GDPR
Next DLP, a pioneer in data loss prevention and insider threat solutions announced that their Reveal Platform is the first Insider Risk Management solution to automatically map detection events to MITRE Engenuity Center for Threat-Informed Defense’s (Center) expanded Insider Threat Knowledge Base (ITKB 2.0). The ITKB 2.0 is the first of its kind to offer an evidence-based, multi-organizational, and publicly-available compendium of insider threat tactics, techniques, and procedures (TT...
Matrix Comsec, a well-known producer of Security and Telecom solutions, has officially announced its presence at the SAFE West Expo. The event will take place at the Bombay Exhibition Center, NESCO, Mumbai, from May 9th to May 11th, 2024. Matrix will be highlighting its IP Video Surveillance, Access Control, Time-Attendance, and Telecom solutions at Booth No. A-21. All-Color camera Matrix is excited to reveal its newest product lineup at the SAFE West Expo. One notable addit...
Synectics, a pioneer in advanced security and surveillance systems, announces its latest Synergy software release. Tools for improved incident management and team collaboration dominate the features list, with a new mobile app, simplified web-based system access, and remote camera sharing among the latest additions. Clear collaboration on vital tasks Synergy’s new mobile app delivers coordinated security management beyond the control room. The app offers seamless task management....
With momentum rapidly accelerating around AI governance worldwide, Milestone Systems held press meetings during the opening day of ISC West, April 10, for timely discussions on balancing technology innovation and responsibility. Responsible technology As an early champion of digital rights protections, Milestone Systems signed the momentous 2018 Copenhagen Letter urging stronger privacy safeguards during the adoption of GDPR. Milestone Systems adopted the G7’s landmark Code of Conduct on...
The Security Industry Association (SIA) has appointed Robert ‘Bobby’ Prostko, Allegion Chief Privacy Officer and Deputy General Counsel, to serve as the new Chair of its Data Privacy Advisory Board. The SIA Data Privacy Advisory Board – leveraging the collective expertise of industry professionals, law enforcement, security practitioners and data privacy experts – provides information and best practices to help SIA members handle sensitive data in a safe and secure...
By 2026, Gartner predicts that 50% of governments worldwide will enforce the use of responsible AI through regulations, policies, and the need for data privacy. While these guidelines are being developed, AI continues to evolve at a rapid pace. i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security solutions for surveillance and public safety, underscores the critical importance of ethical and responsible AI practices in the physical security domain....
News
Progress, the trusted provider of infrastructure software, announced a strategic partnership with Veeam® Software, the #1 pioneer by market share in Data Protection and Ransomware Recovery, to provide customers with an enterprise-ready cyber defense solution that strengthens the security of their business-critical data. Cybersecurity attacks are occurring at an ever-increasing pace, crippling organizations and costing millions of dollars in ransom payoffs, lost productivity, reputational damage, and diminished consumer confidence. According to the 2024 Veeam Data Protection Trends Report, 76% of organizations were attacked at least once in the past 12 months, and 26% of those reported being attacked at least four times. Partnership between Progress and Veeam Flowmon ADS is officially verified within the Veeam Ready Security program To reduce the time to detect and respond to these threats, deploying a solution that quickly and intelligently aggregates multiple network inputs and automates remediation is vital. The partnership between Progress and Veeam combines the intelligent network detection and response capabilities of Progress® Flowmon® Anomaly Detection System (ADS) with the security features of the Veeam Data Platform. Flowmon ADS provides network layer visibility of potential attacks, so customers can leverage early detection and warnings to trigger the Incident API in Veeam Backup & Replication™. Flowmon ADS is officially verified within the Veeam Ready Security program. In-depth cyber protection and support “Veeam’s world-class capabilities and market reach makes them a highly strategic partner for us,” said Sundar Subramanian, EVP & GM of Infrastructure Management at Progress. “We share the desire to provide customers with in-depth cyber protection and support, and the combination of our respective threat detection and data protection technologies provides a powerful offering to help enterprise organizations strengthen their security posture.” New Flowmon ADS 12.2 New Flowmon ADS 12.2 harnesses the power of AI to provide a more advanced and holistic view Powered by an intelligent detection engine, Flowmon ADS applies automated behavior analysis algorithms to detect anomalies concealed within network traffic to quickly expose malicious behaviors, attacks against mission-critical applications, data breaches, and other indicators of compromise. of detected security events, empowering cybersecurity professionals to identify crucial ones, prioritize them with context, guide efficient decision-making and respond proactively. Cyber protection capabilities "Progress, renowned for its market success in network detection and response with Flowmon, has achieved a significant milestone by partnering with Veeam and integrating into the Veeam Incident API,” said Andreas Neufert, Vice President of Product Management, Alliances at Veeam. “This integration brings automated cyber protection capabilities to our shared customers, enabling them to respond instantly to cyber threats and ensure the safeguarding of their most actual business-critical data from further harm. Progress’ commitment to delivering innovations in NDR makes it a natural Alliance choice as we expand our cybersecurity portfolio ecosystem and help our customers address their toughest technology challenges.” NDR category Flowmon ADS won gold in the Network Detection and Response (NDR) category of the 2023 Globee® Cybersecurity Awards and was named a Technology Pioneer by Quadrant Knowledge Solutions in the 2023 SPARK Matrix™: Network Detection and Response (NDR) report.
