Hybrid security
Synology Inc. has announced two additions to its enterprise-class M.2 NVMe solid-state drive line for SSD caching, and its latest generation 10/25GbE network cards to drive forward storage and networking performance on its storage solutions. New 800 GB models for the SNV3400 M.2 2280 and SNV3500 M.2 22110 NVMe SSD lines are designed to let users with larger data sets cache more data, allowing for higher and more consistent performance improvements over HDD-based arrays. Dual-port 10GbE SFP+ E1...
BCDVideo, a globally renowned video data infrastructure solutions firm, has debuted its new Hybrid Cloud Connectivity offering, in partnership with premier software developer, Tiger Technology. Known for their work designing secure, high-performing data management solutions for companies across Enterprise IT, Surveillance, Media and Entertainment, and Small Medium Business (SMB)/Small Medium Enterprise (SME) markets, Tiger Technology’s software expertise pairs with BCD’s prowess in...
Workforce management specialist, Synel Industries UK (Synel UK), has introduced the latest version of Synergy Access, a cloud-based access control solution which provides a scalable and cost-effective way to manage who is allowed access to restricted areas. Available as a stand-alone solution or as part of a wider suite of software from Synel that includes Time and Attendance and other workforce management modules, Synergy Access is designed to provide a future-proof solution for access control...
Globally renowned IP video surveillance integrator, NW Security (NW Systems Group) has signed a partnership agreement with the major unified, intelligent security-as-a-service solutions provider, Arcules. Arcules VSaaS platform The Arcules Video Surveillance as a Service (VSaaS) platform provides organizations with an underlying cloud infrastructure, which offers features such as compatibility between sites, low video latency, data encryption, redundancy, streamlined maintenance, automatic fir...
Red Hat announced a definitive agreement to acquire StackRox. This is an exciting milestone for StackRox and a tremendous validation of the company’s innovative approach to container and Kubernetes security. It combines the industry’s first Kubernetes-native security platform with Red Hat’s renowned enterprise Kubernetes platform, OpenShift - helping businesses further accelerate their digital transformation initiatives by more securely building, deploying and running their cl...
Eagle Eye Networks, the globally renowned company in smart cloud video security, has shared the trends that will have the biggest impact on video surveillance, security, and use of analytics, to drive business intelligence and improvement in 2021. Cloud and advanced analytics Customers are asking for the cloud and advanced analytics will transform video surveillance systems into even more valuable business solutions. Compliance requirements are constantly evolving and IT departments are engagi...
News
As businesses move to hybrid remote and in-person workplaces while complying with evolving public-health mandates, they must manage a dynamic enterprise environment with more complex safety and security challenges. HID SAFE Facility and Risk Analytics HID Global, a globally renowned company in trusted identity solutions, has announced its HID SAFE Facility and Risk Analytics solution that improves efficiency, agility and flexibility in hybrid workplaces through real-time occupancy monitoring, risk analytics and alerting, and reporting. HID Global has seamlessly integrated the Innominds AI-powered iFusion technology into its HID SAFE Facility and Risk Analytics solution so users can create an easy-to-understand risk score based on real-time and historical behavior patterns. Integration with Innominds AI-powered iFusion technology The solution uses artificial intelligence to compare workplace data from physical security systems to archived information about past access control events, including unauthorized activities. This provides a clear picture of emerging threat scenarios so as to enable organizations to diagnose and resolve security risks effectively. “The ability to identify patterns of behavior that highlight risk is critical for businesses that increasingly are adopting a hybrid work model with more complex risks and compliance needs,” said Julian Lovelock, Segment Vice President at HID Global, adding “Innominds' iFusion’s deep predictive analytics capabilities and its integration with HID Global’s physical identity management solutions are designed to ensure a secure enterprise work force environment thus enabling enterprises to embrace the new normal.” iFusion analytics technology iFusion analytics technology uses Innominds’ proprietary accelerators to generate deep insights iFusion analytics technology uses Innominds’ proprietary accelerators to generate deep insights, predictive analytics and real-time reporting from complex data. The technology enables HID SAFE solution users to predict security events so they can improve the effectiveness, efficiency, and cost of their security operations. “We are pleased with this possibility of supporting enterprises’ return to work with solutions built on our AI, analytics and data engineering expertise. We are thrilled to be collaborating with HID Global who are leveraging our proprietary accelerators and AI-driven analytics platforms such as iFusion,” said Krishna Guda, President and Chief Strategy Officer, Innominds. Hybrid work solutions Krishna adds, “Our joint vision to offer a secure back-to-work solution for future enterprises becomes a reality with this collaboration. This strengthens our endeavor to power the Digital Next initiatives of global companies and be at the frontiers of the future of work.” In a recent HID survey, almost 70 percent of customers said the future of work will be hybrid. With the HID and Innominds collaboration, customers now have the deep insights, predictive analytics, and real time reporting to rapidly diagnose and resolve threatening situations while also meeting evolving compliance requirements in the new hybrid work environments.
