for security practitioners that have completed the SIA training and want to keep up-to-date with the ever-changing issues affecting public space surveillance. Surveillance camera codes The course provides insight into the latest surveillance and patrolling techniques, new control room technology, incident and emergency handling, communications, ANPR, evidence sharing, as well as surveillance camera codes of practice and operational procedures, data protection, privacy and legislation. The CCTV Legislation course provides expert information and guidance surrounding data protection and privacy, including the GDPR and dealing with subject access requests, the freedom of information and human rights act, CCTV codes of practice, SIA regulations and licensing laws. The course also covers issues relating to the gathering of evidence, digital archiving and audit trails. Facial recognition technology Andrew Saywell, Business Development Manager for Tavcom Training says: “These two courses are ideal for every security practitioner involved in the use of CCTV. Not only is it important to keep pace with the application of the latest control room technology and surveillance techniques, it is essential to have an up-to-date working knowledge of what is and isn’t permissible from a legal perspective.” As the technology evolves, so to must the regulation and legislation" Andrew adds: “As the technology evolves, so to must the regulation and legislation. This was evident in the introduction of GDPR to govern data protection and, in his last month as Surveillance Camera Commissioner, Tony Porter, has shone a light on the governance surrounding the use of facial recognition technology.” Online learning platform The two courses are delivered through Tavcom Training’s bespoke online learning platform combine presentations, video and audio, to deliver an engaging, rewarding and productive learning experience. Each can be completed in one day, or at the learners own place, with online tutor support available. Learners can elect to have their training recognized with an accredited BTEC Level 2 Certificate for the CCTV Refresher course, and a BTEC Level 3 Certificate for the CCTV legislation course, or choose to receive the internationally recognized Tavcom Certificate if they choose to opt for the non-accredited route. CPD points are available to all learners on completion of the training. Courses cost £225+VAT accredited and £125 (excl.VAT) non-accredited. These courses can also be completed at Tavcom Training’s state-of-the-art training center in Bishop’s Waltham, Hampshire.
Hanwha Techwin, a supplier of IP and analog video surveillance solutions, announces their top five key trend predictions for the security industry in 2021. They include: AI moving to the edge, open platforms, cloud, cybersecurity and privacy. Improved AI algorithms Artificial Intelligence is moving to the edge - Increased computing power along with improved AI algorithms are driving the trend towards AI and machine learning to be run on IoT devices instead of expensive and resource hungry on-premises data servers. Next-generation security edge devices will be able to serve as sensors for detecting video data, radar, thermal imaging and more. Processing much of the data on the edge and sending refined data to the server will improve the efficiency of resources and reduce processing time. Hanwha expects that the edge will become an open platform to create a new ecosystem through partnerships, connected devices, functions and solutions to provide high scalability and availability that can meet customer demands in a timely manner. Core software infrastructure Hanwha Techwin aims to build a standardized and accessible framework along with the OSSA Open platforms enable customer-tailored solutions - Due to rapidly changing environments and swiftly shifting consumer demands, software development cannot remain a siloed process led by a single in-house development team. Instead, open platforms can support the collaborative development required to add new features based on user requirements and needs. Open APIs (Application Programming Interface) are enabling specialized analytics to be integrated into core software infrastructure, empowering users to collect, analyze and report on data for specific applications. In 2021, Hanwha Techwin aims to build a standardized and accessible framework along with the OSSA (Open Security & Safety Alliance) to offer more options to its customers that address specific regional market demands, and unique vertical market requirements. Managing security devices Cloud is a tool to grow business and gain insights - As edge devices become more ‘intelligent’, cloud technology is playing an increasingly crucial role in safely managing these devices, analyzing large amounts of data and deriving useful insights. The cloud is integral to quickly installing security patches, updating new features and managing and maintaining all edge devices as one. The need to integrate and manage data collected from different devices has been increasing. Hanwha Techwin plans to introduce a cloud solution that manages security devices and monitors real-time status, as well as a cloud solution that publishes reports and derives insights based on the results analyzed at each edge. Obtaining cybersecurity certification Cybersecurity continues to be a focus - In an environment where intelligent infrastructures such as smart cities, smart factories and smart retail are expanding and data is being secured at the edge level, the exposure to cyberattack is also increasing. Hanwha Techwin has aspired to establish a system that customers can trust Verifying trusted edge devices through mutual authentication at the point of data transmission to the server or while circulating the edge's open platform has become an essential feature. As an effort to go beyond the company's own security verification standards, Hanwha Techwin has aspired to establish a system that customers can trust by obtaining a cybersecurity certification from a reputable third-party certification authority. Protecting personal data Privacy protection - The protection of personal data should be at the foundation of the business ethics of any security organization. As privacy protection regulations are being introduced around the world such as the General Data Protection Regulation (GDPR) in Europe, and the California Consumer Privacy Act (CCPA), the video surveillance industry is increasingly adopting ‘privacy by design’ best practices and increasing its efforts to protect personal data from misuse and abuse. Organizations are increasingly aware of the dangers of private data breaches and are becoming more discerning when evaluating security products and solutions they can trust. By adopting privacy by design methodologies, manufacturers can ensure that security technology can be used to its fullest without compromising the privacy of personal data.