Alcatraz AI, a global pioneer in frictionless access control solutions, is proud to announce the debut of the revolutionary exterior Rock X during ISC West 2024 in Las Vegas, showcased in Booth #31075. Rock X sets a new standard in outdoor access control, featuring frictionless and secure facial authentication technology for a wide range of applications. Rock X introduces a new era of security for exterior locations using the power of AI and technical innovation to address the unique challenges posed by exterior environments. Intro of the exterior Rock X With its robust features and unparalleled performance, Alcatraz AI’s Rock X offers a comprehensive solution to safeguard exterior entrances, ensuring enhanced security and peace of mind for businesses and organizations worldwide. Alcatraz AI’s Rock X offers a comprehensive solution to safeguard exterior entrances “The introduction of the exterior Rock X marks a paradigm shift in outdoor access control," said Tina D'Agostin, CEO at Alcatraz AI. "In the past, facial biometrics have encountered significant obstacles when operating in outdoor settings. Yet, Alcatraz has successfully overcome these challenges with Rock X, making facial authentication universal. Whether facing bright sunlight or navigating through dimly lit environments, Rock X ensures that only authorized individuals gain entry using their face as their credential. With this groundbreaking technology, we're not just setting a new standard; we're reshaping the future of access control." Key features of Rock X: Enhanced Performance and Adaptability: Excels in any lighting condition: Rock X authenticates users in any lighting condition, from complete darkness to intense sunlight, with a range of 0 to 120k lux, providing reliable access control around the clock. Extreme temperature tolerance: With a temperature range of −40°C to 66°C (−40°F to 150°F), Rock X is built to withstand the harshest climates, ensuring consistent performance in all weather conditions. Unmatched Durability and Security: Complete waterproof and dustproof protection (IP66): Rock X remains fully operational even in challenging and harsh weather conditions (rain, snow, or power washer), providing reliability and functionality. Vandal-resistant design (IK08): Rock X's IK08 rating allows it to withstand physical impact, providing robust security and extreme durability. Advanced Functionality and Integration: IP Intercom (SIP) functionality with a microphone and speaker: Rock X seamlessly integrates with digital intercom systems or PBX supporting SIP, facilitating convenient two-way communication alongside access control. ONVIF camera compatibility: Adheres to the industry-standard ONVIF camera protocol, allowing seamless integration and interoperability with various systems. Easy Integration with Access Control Systems: Wiegand and OSDP compatibility: Supports Wiegand and OSDP protocols, enabling simple integration with any Access Control System (ACS) and facilitating connectivity and interoperability with existing security infrastructure. Optional Multi-Component Architecture for Enhanced Security: Secure data storage: The optional expansion module can be combined with Rock X for secure data storage on the secure side of the door, enhancing data protection and network security and ensuring the highest level of data privacy. Experience Rock X in person at ISC West Alcatraz AI Rock X is now available for pre-order. Book a demo and experience Rock X in person at ISC West Booth #31075. The Alcatraz Rock will also be on display at several partner booths, including Alvarado Dormakaba Group (18019), Automatic Systems (6071), Boon Edam (23051), Genetec (13062), Gunnebo (28061), Johnson Controls Innovation Cube (18033), Smarter Security (5089), and Software House Sales Meeting Room (Lido Hall 3003).
Quanergy Solutions, Inc., a major provider of 3D LiDAR technology, proudly announces two innovations for its Q-Track® solution; an industry-first cloud-based sensor coverage tool and full Windows compatibility. Both of these new products further improve the customers’ out-of-the-box experience for Quanergy’s Q-Track portfolio. Q-Track Coverage Tool The cloud-based Q-Track Coverage Tool is aimed at revolutionizing pre-deployment planning and site surveys. This innovative tool allows users to virtually place LiDAR sensors within their environment, providing real-time insights into coverage areas, point cloud density, and potential blind spots. By empowering users to optimize their LiDAR deployments before even setting foot on-site, the cloud-based sensor coverage tool enhances operational efficiency and minimizes the need for on-site adjustments, saving both time and resources. Cloud-based sensor coverage tool “With our new cloud-based sensor coverage tool, Quanergy is redefining the way customers approach site surveys and pre-deployment planning,” said Gerald Becker, VP of Market Development and Alliances at Quanergy Solutions. He adds, “By providing users with a comprehensive platform for pre-site assessments, we’re empowering them to make informed decisions and optimize their LiDAR deployments with confidence. The new tool allows performing site surveys within minutes without any complicated installation.” Windows-compatible version Windows-compatible Q-Track is designed to streamline deployments and offer a plug-and-play experience Complementing the launch of a cloud-based sensor coverage tool is the full Windows-compatible version of Q-Track tailored specifically for the physical security sector. Designed to streamline deployments and offer a plug-and-play experience, it seamlessly integrates Quanergy’s advanced 3D LiDAR long-range sensors with cutting-edge smart perception software. Performance features The new Windows-compatible version comes with an extensive list of performance features including 360° 3D LiDAR coverage, a wide range of 140m in diameter per sensor, and over 98% detection, tracking, and classification accuracy, that slashes false alarms by over 20 times. Further enhancing the ease-of-deployment narrative, the Q-Track solution is PoE+ compatible, and it’s NDAA, GDPR, BAA, and TAA compliant. LiDAR technology “Q-Track represents a significant advancement in LiDAR technology, empowering professionals across various industries with unparalleled capabilities for a multitude of applications,” said Gerald Becker. He continues, “Our new Windows compatibility increases the solution’s overall value proposition for both users and system integrators as it’s the most prominent OS used by security professionals.” Innovation and customer-centric solutions Quanergy’s simultaneous launch of its new cloud-based sensor coverage tool and Windows-compatible Q-Track solution underscores the company’s commitment to innovation and customer-centric solutions. By combining these cutting-edge technologies, Quanergy sets a new standard for out-of-the-box experiences in the world of LiDAR technology, empowering users with the tools they need to succeed in an ever-evolving landscape.
Cohesity, a pioneer in AI-powered data security and management, announced Cohesity Gaia, a first-to-market AI-powered enterprise search assistant that brings retrieval augmented generation (RAG) AI and large language models (LLMs) to high-quality backup data within Cohesity environments. Cohesity Gaia will be made generally available on March 15. The conversational AI assistant enables users to ask questions and receive answers by accessing and analyzing their vast pools of enterprise data. When coupled with the Cohesity Data Cloud, these AI advancements transform data into knowledge and can help accelerate the goals of an organization while keeping data secure and compliant. Cohesity has announced plans with the three largest public cloud providers to bring their LLM services to Cohesity Gaia. Proposition of Cohesity Data Cloud The underlying architecture of Cohesity Data Cloud manages and secures data with a unique blend of performance, extensibility, and scale. Cohesity Gaia extends the value proposition of Cohesity Data Cloud even further: By building a RAG AI solution on Cohesity’s multicloud platform, Cohesity will be able to seamlessly provide RAG AI conversational search experiences across cloud and hybrid environments that will allow enterprises to gain deeper insights into their data and make informed decisions in the future, no matter where their stored data resides. Cohesity maintains a fully indexed backup of all files, across all workloads, and at all points in time. This robust capability supports the creation of AI-ready indexes for rapid conversational search and responses, providing enterprises with quick and accurate results. Initially, Cohesity will support Microsoft 365 and OneDrive data and will expand to more workloads over time. The unique architecture of Cohesity Gaia ensures that all indexed data is immediately available for reading without the need for backups to be reconstructed. This allows the Cohesity Data Cloud to function like a data lake, providing businesses with real-time access to their data for analysis and decision-making. The Cohesity Data Cloud employs granular, role-based access controls and zero-trust security principles, ensuring that only authorized users and models have access to the necessary data. This not only protects sensitive information but also helps enterprises maintain compliance with various regulatory requirements. Integrating AI capabilities Cohesity Gaia swamps these challenges by merging AI stuff within a client backup environment Enterprises looking to utilize LLMs often face several challenges. Developers must