ExtraHop, the provider of cloud-native network detection and response, announced a new distribution agreement with Exclusive Networks, a specialist IT security distributor, to cover five countries across Europe including Denmark, Finland, Norway, Sweden and Netherlands. The agreement spans the entire portfolio of ExtraHop security and cloud products and services. Exclusive Network’s sole focus is on the distribution of innovative cybersecurity solutions to protect systems, data and applications across hybrid networks and modern distributed workforces. As a true Value-Added Distributor, Exclusive offers a full range of technical and business services which are made available to partners through the Exclusive partner success program, a unique best practice engagement methodology. Cybersecurity challenges “Exclusive Networks brings a wealth of expertise with the ability to leverage innovative technology solutions that complement ExtraHop’s world-class NDR, helping our partners to solve today’s complex cybersecurity challenges,” said Mark Fitzmaurice, Vice President of Global Channel Sales at ExtraHop. “Europe is a fast growing territory and this agreement recognizes the pressing enterprise need to raise visibility, improve real-time detection of critical threats, and offer streamlined guided investigation.” ExtraHop partner portal provides easy access to just-in-time sales and training materials for ExtraHop partners Exclusive will help on-board new partners into the ExtraHop Panorama Partner Program and support accreditation training that offers partner sales engineers a deeper technical view of the ExtraHop solution including demos, key use cases and competitive differentiation. In addition to accreditation, the ExtraHop partner portal provides easy access to just-in-time (JIT) sales and training materials that help ExtraHop partners rapidly identify use cases and fast-track solutions for their customers. Network traffic analysis Exclusive Networks is partnered with popular cloud and cybersecurity solutions vendors like ExtraHop to provide anywhere, anytime delivery via global logistics and on-the-ground services support in 100+ countries. Centred around its own 24/7 international local-language support capabilities, Exclusive Networks helps its channel partners develop skills, close deals, solve challenges and maximize customer loyalty. Kris Van den Bergh, Regional Director for Exclusive Networks said, “ExtraHop Reveal(x) is a powerful yet proven solution that delivers best in class network traffic analysis that helps security analysts to efficiently detect and investigate late-stage threats, as well as proactively improve security hygiene. We are excited to add the solution to our portfolio and look forward to working closely with the ExtraHop team to support our partners and grow the market.”
ASSA ABLOY Opening Solutions completed the integration of their Aperio wireless lock technology with vIDix Control, a security management system from Ban-Koe Companies, who provides workplace security and workforce management solutions to thousands of organizations worldwide. “Integration with the Aperio locksets provides vIDix Control customers with the ability to extend electronic access to areas of their facility that are typically off limits to a wired solution,” said Steve Lohman, Workplace Security Solutions Product Advocate at Ban-Koe Companies. Aperio wireless technology integration The Aperio integration offers vIDix Control customers an easy way to connect additional openings to their new and existing system installations. Aperio is a global wireless access control platform that works with extensive locking hardware options from ASSA ABLOY Group brands, offering the flexibility to address a variety of applications throughout any facility. Aperio wireless platform uses wireless communication between the lock and an Aperio hub The Aperio wireless platform uses wireless communication (IEEE 802.15.4) between the lock and an Aperio hub to provide real-time communication to the access control system, simplifying installation and reducing costs. vIDix Control vIDix Control is a comprehensive security platform, enabling visibility into day-to-day security operations to provide assurance that facilities and personnel are safe and secure. This all-in-one security platform delivers the power to securely manage doors, gates & elevators, view live & recorded video based on events, send mass notifications, manage event status and more. “The Aperio integration with vIDix Control combines ease of use with flexibility and scalability to enable comprehensive security management for any facility,” said Mark Duato, Executive Vice President, Aftermarket at ASSA ABLOY Opening Solutions Americas.