More than half of organizations (52%) consider phishing attacks or ID and credential theft as the top concern in Q3 2020, according to data released by Pulse Secure (acquired by Ivanti), the renowned provider of Zero Trust Secure Access solutions, and CyberRisk Alliance, a business intelligence company. Additionally, more than one-third of respondents (38%) across all regions experienced unauthorized or improper resource, application or data access, with North American organizations (39%) significantly more likely than Europeans (26%) to have encountered related data exfiltration, anomalous or malicious traffic. Proactive security allocation The Cybersecurity Resource Allocation and Efficacy (CRAE) Index, created by CyberRisk Alliance (CRA) and underwritten by Pulse Secure, is a quarterly, time-series tracker that measures the overall focus and direction of North American and European organizations’ cybersecurity activities, spending, and perceived progress over time. Scores above 50 indicate a spending or efficacy increase and scores below 50 show a spending or efficacy decrease. Compared to the previous quarter, overall resource allocation and spending on IT security rose Compared to the previous quarter, overall resource allocation and spending on IT security rose (66.5 in Q2 compared to 66.7 in Q3). In contrast, overall efficacy dropped (75.8 in Q2 compared to 74.2 in Q3), indicating that the increased expenditure did not result in a higher perception of improved security results. In North America, spending remained flat between Q2 and Q3 (66.5), but with a greater allocation towards reactive versus proactive security allocation. cybersecurity technology In contrast, the European CRAE Index showed an increase in quarterly spending and allocation (68.4 in Q3 compared to 66.5 in Q2) that focused on more proactive measures, with a similar reduction in efficacy (dipping to 74.4 Q3 from 74.9 Q2). The score was higher (by 1.9 points) for Europe than for North America, possibly propelled by organizations advancing the European Union’s General Data Protection Regulation (GDPR) safeguards. Healthcare experienced strong growth for cybersecurity resource and spending allocations globally Healthcare resource allocation and spending growth accelerated in Q3 by 5.8 points to an index score of 69.6 points. The expansion was driven by protection measures, which jumped 8.7 points to an index score of 75.2, including cybersecurity training and awareness programs, developing processes to secure digital and physical assets, and purchasing or implementing cybersecurity technology. IoT security issues In terms of cybersecurity challenges, phishing and identity/credential theft were most impactful Additionally, the “Protecting” Efficacy Index rose by 7.6 points to 80.6, mostly driven by related protection efficacy, where healthcare organizations shared increased confidence in the effectiveness of their resource and investment allocations since Q2. Healthcare industry respondents highlighted budgetary constraints, a trend continuing from Q2, as their primary challenge to combat rising threats and address elevated risks from untrained staff and employee carelessness with highly sensitive data. In terms of cybersecurity challenges over the last quarter, phishing and identity/credential theft were most impactful for healthcare respondents (54%), with external compliance and audit events (33%), and endpoint malware and IoT security issues (32%) rounding out the top three. Security efficacy response Financial services and insurance industries concentrated on recovery Financial services resource allocation and spending dipped to 67.4 from 68.2 in Q2, along with efficacy that declined 3.2 points in the quarter (from a 77.3 to 74.1 index score). These changes in index levels indicate a slowdown in the spending growth and waning optimism in security effectiveness during Q3. The only efficacy component that increased was “Recovering,” which includes developing/executing recovery plans and procedures, coordinating communications during recovery activities, and implementing improvements based on lessons learned. Respondents cited an increase in security efficacy response, which jumped 2.9 points, suggesting increased growing optimism about recovery plans and future improvements. Data theft and corruption Manufacturing resource spending rose 1.2 points to 67.8, and efficacy rose 2.3 points to 75.1 quarter over quarter Challenges for this sector in Q3 included increased external threats, business disruption, data theft and corruption, leaks, and lack of new system innovations. Phishing was the top cybersecurity threat (59%), with web and cloud attacks (48%) and internal compliance and audit events (41%) rounding out the top three. Manufacturing showed increased confidence in new strategies and regulations Manufacturing resource spending rose 1.2 points to 67.8, and efficacy rose 2.3 points to 75.1 quarter over quarter. There was an above-average point increase of 3.8 in “Responding,” which indicates that firms are focused on developing response strategies, policies and controls to prevent future attacks. Risk management strategies The manufacturing industry’s 3.7-point increase in efficacy of “Identifying” is consistent with increased confidence in improved asset management plans, risk management strategies and governance programs for this sector. Work from home requirements due to the pandemic impacted manufacturing firms, with many respondents indicating positive changes to improved security policies within their organizations. Even with such improvement, phishing and ID/credential theft was the top cybersecurity threat (52%), with internal compliance and audit events (45%) and endpoint and IoT threats (42%) rounding out the top three for manufacturing. Secure digital assets High tech and business services saw slower growth in every sub-index category High Tech and business services spending dropped 3.8 points to 64.1, as did efficacy by 7.3 points to 72.4. All five NIST components as relayed by survey respondents saw slower growth for spending allocation and efficacy in Q3, with the largest drop of 12.3 points occurring in efficacy for “Protecting,” which includes cybersecurity training/awareness, developing processes to secure digital and physical assets, and purchasing or implementing cybersecurity technology. Efficacy sentiment for four out of five activities also increased, although at a slower pace in Q3 Even though respondents noted increased attacks in number and scope, as well as increased sophistication and adaptability of adversaries, this industry sector saw slower growth in every sub-index category - indicating a softening resource expansion. Interestingly, phishing ranked as the lowest concern (42%), with endpoint malware and IoT security (46%), web or cloud application attacks (45%), and insider threats and anomalous users (44%) rounding out the top three. Other findings The accompanying CRAE report noted that: “Overall, three out of five NIST sub-index component index readings (“Identifying,” “Protecting,” and “Recovering”) rose in Q3 as organizations reported increased resource and spending allocations for proactive cybersecurity approaches, such as process improvements, system and software upgrades, and increased employee awareness and training. Efficacy sentiment for four out of five activities also increased, although at a slower pace in Q3. “Recovering” efficacy expanded slightly faster on average, reflecting increased confidence of respondents about their initiatives to recover from information security events and breaches. Information security leaders “This is a useful piece of cybersecurity research that gives IT and information security leaders directional insight into what is happening on the ground from a peer and industry perspective,” said Mike Riemer, Chief Security Architect at Ivanti. “The findings highlight that organizations are furthering security investments in proactive technologies to address expanded threats due to increased remote workplace requirements, and that security practitioners need to further their focus on optimising processes and controls to turn the tide of efficacy confidence.”