first create more copies of data, thereby increasing the threat footprint for an attack. What’s more, the data may be incomplete or dated. Finally, this approach requires additional time and resources, and puts an added burden on the system’s performance. Cohesity Gaia overcomes these challenges by integrating AI capabilities within a customer’s backup environment. Myriad of use cases Cohesity Gaia helps organizations make better, faster decisions across a myriad of use cases, such as: To assess an organization’s level of cyber resilience. To quickly perform financial and compliance audit checks. To answer complex legal questions. To serve as a knowledge base to train new employees. Available for analytics and insights “Enterprises are excited to harness the power of generative AI but have faced several challenges gaining insights into secondary data, including backup, archived and vaulted data – because every approach requires re-hydrating the data, and painfully waiting weeks for the data to be available for analytics and insights. Cohesity Gaia dramatically simplifies this process with our patent-pending approach using Retrieval Augmented Generation,” said Sanjay Poonen, CEO and President, Cohesity. “With Cohesity Gaia, for the first time in our industry, companies will be able to leverage generative AI to query their data in a virtually seamless way. Our approach delivers rapid, insightful results without the drawbacks of more manual and risky approaches. In short, it turns data into knowledge within seconds and minutes.” Use of generative AI “We are an international materials research and manufacturing company, with research centers in many locations, and our researchers speak different languages,” said Ryan Reed, head of IT Products and Services, JSR Corporation. “We want to be able to use generative AI to quickly discover if work done at one location might apply to other projects. Cohesity Gaia allows us to query our rich store of research data and quickly find relevant work. It will also allow our researchers to use their native language to query the system. This could prove incredibly valuable in accelerating the rate of our research and discovery.” Collection of AI capabilities The basis of these AI creations is the idea of “responsible AI,” with goods and frameworks At the core of Cohesity AI technologies is Cohesity Turing, a patent-pending collection of AI capabilities and technologies integrated into Cohesity’s multicloud data management and security platform, that provide operational and data insights. The foundation of these AI innovations is the concept of “responsible AI,” with capabilities and frameworks that enable customers to introduce AI to backup data securely and safely at scale. All Cohesity Turing solutions adhere to these responsible AI principles: Transparency: Protect access to the data with role-based access controls. Promote transparency and accountability around access and policies. Governance: Ensure the security and privacy of data used by AI models and the workforce—so the right data is exposed only to the right people (and models) with the right privileges. Access: Integrate indexed and searchable data securely and easily while ensuring data is immutable and resilient. Reason for the cost increases “It is important to understand that Cohesity Gaia does not retrieve data like a search engine; it answers questions,” said Greg Statton, office of the CTO – Data & AI, Cohesity. ”For example, if you notice a rise in costs in a region, typically, you would search for dozens of invoices, review and compare them, and see if you can discover the reason for the cost increases. It could take hours, days, or weeks to resolve. With Cohesity Gaia, you simply ask, ‘Why have costs increased in the region?’, and Cohesity Gaia will pull the relevant data from your stored data, analyze it, and return an answer to your question. It’s that simple.” Power of AI search “Cohesity is the first data security and management vendor to bring the power of AI search to enterprises with the Cohesity Gaia AI search assistant. Gaia leverages generative AI with the latest RAG enhancements to enable conversational search across secondary protected data,” said Russ Fellows, vice president, The Futurum Group Labs. “Gaia enables companies to quickly leverage their existing stored data with the power of generative AI, while preserving data security and compliance. With Cohesity Gaia, customers can quickly turn data into insights, without the complexity of creating an AI application themself, or worrying about their data privacy and security.” Cohesity Gaia Virtual Event Cohesity Gaia Virtual Event at 10 AM, PT, February 28th. Please attend this virtual event to learn more about Cohesity Gaia, the industry’s first generative AI-powered conversational search assistant. Participants include: Major AI product advancements from Greg Statton, Office of the CTO, Cohesity. Insights from Ryan Reed, head of IT Products and Services, JSR Corporation, about the AI functionality he’s most excited about. An executive conversation with Manuvir Das, VP, of Enterprise Computing at NVIDIA; Marco Casalaina, VP of Products, Azure AI at Microsoft; and Sanjay Poonen, CEO and President at Cohesity about their vision for generative AI and the pivotal role of an enterprise AI platform. A live demo showing AI’s value to the data and analysis.
Cohesity, a pioneer in AI-powered data security and management, announced a collaboration with NVIDIA to help organizations safely unlock the power of generative AI and data using the recently announced NVIDIA NIM microservices and by integrating NVIDIA AI Enterprise into the Cohesity Gaia platform. Cohesity Gaia, the company’s comprehensive, patent-pending collection of artificial intelligence (AI) capabilities, will offer NVIDIA NIM and additional technologies as part of a hardened, enterprise-class, multicloud data platform, with ready-to-implement generative AI solutions. Integration of Cohesity Gaia Cohesity’s latest fundraising efforts also resulted in NVIDIA becoming a new investor. The integration of Cohesity Gaia with NVIDIA AI Enterprise will benefit customers by providing direct access to the latest AI capabilities to drive more efficient operations, offering greater insight into security risks and creating more value from their data. These capabilities will include: The ability for customers and partners to create domain-specific and performant generative AI models based on the customers’ Cohesity-managed data, using NVIDIA NIM. With this powerful combination, Cohesity customers can fine-tune their large language models with their data and adapt them to fit their organization's brand voice. A tool for customers to query their data via a generative AI assistant to gain insights from their data, such as deployment and configuration information, security, and more. The ability for Cohesity’s and NVIDIA’s developer and partner ecosystems to leverage Cohesity’s secondary data. This means that ecosystem partners can build generative AI apps that provide even deeper insights for their customers based on their data. Customers will be able to make the data securely available in an easy-to-consume way for partners and developers to build upon. NVIDIA-optimized generative AI Customers with Cohesity Gaia will be able to add generative AI intelligence to data backups and archives With NVIDIA NIM, customers with Cohesity Gaia will be able to add generative AI intelligence to data backups and archives. This will allow the companies to bring the power of NVIDIA-optimized generative AI to all Cohesity Data Cloud customers. Leveraging the power of performance-tuned and optimized NIM Cohesity Data Cloud customers will be able to obtain the power of data-driven insights from their data backups and archives, unleashing new levels of insight, efficiency, innovation, and growth. Unlock valuable insights The power of AI to unlock valuable insights from their enterprise data in a safe, secure, compliant Cohesity Gaia was developed to cater to the ever-changing needs of customers who seek to harness the power of AI to unlock valuable insights from their enterprise data in a safe, secure, compliant, and responsible manner. Cohesity has leveraged the power of AI/ML for years in various applications such as ransomware hunting, anomaly detection, threat intelligence, data classification, data entropy, and capacity prediction. With the advent of Cohesity Gaia, based on patent-pending Retrieval-Augmented Generation (RAG) technology, new, exciting opportunities will open for customers to analyze and uncover insights from their data like never before. Power of generative AI “Our collaboration, and NVIDIA’s investment in our company, is a testament to the promise NVIDIA sees in Cohesity as a pioneer and innovator in generative AI as evidenced by Cohesity Gaia,” said Sanjay Poonen, CEO and President, Cohesity. “Through this collaboration, technology and business executives will have a unique opportunity to leverage the power of generative AI, turning information into knowledge, while keeping their data both compliant and safe.” “Generative AI is a computing platform shift that’s opened a floodgate of new productivity opportunities for enterprises,” said Jensen Huang, founder and CEO of NVIDIA. “We’re working with Cohesity to enable businesses to gain greater value from their data without compromising security or management flexibility.” Availability Customers can learn more about Cohesity Gaia, which is now generally available and is expected to be followed by subsequent integration with NVIDIA AI Enterprise capabilities.