PACE Security, a Southern California-based security integration and systems design firm, has announced that it has added the Alcatraz Rock autonomous access control platform to its solutions portfolio. “We are excited to have PACE embrace the Alcatraz Rock and its ability to deliver access control via facial authentication,” said Alcatraz Chief Revenue Officer, Tina D’Agostin. Alcatraz Rock added to portfolio Tina adds, “PACE has already successfully delivered autonomous access control solutions to its clients with the Rock platform, including an installation they have already done for the Martin Luther King, Jr., Community Hospital in Los Angeles.” Based in Southern California, PACE Security has been delivering innovative approaches to security integration for 25 years. PACE provides complete solutions from engineering to the implementation and installation of equipment and complete customer training for seamless integration of access control, closed circuit television, and security. Two-factor authentication Adding the Alcatraz Rock to access control projects allows delivering customers a ‘level 10’ in access control security PACE Security Owner and President, Raymond (Ray) Downs said, “Adding the Alcatraz Rock to access control projects allows them to deliver customers a ‘level 10’ in access control security. Because the Rock can be used in a two-factor authentication where individuals badge in and also have to use facial authentication along with the badge that is as secure as you can get.” He adds, “It can’t be compromised if someone loses an ID badge or if it falls into the wrong hands. They also like the fact that they are not technology restricted by the Alcatraz Rock, since it works with any access control platform. The Alcatraz Rock integrates easily into nearly all access control platforms and can be used on any element at any system at any time. It’s an impressive product and we have a lot of enthusiasm about it.” Touchless and secure physical access control Alcatraz Rock offers a touchless and secure physical access control platform that works with any access control system. It replaces or augments badging as a credential with facial recognition, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. The Rock uses passive 3D sensing, machine learning for increased security, and accurate tailgating detection, while intelligently enrolling employees as they are badging in, eliminating the headaches associated with traditional onboarding. A newly added feature provides a mask detection mode, the Mask Enforcer, to help businesses comply with post-COVID-19 government-mandated facemasks.
ExtraHop, a globally renowned company in cloud-native network detection and response solutions, has announced that it has achieved Amazon Web Services (AWS) Security Competency Status for Reveal(x) 360. AWS Security Competency Status This Security Competency Status designation recognizes the company’s demonstrated technical proficiency and proven ability to help customers secure workloads, applications, and data on AWS at the speed and scale of the cloud. “Earning AWS Security Competency status is a significant step in our commitment to helping our customers achieve their cloud security goals,” said Raja Mukerji, Chief Customer Officer and Co-founder, ExtraHop. Raja adds, “Enterprises are leveraging the cloud to accelerate digital business initiatives, and security teams find themselves in the challenging position of establishing visibility and control without adding friction to DevOps. By working with AWS, ExtraHop enables our customers to confidently and securely take full advantage of the speed, agility, and innovation unleashed by the cloud.” ExtraHop Reveal(x) 360 ExtraHop Reveal(x) 360 is a SaaS-based solution that helps organizations running on AWS discover, investigate, and respond to hidden security threats across the hybrid enterprise. Reveal(x) 360 provides the ‘ground source of truth’ in the cloud with deep visibility, real-time threat detection, and intelligent response capabilities. By natively integrating with Amazon Virtual Private Cloud (Amazon VPC) Traffic Mirroring, Reveal(x) 360 provides agentless visibility, including into SSL/TLS encrypted traffic, with no impact to the development process. advanced machine learning and behavioral analysis Reveal(x) 360 uses advanced machine learning and behavioral analysis Reveal(x) 360 uses advanced machine learning and behavioral analysis, leveraging metadata extracted from cloud traffic, to accurately identify anomalous behaviors and malicious activity whenever they occur within or across the cloud. ExtraHop continually brings industry-renowned security technology to customers, and the latest Reveal(x) 360 updates improve cloud