As has become traditional at this time of the year, Hanwha Techwin has announced what it believes will be the top 5 key trends for the video surveillance industry during 2021. They cover AI edge-based solutions, open platform, the Cloud, cybersecurity, data protection, and privacy issues. Growth of AI edge-based solutions A key advantage of edge devices is that they have the ability to run specialist software applications onboard. This improves resource efficiency, saves processing time, and minimizes network bandwidth requirements. With increased functionality now being included in edge-based Deep Learning AI solutions, there is likely to be a large increase in the number of devices deployed that can process data at the edge. Reflecting a belief that the edge will become an open platform, Hanwha Techwin intends to strengthen its AI-based open platform and work closely with technology partners to create ecosystems that are intuitively user-friendly, scalable, and can meet evolving customer demands in a timely manner. Extended open platform The extended open platform will facilitate the development of a wider array of customized vertical market and end-user specific solutions With end-users wishing to achieve maximum value from their video solutions, software development cannot continue as a siloed process led by a single company’s in-house software engineering team. Open Security & Safety Alliance (OSSA) Hanwha Techwin is a founding member of the Open Security & Safety Alliance (OSSA), an initiative that has brought like-minded organizations together with the objective of outlining specifications for a common platform for security and safety solutions. Hanwha Techwin improves the compatibility and interoperability of its open-platform products In 2021, Hanwha Techwin will work with other members of OSSA to build a standardized and accessible framework, which will provide the flexibility for integrated solutions to be developed that address regional or user-specific requirements. In parallel to collaborating with other members of OSSA, Hanwha Techwin intends to further improve the compatibility and interoperability of its open-platform products within the video surveillance ecosystem. This will be achieved by encompassing specialist edge applications, VMS, and Cloud solutions developed by third-party technology partners and will enable us to offer a wide array of optimized solutions that will provide real-life practical benefits and add significant value to video surveillance systems. Cloud widely adopted as a business insights tool The Cloud is widely used now as a way of updating product features, as well as installing security patches. However, the increase in the number of edge devices being deployed means the Cloud also has an important role to play as a means of safely managing the devices and handling large amounts of data to provide business intelligence. Hanwha Techwin plans to introduce a Cloud solution that will enable users to more easily manage Wisenet IP network products and monitor their status in real-time. Equally important, the solution will generate reports which provide greater situational awareness and business intelligence, based on the results of analyzed data that has been captured at each edge. Cybersecurity will become crucial Hanwha Techwin included pioneering cybersecurity functionality within Wisenet7 chipset With data increasingly being captured, stored, and secured at the edge as part of a smart factory, smart office, smart retail store, or on a larger scale, a smart city solution, the need for protection against cyber-attacks has become an even more essential requirement. However, cybersecurity is and will remain a major issue for an application, regardless of its size or complexity. In 2020, Hanwha Techwin included pioneering cybersecurity functionality within Wisenet7, its most powerful chipset to date. To provide users with peace of mind in knowing their confidential data will be kept safe from hackers, Hanwha Techwin also achieved UL Cybersecurity Assurance Program (UL CAP) certification for the Wisenet7 chipset. Respect for data protection and privacy GDPR in Europe and CCPA in the US have drawn attention to the need for companies that capture personal data to have adequate privacy procedures in place. Within the video surveillance industry, the issue of protecting personal identification information based on video data is a significant issue. There is a need to have a balanced approach that ensures compliance with privacy regulations while making the best use of the latest advances in technology and the data it helps to capture. Corporate responsibility Hanwha Techwin fully appreciates its corporate responsibility to assist users to comply with privacy regulations. Our SSM and WAVE video management software, Smart Cover of Privacy (S-COP) video editing and masking software, and Video Privacy Management (VPM) solution, are all designed to help users adhere to the regulations while achieving maximum benefit from Wisenet cameras and recording solutions. Product Roadmap & Sales Strategy “Independently produced market research reports and feedback from customers give weight to these predictions,” said Jeff (Chae Won) Lee, Managing Director of Hanwha Techwin Europe. “In this respect, our product roadmap and sales strategy take into account that regardless of whether system integrators are involved with complex, mission-critical or high-security video surveillance projects, or just providing security for a small office, factory or retail applications, these trends and topics are likely to have a major impact during the next 12 months and beyond.”
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
At ISC West this year, emerging technologies will be on display to help organizations manage their environments, from the building itself to who’s on the premises and what’s going on at any given moment. Top of mind this year is cybersecurity, compliance and management of security assets as threats rise and governing bodies put regulations in place that businesses need to react to. The good news is that the shift in approach to holistic monitoring of cyber and physical assets can move enterprises to a place of digital transformation and proactive management rather than reactive practices based on threats and changing regulations. The show provides an opportunity for both vendors and potential customers to learn from each other about what’s out there and what’s needed in terms of future solutions as the industry evolves. Are you in cyber and physical security compliance? At this year’s show, we’ll continue to see developments focused on integration of cyber physical security that will lead to deeper understanding of the relationship between devices, device monitoring and spaces in which all devices physically reside. Digital solutions help achieve a digital transformation which stitches the data relationships together to provide better threat vector impact and overall understanding of risk. The technologies in smart buildings are subject to cyberattacks, which pose not just a threat to data and privacy but can compromise the physical space as well. Think of the locked door in a smart building that now is opened with access control via key cards or mobile devices given only to certain members of staff. These integrations increase safety and restrict access across the enterprise, but a bad actor can access and duplicate the necessary data to open the door with a copycat device while hiding the event from the surveillance system. By having a comprehensive cyber whitelist of installed devices, potential rouge devices are prevented from transmitting on the network, therefore providing an automated guard against internal and external attacks. When systems are compromised due to a hack or physical intervention, it puts what’s behind the door at risk, whether it’s money in a bank or information in a sensitive work environment, such as a laboratory. Digital solutions help achieve a digital transformation which stitches the data relationships together It’s increasingly important to highlight the relationship between cyber and physical security. A great illustration of this is the digital twin. A digital twin is a replica of a physical space that uses both informational and operational technology to give real-time information about what’s going on in a space. These can include things like floor plans for the building as well as real-time sensor data from the building management system, HVAC systems, lighting, fire, security, and more. By getting a complete picture of the physical and digital assets of an organization, it becomes possible to monitor all systems from one central location to see how they’re working together and act on the insights they provide. So, in the example of a breach from before, it’s possible to flag that hack, isolate its exact location and devices involved, and resolve it quickly while maintaining preservation of evidence. Compliance: how to get there safely, efficiently and effectively As these threats evolve, governing bodies are taking action to ensure that data is protected to minimize these kinds of threats and ensure that organizations feel confident in the security of their data. Norms and compliance measures are emerging quickly, such as General Data Protection Regulation (GDPR) which began to be enforced in March 2018, and the California Cybersecurity Law, which went into effect in the US just this past January. The regulations of what can be done with data mean that companies need to react or face penalties such as fines, which can be as high as 4% of worldwide annual revenue of the previous