Matrix Comsec, a prominent provider of Telecom and Security solutions, effectively engaged in the MEP Conclave 2024, hosted at Taj MG Road, Bengaluru, spanning March 6th to 7th, 2024. Throughout the occasion, Matrix presented its extensive array of solutions, encompassing Access Control, Time-Attendance, IP Video Surveillance, and Telecom. The focal point of the occasion was the introduction of Matrix's All-Color Camera, crafted to capture colored images even in low-light or no-light situations. These cameras, equipped with warm LEDs and housed in the same enclosure as the Turret IP Camera, garnered notice for their capability to facilitate straightforward post-installation adjustments. OWASP ASVS 4.0 L2 standards The company presented its assortment of NVRs and Server-grade Enterprise-NVRs The recently unveiled Ruggedized IP Camera, adhering to EN50155 standards, attracted considerable attention, particularly for its adaptability in demanding settings like roads and railways. Attendees were impressed by these cameras' exceptional video quality, low-light sensitivity, and versatile monitoring capabilities, which include capturing images within swiftly moving vehicles. Matrix additionally showcased its Project Series and Professional Series Bullet and Dome Cameras, recognized for their cybersecurity attributes aligning with OWASP ASVS 4.0 L2 standards and verified by STQC, Delhi. The company presented its assortment of Network Video Recorders and Server-grade Enterprise-NVRs equipped with integrated VMS. Effortless connectivity options Matrix sets itself apart in the Access Control and Time-Attendance sector by internally manufacturing all architectural components, encompassing panels, door controllers, software, and readers. At the MEP Conclave, Matrix seized the opportunity to showcase its Access Control and Time-Attendance Solutions, ensuring compliance with GDPR. Additionally, the company presented a novel feature – integration with WhatsApp – enabling real-time alerts and notifications. The state-of-the-art door controller, COSEC ARGO FACE, captured notice for its precision in facial recognition, swift identification speed, and extensive user capacity. This device provides effortless connectivity options, including PoE, Wi-Fi, and Ethernet. Matrix's notable involvement The company's display featured an extensive array of Fixed Media Gateways and PBXs Within the domain of Access Control and Time-Attendance solutions, Matrix presented items such as the COSEC PANEL 200P, an Access Controller Hub with the capability to manage up to 255 COSEC door controllers and accommodate 25,000 users. During MEP, Matrix's notable involvement in the telecommunications sector emphasized its dedication to delivering comprehensive solutions tailored to contemporary communication requirements. The company's display featured an extensive array of Fixed Media Gateways and PBXs, encompassing Server-based PBX and Desk phones, addressing diverse organizational needs. Through live demonstrations, discussions, and interactive sessions, Matrix underscored its proficiency in providing scalable and dependable telecom infrastructure solutions. Security and telecom solutions Kaushal Kadakia, Marketing Head at Matrix Comsec said, "MEP Conclave, this year, gave us the perfect platform to present our cutting-edge security and telecom solutions to industry pioneers, project heads, and consultants." "Our primary objective was to understand their unique needs and illustrate how Matrix products precisely cater to large-scale project requirements."
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognize the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organizations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilize e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organizations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organizations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favor of technology companies abusing data about them and monetizing from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognize that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end-user license agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritize careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritize careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritizes Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Along with the growing adoption of cloud, SaaS applications have accounted for more than triple of the account-takeover attacks between 2019 and 2021, alone. Any given breach can potentially bankrupt many small businesses, with average costs reaching USD 4.35 million in 2022, according to a 2022 IBM report. Every business, no matter its size, must minimize these risks by deploying a range of cybersecurity tools and procedures. One of the most important elements is multifactor authentication (MFA). Some cyber insurance companies mandate MFA as a prerequisite for coverage and others will lower their premiums for companies that have deployed it. These insurers know how much more secure the enterprise is when multiple different verification methods are used for logging into accounts and applications. Importance of Cyber Insurance Cyber insurance has become a must-have for organizations that deploy and rely on digital systems. Small businesses are especially vulnerable to cyber threats since few have invested in the necessary security tools to defend against network breaches, scams and other types of cybercrime. Cyber insurance has become a must-have for organizations that deploy and rely on digital systems The good news is that cyber insurance policies are widely available and offer a broad range of coverage options. Some will pay the costs of direct expenses associated with a network attack as well as legal costs, including litigation defense payments, if the business could not meet contractual obligations because of the breach. Cyber insurance premiums Policies may also cover the cost of losing and then restoring access to technology after a breach. Policies may even cover the costs of transfer payment fraud caused by social engineering, as well as profit losses from reputational damage, although this can be restricted to a finite period of time. Depending on the coverage that is selected, cyber insurance premiums can be expensive, and a policy does not replace the solid foundation of an underlying cybersecurity framework. A foundation that includes MFA will help to stop cybercrime before it is committed while also making it easier to acquire and reduce the costs of cyber insurance. In fact, MFA is now one of the most common conditions for obtaining cyber insurance because of its proven ability to help prevent account takeover attacks and stop identity-related data breaches. Multifactor authentication overview The MFA ‘factors’ for confirming identity during login typically include something the user knows The MFA ‘factors’ for confirming identity during login typically include something the user knows (like a pin), something the user has (like a secure device), and something the user ‘is’ (like presenting a fingerprint or face scan to a reader or camera). Using these factors when accessing sensitive applications, systems, and data helps prevent attackers from compromising accounts. This is true even if the attacker has somehow tricked legitimate users into providing usernames and passwords through phishing schemes, in which seemingly legitimate emails are used to harvest this information. Preventing unauthorized access These types of attacks can be launched at scale and put millions of organizations at risk around the world. Some insurance providers simply will not cover them. They know that MFA can help organizations avoid these ‘user error’ attacks through authentication policies that prevent unauthorized access to any of the organization's networks, applications and devices, wherever they are located. The U.S. government has also required that all federal agencies use MFA Insurers aren't the only ones recommending and even mandating MFA. The U.S. government has also required that all federal agencies use MFA, per the Executive Order On Improving the Nation's Cybersecurity signed by U.S. President Joe Biden in May 2021. A similar recommendation has been made in Europe as part of ENISA guidelines. The barriers to MFA adoption by SMBs One might wonder why over 40% of small and medium size business(SMBs) in the United States don’t have a cybersecurity plan in place and why less than 15% of the ones that do have a plan, consider it to be inadequate. According to the Cyber Readiness Institute, when we dive deeper into the details, there are three key barriers to MFA adoption: Lack of Awareness — 55% of SMBs are reported to remain unprotected because they’re simply unaware of MFA and its benefits to their organization. Limited Understanding — Beyond a lack of awareness, 30% of business owners said they don’t utilize MFA because they simply don’t know how it works. In addition to the fundamental functionality, there are a variety of MFA options to consider, including a range of form factors that can be utilized to best meet an organization’s needs. Perceived Inconvenience — 20% of SMBs believe MFA is too inconvenient, when in reality, we’re all more familiar with the concept than we think. How smaller businesses can best implement MFA SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle by allowing them to quickly and easily increase security and convenience. MFA isn’t only about security, its also about convenience. Implementing MFA allows organizations to eliminate reliance on passwords, which can significantly improve user experience. So what should decision-makers know about MFA in order to implement it for their SMB? Ease of