year. These are also fluid and can change rapidly, meaning flexibility is important in compliance solutions. However, this presents an opportunity for companies to invest in innovation to ensure they’re prepared for those changes and to protect the safety of not just employees, customers and target markets, but of the larger organization. Getting to a place of compliance can seem costly and time consuming at the beginning Getting to a place of compliance can seem costly and time consuming at the beginning, especially for larger organizations. They may have thousands of security assets (cameras and sensors, for example) and might not even be fully aware of what they have, where they are, and whether those assets are functional, never mind compliant with data protection legislation. The right solution takes all the steps to becoming safe and compliant into account, beginning with inventory and mapping of all assets to get a complete picture of where things stand and where changes need to be made. One large financial institution, upon embarking on this journey, identified an additional 10% of assets that they didn’t know they had, and additional ones that were nonfunctioning and needed to be repaired or replaced for compliance and safety. Monitoring: centralized and remote for rapid response Once assets and data are centralized and a complete inventory is taken, it’s much easier to effectively monitor the complete enterprise. At this year’s show, smart technologies will be on display that reduce cybersecurity risks and monitor assets for compliance. If something changes, that can be flagged, and appropriate parties can be quickly notified to act and neutralize security threats or avoid the expensive penalties that come with noncompliance. Since all these components are centralized in one location, it becomes possible to monitor much more effectively and fix issues remotely in minutes rather than scheduling a trip to a location that may not happen for days or even weeks. A security camera for a large chain enterprise such as a retail store or bank in a small-town location deserves service just as quickly as one in a major city, since the threat that each non-functional device poses is the same to who and what it is there to protect. Keeping it up: a proactive approach to service and maintenance One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach to systems maintenance and operation. In addition to performance and compliance, other types of data, such as historical events, can also be monitored centrally. This gives context to security events and can move organizations from a reactive to a proactive approach to their security as well as operations. If small problems are identified and resolved before they become larger problems, it means that security events can be mitigated more quickly or prevented entirely due to early intervention. On the operations side, early insights into asset performance means that fewer resources are expended on noncompliance fees and large-scale, emergency repairs. These resources can take the form of money, but also of time spent by employees and enforcement agencies to ensure continued compliance. Staff can spend time engaged in active monitoring rather than generating reports, since that can now be automated. In the new decade, it’s time to use the technological resources available to better protect systems for smarter, safer and more sustainable environments. On every level, compliance is important not just for its own sake, but so are the other benefits associated with intelligent management. The show presents an educational opportunity for vendors and customers alike. Walking around the show floor and talking to everyone is a unique way to see what’s out there and evaluate what is and isn’t working for a business while getting information from all the industry experts. Even if they’re not ready for a complete overhaul, taking stock of what’s available, where things are heading and how their operations and mission can be better served by implementing one or more of the solutions showcased is more important than ever. On our end, those conversations about needs and concerns are invaluable in driving innovation.
Cloud technologies and the IoT have opened up seemingly endless possibilities for the modern retail organization. Customers have never had as much control over purchasing decisions as they do today, with the ability to make transactions at the touch of a button for goods and services from the comfort of their own homes or on the move. However, the customer data lying at the heart of this frictionless shopping experience presents an ever more attractive commodity to cyber criminals. Attacks are growing in number and this presents a major problem for both retailers and customers. Cloud technologies and the IoT have opened up seemingly endless possibilities for the modern retail organization In addition to the immediate disruption and downtime a breach can cause, the damage to the reputation of a business or brand can be lifelong. With GDPR related fines from the ICO now as much as €20m or 4% of an organization’s global annual turnover, whichever is higher, the resulting combination of the cost of the breach itself, reputational erosion and any crippling fines can be devastating. It is therefore essential that retailers are aware of the steps and procedures they should be following to ensure full data compliance and to guarantee the integrity of their IT infrastructure. Ensuring full GDPR compliance It’s vital to ensure that everyone understands the security implications and knows how to respond effectively in the event of a breach. Internally, all teams and departments should have the confidence to raise the alert if a breach is suspected. Externally, companies should look to encourage conversations across the entire supply chain to ensure requirements are effectively met and security risks are adequately addressed. It is a requirement of the GDPR that the necessary steps be taken to guard against attack and protect existing software and systems It is a requirement of the GDPR that the necessary steps be taken to guard against attack and protect existing software and systems. Effective cybersecurity lifecycle management of IoT devices, such as network video surveillance cameras, is an example of a measure which should be put in place to help prevent such devices from being compromised, mitigating risk and ultimately maintaining customer trust. Establishing a truly secure retail solution can only be accomplished if security has been analyzed at every stage. Evolving physical systems For protection of the physical retail environment, the move away from legacy security solutions such as traditional CCTV, which typically sat outside of a company’s IT operation, to the modern cloud-enabled security technologies we see today, allows retailers to unlock a wealth of business benefits previously impossible with analog technologies. Today’s systems provide far greater accuracy of detection, vastly improved image quality, even in low light, and an array of business intelligence options to aid operations, such as people counting, queue monitoring and stock control. Protecting the physical security of the retail environment The ability to create live security alerts as well as forensic evidence for later analysis allows security teams to be proactive rather than reactive. In addition, the growing use of edge capabilities to process data within the cameras themselves negates the additional time and potential lag associated with continually passing surveillance information back and forward to servers, streamlining and therefore vastly improving operations. System vulnerabilities equals vulnerable data For network cameras being introduced onto an IT network, it’s essential to ensure that they do not become compromised and used as a backdoor to gain entrance to a business’s innermost workings and most valuable commodity; its data. The importance of guarding against system vulnerabilities cannot be ignored and it is therefore vital to ensure that all installed technologies are Secure by Default; built from the ground up with cybersecurity considerations at the forefront, to strengthen system security. In addition, software updates and firmware upgrades will keep the devices protected in line with the evolving threat landscape. The importance of guarding against system vulnerabilities cannot be ignored Forging and maintaining relationships with stakeholders is key to establishing a healthy supply chain built on mutual trust and respect. Only by following such an approach can the integrity of systems be fully guaranteed, with trusted vendors and installers working together to ensure that ethical practices are followed, and cybersecurity principles are adhered to. Due diligence should be carried out to make sure that all stakeholders involved in the manufacture, supply and installation of security software and systems understand the importance of keeping security best practice at the forefront of everything they do. Addressing the ongoing challenge Retailers must be able to rely on technologies that support their operational requirements and address associated risks, while at the same time, supporting IT security policies. By following procedures around the cybersecurity of IoT devices, and realising the importance of implementing high quality products and services through relationships with trusted vendors and partners, retailers will benefit from connected physical security systems that deliver on the promise of better protection of the business and customer, to effectively mitigate the mounting cyber security threat.
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization. A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics can benefit a company, their employees, their customers and the whole world. Fire safety and security risks “The fire and security industry is different than others because lives and people’s safety are on the line,” says Harv Dulay, Director of Ethics and Compliance at Chubb Fire and Security. “Our purpose is to protect clients from fire safety and security risks. This is a business where no one should take short cuts. It is important to do the right thing all the time, every time, and it’s about protecting lives and property.” At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start" “At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start,” says Dulay. “Within the bible are core fundamental rules about what’s acceptable and not acceptable. We lay it out for employees very specifically. They understand and embrace the code of ethics, which is based on trust, integrity, respect, innovation and excellence.” “If you get those right, the business moves in the right direction. A key piece of our ethics policy is based on trust. We relate to others with openness, transparency, and empathy. It makes Chubb a better place to work and enables us to provide better service to customers.” Fire audit For Chubb, ethics is not just theoretical, but ethical concepts play out every day in practical ways. An example might be an engineer who goes to a customer’s site and is asked to do a task that is outside his or her duties and/or not allowed under the ethics policy. The pressure might be even greater if the employee is struggling to meet a sales figure. The code of ethics addresses specific situations and outlines the behavior that is expected. In another example, a customer asked a Chubb technician to forge a certificate saying the customer had previously passed a fire audit in order to validate his previous year’s insurance. Showing ethical integrity, the technician was able to cite the company’s Code of Ethics and refuse to do it. The technician also reported the situation to his Ethics and Compliance Officer. Customers benefit, too. Delivering ethics excellence It’s a message heard from the top down, from everyone in the company" One of Chubb’s sales associates immediately reporting a situation in which all the tenders and competitors’ prices were visible as they prepared a tender for upload to a customer portal. Not only did the sales associate deliver ethics excellence by reporting the issue, he also helped a grateful customer who thereby avoided anti-trust issues, says Dulay. “Ethics is not just a current issue,” says Dulay. “It’s embedded in our values and has been since the beginning. Ethics is making sure people do the right things.” Ethics is integrated into the Chubb business model, and everyone knows what is expected of them. “It’s a message heard from the top down, from everyone in the company.” On-Line training modules Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process. The training program includes information about ethics, company expectations around ethics, where to go for questions about ethical issues, and details of the anonymous ombudsman program. Additionally, field staff are trained by their supervisors via regular face-to-face ethics toolbox talks. Office staff complete a series of on-line ethics training modules regularly. A series of supervisor-led trainings encourage managers to deliver face-to-face ethics training to their team, citing real-life examples. Healthy discussions are encouraged to deal with any ‘gray areas.’ Worldwide implementation of data security Some 14,000 employees globally have multiple options when it comes to reporting an issue Dulay estimates that ethics and compliance officers spend about half their time answering questions and clarifying for employees what’s expected in the code of ethics. Some 14,000 employees globally have multiple options when it comes to reporting an issue, and there are full-time Ethics and Compliances Officers in every country where Chubb does business. A reflection of Chubb’s global approach to compliance is their worldwide implementation of data security requirements of Europe’s General Data Protection Regulation (GDPR); the company saw the benefits of the program for any jurisdiction. Training and education are part of Chubb’s investment in ethics. For example, a recent module on ‘respect in the workplace’ covered the need to create a company culture in which everyone feels respected. “Training and continuous communication are embedded in the organization,” says Dulay. Managing potential conflicts proactively “We invest in the process,” says Dulay. “We have had employees who left the company and then come back. They realized the importance of ethics and rejoined us. We start with the foundation that we would rather lose business than give up our ethical standards,” says Dulay. Some business is not worth getting if you don’t adhere to your values" “We won’t abandon our policies even if there is money at stake. Some business is not worth getting if you don’t adhere to your values. We manage potential conflicts proactively by creating and instituting methods in which employees have access to tools they can use to be successful and adaptable in times of change,” says Dulay. “Also, we will not tolerate retaliation against any employee who reports wrongdoing – regardless of the outcome of the investigation.” Forming good ethics behavior And while there is no specific monetary value assigned to good ethical practices, success can be measured. “We measure it by people’s conduct, the number of cases we have, and awareness,” says Dulay. “It’s good for employee morale, and it’s good for customers and our business. It’s not measurable, but it is fundamental for business and customers.” “The work we do as a company can impact people’s lives so it is important that everyone has an understanding of the importance of their role,” says Dulay. A common misconception about ethics is: “If no one is watching, it must be ok.” However, Dulay says it is the things employees do when no one is watching or checking in on them that form good ethics behavior. During training, Chubb emphasizes that ethics is about doing the right thing, all the time even if no one is watching.
Enjoy a bird's eye view of Cologne! Every year, over half a million passengers soar over the Rhine at a height of 30 meters with the Cologne Cable Car – and are rewarded with an unparalleled view of the city and cathedral. For ensuring the safety of the carrying rope construction, Kölner Seilbahn relies on the Panomera® camera technology of Regensburg-based manufacturer Dallmeier. The Cologne Cable Car offers an unrivaled view of the Cologne Old Town and its cathedral. Riding in gondolas at a height of 30 meters above the ground, visitors enjoy a bird's eye view of Cologne, the Old Town, the River Rhine, and the beautiful city environs. Video security technology The Cologne Cable Car has been featured as an established attraction of the city for over 60 years, and every year more than half a million passengers enjoy the 930-meter-long aerial trip over the Rhine. In order to ensure that the 44 cars reach the end stations in Riehl and Deutz safely from spring to autumn, the operators have decided to install video security technology from Dallmeier. The Cologne Cable Car has featured as an established attraction of the city for over 60 years The Cologne Cable Car project is the first undertaking anywhere in the world in which the patented Panomera® camera technology is used to monitor a cable car carrying rope. In order to guarantee the passengers' safety at all times, the operators require rapid visual detection of possible technical problems, particularly in the structure of the carrying cable. Preventing technical problems Carlos Castro, Operations Manager of Kölner Seilbahn, explains: "Besides the approach of the gondolas to the stations, we observe the way they run onto the pylons. 30 meters up in the air, it is quite possible that a good gust of wind can set the cable and the pylons swinging. To enable early detection of incidents that cause the gondolas to approach the sensitive points out of alignment and to prevent technical problems, we decided to introduce video surveillance using the proven, patented Panomera® camera technology." The carrying rope is supported on a total of three pylons over the entire distance of just under one kilometer. The resulting distances between the stations and the pylons range in length from 100 meters up to a considerable span of 480 meters over the Rhine itself. Extremely high quality The operators of the Cologne Cable Car found exactly the right solution in Panomera® technology Consequently, their project partner VTS Video Technik Systeme GmbH, which was responsible for erection operations, only had access to a few installation points, but at the same time, the specification in respect of imaging and resolution quality was extremely high. Simply put, this meant that images must be recorded over very long distances, but at the same time, the image material must still be of extremely high quality. Together with the VTS, the operators of the Cologne Cable Car found exactly the right solution in Panomera® technology. VTS GmbH has been a reliable, capable business partner to Dallmeier for many years, and brings the necessary expertise to the project based on long experience. Multifocal sensor system The Panomera® multifocal sensor system is considered to have revolutionized video surveillance. It was developed specifically to provide full area coverage with video protection for large spaces and long distances. The particular feature of the technology is that multiple sensors having different focal lengths are installed in a single housing and a special software program compiles