Use — The right MFA solution should offer a variety of authentication methods, but should also be easy to adopt and use across the organization. Multiple Methods and Form Factors — Determine the best combination of authentication methods and form factors. Some providers offer only a small selection, which can tie you down to very basic and inflexible options that do not fully meet your users unique needs. Easy Deployment and Management — Time is money, especially for SMBs. Some solutions can take months to deploy, require extensive training and new installation codes, as well as potential overhauls to existing applications. Look for a solution that can be up and running in days. A Complete Solution — Any MFA solution should provide comprehensive security across all of your assets, including your PCs, mobile devices, applications and networks Compliance — Compliance impacts businesses of all sizes. As such, be sure to find a provider that meets evolving industry standards, including data protection such as GDPR and CCPA. Adaptability — As your business grows, your security needs will also evolve, with some users or parts of your business requiring more security than others. Make sure your provider allows you to scale and adjust accordingly to offer the right security for the right users. Blocking cybercriminal attempts Leading and growing a smaller business is a big challenge. Fortunately, adopting MFA provides a safety net to help block cybercriminal attempts, protect your business’ reputation and most importantly, help protect your bottom line. MFA should be the foundation for any robust security strategy and many cyber insurance companies now require it to reduce premiums and even qualify for coverage. For best results, organizations should choose a solution that is easy to deploy, offers a broad range of authentication options and form factors, and gives users a smooth and convenient authentication experience.
Security beat
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorized test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organizations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realize the vision of Matter.
For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber security Userful Corporation provides a software system that enhances cyber security operations for an enterprise Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security. The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office. Real-time visibility “It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.” A typical cyber security operations center resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident. Userful’s software helps in managing operations centers Userful’s software manages how data is presented in an operations center environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure. Managing operations centers is a core offering for Userful Corporation, including command centers of all types, from traditional network operation centers to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems. Solutions that are easy to deploy, manage and scale Cyber security professionals need solutions that are easy to deploy, manage and scale" “We are a platform that can be utilized across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.” Compiling and displaying information to an operations center has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks. The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems. Security Orchestration, Automation and Response (SOAR) Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure. SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses. Cyber security threats Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualized. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity. Single platform/solution The single platform/solution also extends beyond operations centers to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth. In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software. Companies always have an ecosystem of interconnectivity Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organization. Dangers of random hardware on a network Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats. Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centers that involve three or four manufacturers, all siloed. Software versus hardware Our biggest challenge is to get people to understand what is possible with software versus hardware" “Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.” Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input. Corporate policy specifies security at every level Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards. To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).
Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximize that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges such as dysfunctional supply chains and lingering consequences of a global pandemic. Here are some of the larger and/or most impactful M&A transactions of 2021. Stanley Black & Decker sells to Securitas Stanley Black & Decker announces an agreement to sell most of its Security assets to Securitas AB for $3.2 billion in cash. The transaction includes Stanley Black & Decker's Commercial Electronic and Healthcare Security business lines. The businesses carry 2021 forecasted revenues of approximately $1.7 billion. “The business is well-positioned for ongoing growth within Securitas, a global pioneer in the security industry,” says James M. Loree, Stanley Black & Decker's CEO. Openpath’s solution makes businesses more secure with multi-factor authentication Motorola acquires Openpath and Envysion Motorola Solutions adds to its security industry portfolio with the acquisition of Openpath Security Inc.., a cloud-based mobile access control provider. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contactless entry experience, and can be easily scaled and managed due to its cloud-based architecture. Motorola also announces the acquisition of Envysion, a provider of video security and business analytics solutions for quick-service restaurant and retail industries. Delta Electronics buys March Networks Delta Group, a provider of power and thermal management solutions, purchased 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence company March Networks, from Infinova International Ltd. through its subsidiary Delta International Holding Limited B.V. Following the close of the transaction, it was expected that March Networks will continue to operate from its Canadian headquarters, and the March Networks executive management team will continue to lead the organization. Delta Electronics is also the parent company of VIVOTEK. APi Group acquires Chubb Fire and Security Business APi Group Corp. acquire the Chubb Fire & Security Business from Carrier Global Corporation for an enterprise value of US$ 3.1 billion. Headquartered in the United Kingdom, Chubb has approximately 13,000 employees globally and a sales and service network that spans 17 countries, serving more than 1.5 million customer sites in Europe, Asia Pacific, and Canada. APi Group is a business services provider of safety, specialty, and industrial services in more than 200 locations worldwide. Teledyne Technologies Inc. will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion Teledyne acquires FLIR Teledyne Technologies Inc. and FLIR Systems, Inc. jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion. Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction.” Resideo adds Norfolk Wire and Electronics Resideo Technologies, Inc. acquired privately held Norfolk Wire & Electronics, based in Richmond, Virginia. Norfolk was founded in 1985 and is a regional distributor of security, telecom, network, and audio-video (AV) related products, supplies, and tools. With 11 full-service retail locations and a 43,000 sq. ft. distribution center, Norfolk serves customers across the mid-Atlantic region and will be part of Resideo's ADI Global Distribution business, a wholesale distributor of security, AV, and low-voltage products. Triton acquires ACRE, which acquires Feenics and Matrix Triton Partners acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton is investing alongside the current management team of ACRE. Weeks later, ACRE acquired cloud-based workplace solutions company Time Data Security (TDS). Later in the year, ACRE announced acquisition of Feenics and Matrix Systems. Feenics brings cloud-based access control solutions brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio. Brivo, Inc. and Crown PropTech Acquisitions have entered into an agreement making Brivo a publicly listed company Brivo becomes publicly traded through the merger Brivo, Inc., a cloud-based access control and smart building technologies company, and Crown PropTech Acquisitions, a publicly traded special purpose acquisition company (SPAC), have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company. The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.” Nice buys Nortek Security Nice, a global manufacturer of smart home, security, home, and building automation solutions, , acquired Nortek Security & Control from Melrose Industries. Nortek Security & Control is a developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets. Eagle Eye acquires Uncanny Vision Eagle Eye Networks, a cloud video surveillance solutions company, has acquired Uncanny Vision Solutions, an artificial intelligence (AI) analytics and Solutions Company. The acquisition accelerates the company’s leadership in providing AI and analytics, to make customers’ businesses more efficient and the world a safer place. The acquisition also includes research and development (R&D) capabilities and a new regional office located in Bangalore, India.