a total image in high resolution. This technical advantage gave us the decisive edge in view of the specified infrastructure" In this way, huge distances and expanses can be captured with a uniform resolution raster over the entire area of interest in real-time. Jürgen Vahlenkamp, managing director of VTS GmbH explains in more detail: "This technical advantage gave us the decisive edge in view of the specified infrastructure. For video observation with the Panomera®, we managed extremely well with the small number of installation points available.” Potential hazard situations “Thanks to the special lens and sensor concept we do not fall below the specified resolution value even in the more distant image areas. The ideal prerequisite for surveillance over very long distances!” The rollers themselves are also monitored using Dallmeier IR box cameras. The operator has full control over the entire situation over the entire length of the cables between the pylons, live and in high-resolution video images. In potential hazard situations, he can view details in a separate zoom image without losing sight of the overall action. In theory, any number of operators would be able to ‘take a close look’ at a wide range of image areas at the same time. Analyzing detailed picture We have succeeded in ensuring that the process of cable car operation is as safe as possible" "The operator has the situation under control at all times! He has access to an uninterrupted total view of the cables and the pylons while analyzing a detailed picture of a certain area, at the same time if necessary,” continues Vahlenkamp, "We have succeeded in ensuring that the process of cable car operation is as safe as possible, to the complete satisfaction of our customer." The wind that blows against the masts and cables 30 meters above the ground can cause them to start rocking and poses certain challenges not only for the operation of the gondolas but also for the installation of the cameras. To ensure that the camera systems – each weighing more than ten kilos – are not damaged or themselves become a hazard, the cameras were secured to the pylons using special plates. Real-life implementation The lenses themselves are installed immovably inside the camera housing and are unaffected by any swinging motion. In view of the special requirement of this project, the Dallmeier 3D planning team first simulated a digital twin of the entire surrounding area. With this approach, the manufacturer Dallmeier ensures that planning and real-life implementation match each other as closely as possible, and the customer benefits from the highest certainty regarding both the plan and their investment. The next step in the project execution was to construct and test the finished system The next step in the project execution was to construct and test the finished system, consisting of cameras and a high-performance recording appliance. In Dallmeier's own Factory Acceptance Test (FAT) Center in Regensburg, the systems were pre-set according to the customer's specification. The ‘FAT test run’ which follows ensures that project partner VTS will be able to install and commission the preconfigured system quickly and without difficulties. Reliable technical monitoring Carlos Castro sums up: "We're delighted. At last, we are in a position to monitor the entire span of 930 meters during operation. The images delivered are of outstanding quality. With this system we now have a good, additional tool which enables the system to be displayed visually, complementing the existing, reliable technical monitoring and control systems." In public areas, data protection and EU GDPR are important topics. Dallmeier's technology is compliant with all required criteria for data protection and data security, including during application in public areas. Roland Deja, Operations Manager Sales Backoffice at Dallmeier: "With the Dallmeier solution, we have given the go-ahead for cable car monitoring projects. The integrated approach adopted in Dallmeier solutions means that both the cameras and software can be upgraded, e.g., with AI-based assistance systems, at a later time as well. Thus, systems will remain viable for many years into the future and guarantee investment security for the Kölner Seilbahn."
Located in the heart of west London, Ealing Council serves the residents and businesses of the UK capital's fourth largest borough. With a vast housing portfolio and a commitment to keeping residents as safe and secure as possible, Ealing Council benefits from the use of PAC’s innovative cloud-based access control solution, PAC Residential Cloud. The London Borough of Ealing comprises seven major towns, Ealing, Acton, Greenford, Hanwell, Northolt, Perivale and Southall. Ealing Council’s task is to provide a diverse range of services to the 350,000 residents residing across the area. It is committed to improving its performance, while ensuring value for money and serving a key part of this is the provision of good quality housing that meets the highest possible standards. Ensuring safety and security of residents In addition to carrying out property allocation, repairs, rent collection, homelessness services and estate management, Ealing Council is responsible for ensuring the security and safety of the tenants living in its 300+ housing blocks. As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system" Daljit Gill, an Electrical Services Manager at Ealing Council commented, “When it comes to administering our multi-site housing portfolio, Ealing Council recognizes the advantages that access control technology brings in terms of our ability to effectively access information, issue and configure key fobs and check occupancy status.” He adds, “As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system, which currently comprises around 1,100 doors and 500 controllers.” PAC Residential Cloud Over the last few years the cloud has proven to be a game changer in the way access control technology is designed, configured and used. The PAC Residential Cloud leads the way in allowing organizations to remotely manage and monitor their access control systems. Meanwhile, the PAC controllers, which are being used as part of the Ealing Council’s access control system, utilize the general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. Key fob management and remote diagnostics Sam Flowers, Regional Sales Manager at PAC GDX, explains “Daljit and his team can address technical issues, deal with key fob management, examine diagnostics, view system status, set and unset a system, and gain access to event logs and reports, all from a remote location.” Without the cloud, any problems and issues would need to be dealt with by office-based individuals" Sam adds, “Without the cloud, any problems and issues would need to be dealt with by office-based individuals, which is obviously restrictive and can lead to a delayed response. We provide a full online training program to help customers get the best out of their systems and also offer full technical support.” Asked on how the PAC Residential Cloud makes his day to day working life easier, Ealing Council’s Daljit Gill responded by stating, “I can address connection issues, manage the system and troubleshoot from wherever I happen to be, using my PC, tablet or smartphone. Not only is this convenient, it also saves me a huge amount of time, as I don’t have to go into the office to log-in.” Fully auditable system He adds, “Two of my colleagues also have permission to use the system remotely, although we could share access with up to 15 administrators if required, with each person only given access to information that relates directly to their role.” Daljit further said, “One of the main features of the system is that it is fully auditable, meaning that any activity can be monitored in real time and traced directly back to a specific user via their unique password.” Adherence to GDPR and strong data protection policy Ealing Council strictly adheres to the General Data Protection Regulation (GDPR) and has implemented a strong data protection policy. PAC Residential Cloud is hosted with The Bunker, a trusted PAC partner, whose UK data centers are located in former nuclear bunkers and certified to the ISO 27001 standard for information security management. If an alert is activated, measures can then be taken to deactivate a specific key fob" PAC Residential Cloud also offers Ealing Council some less obvious benefits. Sam Flowers comments, “The data collected by the access control system can be used to issue an alert if a resident’s key fob hasn't been used during a specific period, identify patterns of behavior that could suggest illegal activity, flag-up if someone is subletting a property or even detect if a tenant is using a cloned key fob.” Sam adds, “If an alert is activated, measures can then be taken to deactivate a specific key fob. Furthermore, the PAC Residential Cloud has also helped Ealing Council adopt a business as usual approach during the coronavirus pandemic by limiting physical interaction, while still enabling a prompt and effective response.” Fully IP-based access control system As well as enjoying the operational advantages of the PAC Residential Cloud, Ealing Council is also planning to advance its transition to a fully internet protocol (IP) based access control system by upgrading to PAC’s 512DCi digital networkable access controllers. Daljit Gill concludes by stating, “Installing the PAC 512DCi’s will allow us to maximize operational effectiveness through our investment in the PAC Residential Cloud. We will also be able to utilize PAC’s high frequency OPS MIFARE DESFire EV1 readers, which have been tested to meet Advanced Encryption Standard (AES) 128 bit compliance. This will further reduce the risk of key fob cloning and ensure that our tenants benefit from improved levels of security.”