Case studies
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
Security office in commercial and residential building requires state-of-the-art solutions that can keep up with the demands of modern surveillance and threat detection. With space-efficient design, high-performance processing, coupled with advanced data protection, NVR NViS 5704, a powerful video analytics solution, enable seamless surveillance operations and enhanced security measure in edge AI applications. These capabilities empower security office to efficiently monitor and analyze video streams, identifying potential threats and recognizing objects or individuals of interest in real-time. Optimal Space Utilization The NVR NViS 5704 boasts a compact 1U form factor with rack depth only 56cm, making it an ideal choice for security office with limited space. Its space-efficient design ensures seamless integration into existing infrastructure without compromising on performance. At the heart of the NVR NViS 5704 lies the 13th Gen Intel® Core™ Processor with Performance Hybrid Architecture, delivering up to 16 cores, including a balance of performance cores for intensive tasks and efficient cores for power optimization. NViS 5704 also features a PCIe x16 expansion with the flexibility to integrate accelerator cards or powerful graphics cards. This groundbreaking processing power and accelerator card support enable edge AI applications in video analytics, such as face/motion detection, object recognition, ensuring enhanced surveillance capabilities and efficient decision-making. Fortified Data Protection and Backup Data security is of utmost importance in commercial and residential building security operations Data security is of utmost importance in commercial and residential building security operations. The NViS 5704 comes equipped with TPM2.0 and Bitlocker drive encryption, providing robust data protection to safeguard sensitive information from unauthorized access and potential threats, especially when hard disk is lost or stolen. In addition, Intel RAID technology is utilized for secure data backup. With RAID D 0, 1, 5, 10 support, critical data can be mirrored or distributed across multiple drives, ensuring data redundancy and protection against data loss. The NVR NViS 5704 offers an unparalleled blend of power, flexibility, and security, delivering a comprehensive solution for these mission-critical environments, With its accelerator card support, advanced Intel® Core™ processors, and enhanced data protection features, the NViS 5704 empowers security professionals to stay one step ahead in their efforts to safeguard communities and assets. Safeguarding communities and assets Main Features of NVR NViS 5704 are as follows: System 1U Rackmount 12/13th Gen Intel® Core-i platform DDR4 up to 64GB HDD 4-Bays 3.5” (support RAID 0,1,5,10) 1 x NVME SSD, 1 x M.2 2242 SATA SSD Display DP1.4, 1 x HDMI 2.0b, 1 x HDMI 1.4 2 x 2.5GbE Intel® Ethernet Audio in/out/Mic PCIe x16
The ever-increasing number of shoplifting incidents is forcing retailers to turn to facial biometrics as a security measure. This has yielded impressive results: store owners confirm that such security systems identify thieves by their faces and cite a reduction in theft-related losses between 50 and 90%. Modern facial recognition systems employ advanced algorithms that both ensure data privacy and adhere to international GDPR. Retail theft and robberies Retail store managers have noted a recent rise in thefts and robberies. As reported by Charged, a British retail news outlet, this disturbing trend emerged in 2018-2019 and has since evolved into a pressing issue. Interestingly, the rise in shoplifting incidents coincides with a broader surge in crime rates, as independent research portal Numbeo assigns a "high" rating to this metric in many Latin American cities. Retail security survey 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons The increase in retail attacks, as well as a growing level of aggression from organized groups, is prompting widespread concern. The 2021 "Retail Security Survey: The State of National Retail Security and Organized Retail Crime" report by the National Retail Federation provides some alarming statistics. According to the report, 64% of respondents observed a surge in losses from organized criminal groups since 2016, while 53% reported an escalation/increase in theft. What is more, 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons. The average loss per theft The National Retail Federation approximates the average loss per theft incident in a store at $462, with organized robberies amounting to nearly $7,500. Furthermore, data from the British Retail Consortium, as reported by the Daily Mail, reveals an alarming increase in-store theft incidents, soaring from 3 million cases in 2016-2017 to 8 million in 2022. Delayed response Theft cases below a certain monetary value are often deemed low-priority and go uninvestigated The often delayed response of the police to shoplifting incidents leaves retail businesses vulnerable to theft. Store employees, wary of potentially armed perpetrators, avoid personally confronting suspects, while law enforcement personnel respond to incidents only after the criminals have already made their escape. Additionally, theft cases below a certain monetary value are often deemed low-priority and go uninvestigated. Latin America relies on biometric technologies Fortune Business Insights predicts the global facial recognition technology market to reach an impressive $13 billion by 2027, with a compound annual growth rate (CAGR) of 14.8%. The 3D recognition sector exhibits even swifter growth, with Market Research Future reporting a CAGR of 21.6%. Biometric technology development The Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22% However, it is Latin America that is considered the most favorable region for biometric technology development, with its biometrics market surpassing the global growth rate by far. Multiple research firms, including Inkwood Research, anticipate that the Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22%. Government investments Analysts identify Brazil, Mexico, and Argentina as key influencers in the regional development of biometric technologies. This trend is attributable to both governmental investments in initiatives like safe cities or digital identification, and private sector endeavors to mitigate the escalating crime rates. How facial recognition protects against theft A facial biometrics system installed in a major retail store chain prevents thousands of crimes Retailers are finding effective protection against growing losses through a combination of organizational protocols, staff training, and the adoption of ready-to-use security solutions, such as anti-theft systems, in-store surveillance, and biometric technologies. Facial recognition systems have proven to be highly effective in preventing theft and robberies. For example, according to the Daily Mail, a facial biometrics system installed in a major retail store chain prevents thousands of crimes each month. AI-based system Additionally, Charged disclosed that a local convenience store saw a staggering 90% reduction in losses following the installation of an AI-based system. Facial biometric systems assist security services in monitoring the store and promptly identifying any infractions. How it works Cameras installed in the store capture video footage, which the system then uses to extract facial images and create biometric profiles stored in a database. The system continuously cross-references real-time video data against the biometric profiles already cataloged in the database. In case a customer was previously involved in theft, vandalism, or similar incidents features on the "stop-list," the system notifies the security service, prompting closer monitoring of the said individual. Detect suspicious activities and alert By integrating facial biometrics with video analytics, the system can quickly detect suspicious activities and alert security personnel. The incorporation of facial biometrics helps to: Significantly reduce losses from theft, robbery, and vandalism, Improve the efficiency of security services, Lessen the strain of manually sifting through footage from multiple cameras, Minimize the potential for human error in in-store security, Enhance interaction with customers by incorporating biometrics into marketing systems. Police departments also benefit from increased crime-solving rates, while retail industry professional associations can curb recurrent thefts by sharing "stop lists" and biometric data on criminal gangs and individual offenders. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces Brazilian Shopping Center case study Jockey Plaza, a shopping center in Curitiba, Brazil, implemented a comprehensive security system featuring video analytics and facial biometrics. This modern facility, spanning 200,000 square meters, accommodates 400 stores and 28 food establishments. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces, a facial biometrics solution developer. Id-Guard facial identification software To enhance the security of the shopping center, automate security operations, and expedite crime investigations, they chose to employ RecFaces' Id-Guard facial identification software. Id-Guard seamlessly integrates with video surveillance and video analytics systems, offering biometric identification, real-time and retrospective face search within video streams, and stop listing capabilities. Saves time Implementation of Id-Guard saves security specialists time as they no longer have to spend hours" "The moment a person on the stop list enters the camera's field of view, the operator is immediately notified," says Cristiano J S Maffessoni, Francaza’s CIO. "Based on our experience, implementation of Id-Guard saves security specialists time as they no longer have to spend hours sifting through video footage when investigating incidents." 50% cut in shoplifting instances According to Cristiano J S Maffessoni, the payback period for the Jockey Plaza shopping center project is less than 3 years thanks to a 50% cut in shoplifting instances, swift resolution of crimes, and increased efficiency of security services. The return on investment for biometric systems typically spans 1 to 3 years, depending on the crime rate in the vicinity of the shopping center. To calculate effectiveness, it is necessary to evaluate the average loss per incident, the average number of similar incidents annually, and the incident reduction rate, generally fluctuating between 30% and 70%, based on the security service's efficacy. Ready-to-use biometric solutions Our solutions allow customers to identify offenders, instantly respond to incidents, and foster loyalty" Maria Kazhuro, RecFaces' BDM in Latin America, shares, "RecFaces has developed two lines of ready-to-use biometric solutions specifically designed for the security and retail sectors." "We've seen an immense demand for our ready-made solutions in Latin America, thanks to their quick and easy deployment on any equipment. Our solutions allow customers to identify offenders, instantly respond to incidents, conduct marketing research, and foster customer loyalty." Data storage method RecFaces' Id-Guard, a biometric ready-to-use solution, stores only biometric template feature vectors that cannot be reconstructed into facial images in its database. This data storage method adheres to international GDPR data protection regulations and is supplemented by AES-256 standard encryption mechanisms for critical data.
A town in Arunachal Pradesh becomes a ‘Smart City’ with AI-powered Videonetics Solution. A smart, resilient, and unified solution enables public safety, asset security, and traffic management for the city. The customer One of the prominent towns in Arunachal Pradesh, India, made it into the Government of India’s Smart Cities Mission development scheme with a vision of building a well-managed clean, green, and environment-friendly city. This city is envisioned to possess a character of its own, defined by scenic beauty, intellectual capital, and eco-friendly tourism through sustained economic growth for all its citizens. The target is to create a replicable role model that can act like a lighthouse to other aspiring towns of Arunachal Pradesh. Challenges Over the past few years, the town has witnessed a high influx of students, visitors, and tourists The town is fast becoming a bustling tourist attraction in Arunachal Pradesh. Before this, the town had a limited deployment of CCTV cameras, and the system was not well suited to even conduct any investigations if an unwanted incident were to happen. Over the past few years, the town has witnessed a high influx of students, visitors, and tourists. Understandably, infrastructure has also shown rapid growth, and hence local authorities understood the need to address concerns of vigilance, traffic, municipality, assets protection, and safety of the citizens. Solution The official body formed to execute the vision of a safe city wanted to implement a comprehensive surveillance solution to monitor law and order situations, road safety, identify miscreants, protect public and private properties, and improve urban amenities. A project team comprising officials of the governing body, Videonetics, and system integration partners, carried out extensive research to identify important spots around the town and prepared a comprehensive surveillance strategy. Videonetics designed a versatile and unified solution that includes Intelligent Video Management System (IVMS 3.0), AI-powered Video Analytics, Automatic License Plate Recognition (ALPR) System, and Face Recognition System (FRS). 24x7 Geo-situational awareness and accelerating response time: Operators in the command and control center monitor over 180+ locations across the town with Videonetics Intelligent VMS using multi-layer GIS maps for a clear view of cameras spread across the geography. This covers areas like government establishments, public areas, airports, railway stations, schools, parks, markets, and roads. Suspect tracking and face recognition: The city deployed network cameras to process video streams with the Face Recognition application (MeraFace™) at city entry-exit points and other public areas. The forensic investigation features of the application also help in a quick search for evidence and identifying suspects during investigations. AI-powered video analytics for the safety and security of people and assets: Artificial Intelligence powered video analytics has been deployed strategically across various facilities throughout the city while keeping in mind the requirements specific to each site. Line crossing detection is deployed along perimeters of correctional facilities to detect intrusion. Face recognition application is also used at entry-exit gates to recognize faces in live video streams. ‘Unattended Object Detection’ use case has also been applied to identify objects that can pose a security threat. Fire and smoke detection has been deployed at the airport and road intersections across the city to detect fire and smoke caused by accidents. Parks and gardens are being monitored to detect people collapsing. Face recognition is also being used to identify people. Crowd formation and estimation has been put to use in public areas like hospitals and VIP hotspots to manage crowd efficiently. To keep the city clean, the municipality body is using AI-powered Video Analytics to detect the overflow of garbage bins installed at all garbage collection centers. Also, to keep a constant track of the timely collection of garbage and identify people violating guidelines and penalize them, the face recognition system has been deployed as well. To protect various government buildings and schools, ‘Vandalism and Graffiti Detection’ use cases have been deployed, along with the face recognition system to identify frequent perpetrators and alert the authority for timely action. In the quest for maintaining the environment and air quality, authorities are using AI-powered Video Analytics to ‘Detect Polluting Vehicles’ in real-time. Accessing vehicle details with ease: Videonetics’ Vehicle License Plate Recognition (ANPR or ALPR) application is deployed across 34 locations such as inter-city roads, intersections, entry-exit points of the city and highways. This is done to capture and record the license plate of any vehicle class and store them in the database for any future investigations. ANPR also supports city officials in identifying suspicious or wanted vehicles or non-standardized number plates in real-time and alert police officials on time. It has been quite helpful in solving cases of ‘stolen’ vehicles in the city. Impact The town has become a shining beacon emblematic of the concept of a truly safe and smart city, as the unified video management platform of Videonetics has successfully provided tools to multiple agencies to solve real challenges beyond the basic need of monitoring for security purposes. Here is a quick summary of the derived benefits of the end-to-end solution: Active monitoring round-the-clock, in-built Video Analytics, ANPR, and facial recognition system has helped law enforcement authorities to manage traffic efficiently, enhance safety for citizens, and protect local businesses and city infrastructure. Working with city administration, control room operators can switch between video feeds using dynamic maps that empower them to obtain critical event information and manage emergencies by alerting stakeholders for quick action. And when necessary, the Videonetics solution makes it possible to share forensic videos across departments, facilitating more collaborative and successful response efforts. On the traffic front, operators gain vital statistical insights into traffic flow across the city that helps in pre-emptive planning to reduce congestion. The authorities also get alerts when there is a hot listed vehicle spotted. Face Recognition System (MeraFace™) has proven to be a watchful eye in identifying people of interest, suspects, criminals, and trespassers, and alert teams for faster response and intervention to curtail threats The open and modular architecture of the solution not only allows the city to continue adding more applications to make its traffic management more robust but also integrates the city surveillance system in a single unified interface to address overall security concerns with a holistic approach.
MVM is a nationally-owned energy group with a mission to provide affordable and clean energy. Its portfolio covers the total domestic energy system in Hungary, where it is the dominant electricity wholesale trader; and it also operates in Austria, the Czech Republic, Croatia, Slovakia, Romania, and other parts of Europe. It is actively increasing its presence in regional markets, as well as expanding into areas of sustainable energy including solar power, hydropower, and natural nuclear. Electricity generation by the MVM Group is already about 83% carbon neutral. Challenge MVM had 14 photovoltaic power plants that needed to be protected in high-residential areas while protecting the privacy of neighboring residents. Because of their locations, these sites were at high risk of vandalism, trespass, and theft of equipment. Also due to the adjacent residential settings, traditional security technology such as fence detection and outdoor visual CCTV could not be used. Solution: Thermal and PTZ cameras Protecting the privacy of neighboring residents The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T The MVM security team turned to Hanwha Vision for its thermal cameras, as a way to protect its high-value photovoltaic assets, while adhering to GDPR and protecting personal privacy. Over 100 thermal cameras were installed along with PTZ cameras with a handover function. The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T. Good features and reasonable pricing “Hanwha Vision has a very balanced product line with good features and reasonable pricing,” explained Tamás Tánczos, Security Engineering at MVM, adding “It was a natural choice when we realized that on these sites we couldn’t use fence protection, infrared, or microwaves to detect intruders. With the thermal cameras, we could rest assured that no personal data would be gathered.” Results Motion detection The thermal cameras help MVM protect its photovoltaic sites without compromising neighboring residents’ privacy. They come equipped with Motion detection, Handover, Tampering, Loitering, Directional detection, and Audio detection features built-in to boost operators’ situational awareness. The TNO-4040T and TNO-4050T can additionally detect changes in temperature, such as a potential fire, and shock detection, which could indicate displacement or hard blows to the device. Intelligent video analytics While the camera is constantly scanning for potential intrusion and motion detection, operators can continue to work on other activities with alerts issued for any events that need their response. This makes the system more intelligent and efficient compared to traditional fence detection or basic CCTV cameras. Visibility Because the cameras work through thermal imaging, they are not affected by low light levels or visibility, so inclement weather doesn’t impact their effectiveness. Operators consistently receive good images and resolutions no matter the environmental conditions. Further expansion planned The project initially involved 14 sites but as the effectiveness and benefits of the Wisenet cameras are proven, this is expanding to other sites in MVM’s portfolio. The team is also considering adding thermal cameras with built-in AI due to launch soon.
MVM is a nationally-owned energy group with a mission to provide affordable and clean energy. Its portfolio covers the total domestic energy system in Hungary, where it is the dominant electricity wholesale trader; and it also operates in Austria, the Czech Republic, Croatia, Slovakia, Romania, and other parts of Europe. It is actively increasing its presence in regional markets, as well as expanding into areas of sustainable energy including solar power, hydropower, and natural nuclear. Electricity generation by the MVM Group is already about 83% carbon neutral. Protecting the privacy of neighboring residents Over 100 thermal cameras were installed along with PTZ cameras with a handover function MVM had 14 photovoltaic power plants that needed to be protected in high-residential areas while protecting the privacy of neighboring residents. Because of their locations, these sites were at high risk of vandalism, trespass, and theft of equipment. Also due to the adjacent residential settings, traditional security technology such as fence detection and outdoor visual CCTV could not be used. The MVM security team turned to Hanwha Vision for its thermal cameras as a way to protect its high-value photovoltaic assets while adhering to GDPR and protecting personal privacy. Over 100 thermal cameras were installed along with PTZ cameras with a handover function. The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T. Author's quote “Hanwha Vision has a very balanced product line with good features and reasonable pricing,” explained Tamás Tánczos, Security Engineering at MVM, “It was a natural choice when we realized that on these sites we couldn’t use fence protection, infrared, or microwaves to detect intruders. With the thermal cameras, we could rest assured that no personal data would be gathered.” Intelligent video analytics Operators consistently receive good images and resolutions no matter environmental conditions The thermal cameras help MVM protect its photovoltaic sites without compromising neighboring residents’ privacy. They come equipped with Motion detection, Handover, Tampering, Loitering, Directional detection, and Audio detection features built-in to boost operators’ situational awareness. The TNO-4040T and TNO-4050T can additionally detect changes in temperature, such as a potential fire, and shock detection, which could indicate displacement or hard blows to the device. Highly intelligent and efficient system While the camera is constantly scanning for potential intrusion and motion detection, operators can continue to work on other activities with alerts issued for any events that need their response. This makes the system more intelligent and efficient compared to traditional fence detection or basic CCTV cameras. Because the cameras work through thermal imaging, they are not affected by low light levels or visibility, so inclement weather doesn’t impact their effectiveness. Operators consistently receive good images and resolutions no matter the environmental conditions. Further expansion planned The project initially involved 14 sites but as the effectiveness and benefits of the Wisenet cameras are proven, this is now expanding to other sites in MVM’s portfolio. The team is also considering adding thermal cameras with built-in AI due to launch soon.
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadGunshot Detection
Download