Václav Havel Airport Prague (PRG), with its prime location in the Center of Europe, is the largest and most important international airport in the Czech Republic. Prague Airport handled 17.8 million passengers in 2019 and received the Airport Service Quality Award 2019 awarded by ACI1 for the second time in a row. At Prague Airport, there are different types of areas restricted to authorized personnel. These are governed by an access control system fitted with approximately 1,000 readers and over 1,500 secured points (doors, locks, etc.). Mifare Desfire cards are predominantly in use for the time being. Among these, Security Restricted Areas (SRAs) are the highest security areas, with 60 access points of high importance. Contactless biometric technology Due to the critical nature of those areas, Prague Airport needed a very high level of security, and decided to implement a biometric solution, as the card itself (including with the use of a PIN code), would not be deemed as secure enough. The biometric system had to be able to cope with over 20,000 individuals, with the capability to increase to up to 30,000 users in the future. Prague Airport decided to keep the existing access cards but to add a biometric verification level for the SRAs. This means that the biometric solution would have to be used in combination with the existing cards through a two-step process. In order to avoid any physical contact with the devices, for user convenience as well as for hygienic considerations, it was decided to deploy a contactless biometric technology. Access control system The readers were installed at existing control points and are fully integrated into the airport access control system Prague Airport tested two technologies capable of connecting to its access control system, among which IDEMIA’s MorphoWave Compact contactless fingerprint terminal. After a thorough testing period, the choice was to go for IDEMIA’s technology for a number of reasons including: great user experience with an easy and quick hand gesture, as well as a strict GDPR compliance with users’ biometric information stored only in their cards. Prague Airport deployed more than 60 MorphoWave Compact in its SRAs. The readers were installed at existing control points and are fully integrated into the airport access control system. More than 20,000 users now have their biometric data in their access cards and the system is fully operational. Embedded card reader IDEMIA’s seamless biometric technology helps address health and safety issues. Employees appreciate the user experience provided by the solution deployed: it is easy to tap the access card onto the embedded card reader situated at the top of the reader and then to just wave the hand in a quick simple movement to get 4 fingerprint verified in less than 1 second, without the need to touch any part of the device. Airports is a key vertical among the many different ones served by IDEMIA. The biometric devices are used by 35+ of them throughout the world for staff access control, as here in Prague. The company’s biometric solutions are also used for border control and passenger flow facilitation, in more than 30 different airports.
Global professional services provider Equiom has 14+ offices across the globe with more than 600 employees. In 2014, Equiom employed just 200 people across two offices in two jurisdictions and had ambitious plans to grow into a global business. But while the business had plans to scale, its infrastructure was that of a small business and not able to support its ambitions. As such, the company undertook a review of its entire IT infrastructure, including the network, software, and servers, with a key focus on cybersecurity, to develop systems that could support the business’ growth strategy. External vulnerability testing Furthermore, Equiom believed its security had to be robust enough to provide peace of mind to regulators, investors, and shareholders. To address this challenge Equiom wanted to work with a specialist cybersecurity partner that could both help identify any weaknesses and vulnerabilities within the infrastructure and provide recommendations and training for improving its security posture. Equiom selected SureCloud to provide services globally including cybersecurity penetration testing services Following a competitive process Equiom selected SureCloud to provide services globally including cybersecurity penetration testing services, internal and external vulnerability testing and management, social engineering including simulated phishing exercises and simulated ransomware attacks and physical social engineering. All services were delivered as part of our Pentest-as-a-Service, which provides a centralized platform for managing of all elements of the projects, including Equiom’s vulnerability remediation program. Cloud-Based platform Stephen Roberts, Global Chief Information Officer for Equiom Group, commented: “SureCloud was the obvious choice as the team is extremely knowledgeable, and the company had invested heavily in its cloud-based platform to create a technical solution that is far more developed than anything else in the marketplace.” “We felt working with SureCloud would enable us to provide a single snapshot of our security posture at any given time. Ultimately, the platform offered us the ability to simplify the overall management process, which was a key differentiator for us. SureCloud takes what is, in reality, a highly complex set of requirements and makes it as simple as possible.” Accurately monitor progress “Through centralization of all reports and data, including output from penetration tests, vulnerability scans and social engineering exercises, we have complete visibility over our infrastructure and can develop remediation action plans and accurately monitor progress in real time,” said Roberts. SureCloud provides peace of mind to our stakeholders and customers" “As we continue to grow, SureCloud provides peace of mind to our stakeholders and customers. When we compare new acquisitions to those parts of our business that have gone through the SureCloud process, we can see a very clear difference in the respective postures. This is a testament to SureCloud’s success in keeping our security posture in excellent health,” commented Roberts. Overall security posture “We have also worked with SureCloud to address additional challenges in the business. We are currently using its GDPR application, which feeds data back into the platform enabling us to assess our compliance status against our overall security posture. Now we have complete oversight of our infrastructure,” said Roberts. “The fact that SureCloud is easy to use and highly scalable means that as we work to triple the size of the business over the next four years, we can do so while confidently relying on the platform to ensure that security is not compromised during that process. Through SureCloud we have raised our security posture to a level where our systems can help detect threats so that we can prevent attacks before they impact the business”, concluded Roberts.
Shoppers in England are being told they need to cover up and wear a face covering when shopping from the 24th July, or they could face a fine of up to £100. But in many ways the responsibility to enforce this and keep the public safe is once again falling on battle wearied retailers, facilities managers, and operators of public spaces. Videcon is a British-based developer, designer, and provider of security solutions for businesses across the UK and the company has jumped to repurpose its deep learning, artificially intelligent software solutions in direct response to the Government’s announcement on Monday 13th July. Body temperature screening camera Thermi-screen, Videcon’s mass body temperature screening camera, can already pinpoint individuals in a shopping queue, or public space, containing up to 40 people, who may have an elevated temperature with ±0.3°C accuracy, but now it can also identify anyone not wearing a face covering. When triggered, the system automatically sends an alert to any designated controller or person in authority. Says Videcon’s managing director, Matt Rushall, “The message that members of the public must wear face coverings is out there but retailers and managers of public spaces are now finding, as an added burden, that they are being asked by the police and authorities to support them in upholding the law. Retailers have a duty to protect their customers and with Police, resources stretched to the limit at the moment, any technology that helps to manage enforcing the law and can make life easier and safer for all, is to be welcomed.” Crowd control camera systems Videcon is a pioneer in its field and the company already uses facial recognition and mask detection software Videcon is a pioneer in its field and the company already uses facial recognition and mask detection software in its Thermi-scan door access control panels but this is the first time deep learning AI technology has been embedded in crowd control camera systems of this type. Matt Rushall continued, “Our technology has been used by banks, airports, pharma companies and major retailers around the world and I am very excited at this new development. Thermi-Screen is an effective solution to help identify those with potentials symptoms, and our new capability for mask detection will be hugely beneficial to retailers and for the safety of staff and shoppers.” In addition to the new face coverings and mask detection feature, Videcon enhanced the system’s privacy settings which can now pixelate individuals and replace exact temperature readings with simple normal/elevated temperature messaging. Deep learning technologies This advanced privacy setting secures compliance with GDPR and ensures the maximum level of individual’s protection of information. The system comprises of a camera, a network video recorder, and a temperature calibrator. Using two camera lenses simultaneously, the system takes temperature readings from the forehead and upper region of the eye orbit. Algorithms and deep learning technologies then compare readings with other environmental factors like room temperature and direct sunlight. The accuracy of Thermi-Screen eliminates any false readings, such as a person carrying and sipping a hot drink and its fast response time reduces the need for single file detection accelerating the movement of people through a designated screening area or providing screening in public open spaces. Thermi-Screen is an effective solution to help identify those with potentials symptoms, and the new capability for mask detection will be hugely beneficial to retailers and for the safety of staff and shoppers.
The German video technology manufacturer Dallmeier is looking back on three extremely successful years in the "Safe City" market sector in Germany. To date, the inventor of the "Panomera" multifocal sensor technology with cameras, recording systems and software for video analysis and management has been able to execute 19 major projects in German cities. Successful investigations into recent incidents once again confirmed the quality of the systems. Essentially, three factors determine the success or failure of the use of video security technology in public spaces: on the one hand, it is important to guarantee a high and, above all, as consistent a minimum image quality as possible over the entire area to be recorded - this is the only way to ensure that the images can be used in court and, above all, to ensure positive results in the automatic analysis of these images. Multifocal sensor systems Breakthrough in the "Safe City" sector came at the end of 2016 with the commissioning of camera systems Secondly, this goal should, of course, be achieved with the fewest possible number of camera systems in order to keep overall costs, complexity and the workload of system operators low. And finally, the quality of the video management software used and the analysis of live images and recordings is of crucial importance. These three elements together form the essential added value of the patented "Panomera" multifocal sensor systems, which Dallmeier successfully launched on the market in 2011. The breakthrough in the "Safe City" sector came at the end of 2016 with the successful commissioning of the camera systems on the Domplatte (cathedral square) in Cologne. High resolution recordings Here, the police can observe an area of almost 9000 square meters with only eight Panomera cameras, and this with a minimum resolution density of 250 pixels per meter (px/m, according to DIN EN 62676-4). This very resolution is required to be able to recognize unknown individuals. With large-scale installations in 19 German cities, including Frankfurt, Essen, Wiesbaden, Chemnitz and Bremen, the manufacturer can look back on an extremely successful track record in the field of urban surveillance. "We have been using the Dallmeier Panomera technology since 2018 with great success. With the Panomera systems we benefit in particular from the fact that the entire overview of a scene is always maintained, whereby operators can zoom into different areas with high resolution even in the recording," says Thorsten Wünschmann, Head of the Hanau (a German City near Frankfurt) Public Order Office. Video security solutions "In this way, we achieve optimum control with minimum operator workload and, thanks to the fact that only a few systems are required, we also achieve low total cost of ownership". Dallmeier develops and manufactures all essential components of its solutions at its headquarters in Germany" A further, very important aspect for market acceptance is also data protection: Dallmeier fulfills this requirement by strictly observing the GDPR guidelines "Privacy by Design" and "Security by Design". Dallmeier develops and manufactures all essential components of its solutions at its headquarters in Germany, uses external service providers for extensive penetration and security tests and offers its customers comprehensive documentation and support in the implementation of video security solutions that comply with data protection regulations. Feedback from emergency services "We are very proud of our success in the Safe City sector over the past few years. Dallmeier technology is being used for more and more installations in large cities, but also increasingly in medium-sized cities." "Extremely rapid, successful investigations, not least with regard to the most recent events in Southern Germany, and consistently very positive feedback from the emergency services as well as the decision-makers attest to our strategy", says Frank Salder, Managing Director of Dallmeier Systems GmbH in Gladbeck and Germany-wide expert for Safe City within the Dallmeier group of companies. Extremely economical operation "The patented Panomera Multifocal sensor technology enables an extremely low number of systems required. For example, it is possible to cover 40,000 square meters with only 58 Panomera cameras at a minimum resolution density of 250 pixels per meter (px/m, according to DIN EN 62676-4). Together with the resulting much lower demands on the infrastructure, and of course, considerably fewer operator workstations, this also results in an extremely economical operation of the systems". Dallmeier Webinar on 28 May 2020, 4:30 PM – 5:15 PM CEST on the topic “Multifocal Sensor Technology for "Safe City": Functionality, Benefits, Real-World Examples” Special Issue "Video Extra”: Camera manufacturer recommends fewer cameras Dallmeier Solutions for Safe Cities
Round table discussion
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
How To Ramp Up Perimeter Security With License Plate Reader TechnologyDownload
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download