visibility, real-time threat detection, and response capabilities for cloud and hybrid deployments. Examples include: Faster triage of cloud related threats: Automatic discovery and grouping of cloud services enables security teams to quickly discover and examine unusual cloud activity such as large amounts of data moving out of Amazon S3 buckets or suspicious IP addresses accessing AWS services. Rapid discovery of insider attacks and advanced persistent threats (APTs) targeting public cloud user environments: Reveal(x) 360 uses advanced machine learning, real-time threat intelligence, and behavioral analysis to discover unauthorized behavior indicative of APTs or, for example, suspicious activity by authorized AWS users. Improved cloud security posture and reduced risk: Continuous monitoring and correlation of activity between cloud services, private cloud, and on-premises data centers enables faster discovery and remediation of attacks across multiple environments or moving between on-premises and cloud resources. AWS Competency Program Amazon Web Services (AWS) is enabling scalable, flexible, and cost-effective solutions from startups to global enterprises. To support the seamless integration and deployment of these solutions, AWS established the AWS Competency Program to help customers identify AWS Consulting and Technology Partners with deep industry experience and expertise.
DigiCert, Inc., the globally renowned provider of TLS/SSL, IoT and PKI solutions, has introduced Secure Software Manager, a modern way to automate and manage PKI security across CI/CD pipelines. Secure Software Manager Secure Software Manager makes it easy for enterprises to integrate secure key management for code signing into their development processes, while delegating cryptographic operations, signing activities and management in a controlled and auditable way. The drive for agility leaves product engineering organizations exposed to internal threats and hackers. Stolen code signing certificates and their associated keys have led to many high-profile attacks, where these keys have been used to sign malware and commit fraud. Cryptographic asset protection Secure Software Manager removes the burden on engineers for cryptographic asset protection DevOps teams need signing solutions that fit within their workflows and make signing keys easily accessible when pushing code, but many orchestration tools do not include key protection. Secure Software Manager removes the burden on engineers for cryptographic asset protection, enabling them to sign with confidence and freeing them to do what they do best: develop and deploy software quickly and efficiently. It provides: Command line tools that easily integrate with CI/CD systems. Automatic signing of packages, binaries and containers on every merge to master when authorized. RESTful APIs for custom integrations. Simultaneous signing of Docker containers and software code, adding trust to every step of process. Strengthening security around key accessibility Using Secure Software Manager reduces the risk of key theft and misuse by strengthening security around key accessibility and storage. Hash signing lets developers protect intellectual property, as no files are uploaded to the cloud. Additionally, IT organizations must comply with a variety of rapidly changing regulations that require robust key protections across increasingly dynamic and orchestrated environments. They also require full reporting and auditing capabilities to ensure compliance. Secure Software Manager enables: Secure private key management in hardware security module (HSM) and offline mode for keys when not signing. Flexible deployment via SaaS or on a public or private datacenter. Centralized user management with flexible, role-based permissions and single sign-on (SSO). Audit trail of signing activity for forensics and full accountability. Data and cyber security Secure Software Manager meets customers where they need to be, whether on-premises or in the cloud" “Secure Software Manager meets customers where they need to be, whether on-premises, in the cloud, or in hybrid environments through the DigiCert ONE platform,” said Senior Vice President of Product (Emerging Markets), Brian Trzupek, at DigiCert, Inc., adding “Our customers can enjoy complete automation or tailor the solution to support the degree of functions they require and be assured of seamless integration with their familiar CI/CD tools and processes.” Beyond authenticating devices for the IoT and enterprise networks with certificates issued from DigiCert ONE managers, organizations can also secure code and firmware. This includes enabling secure over-the-air updates throughout the lifetime of the device, using Secure Software Manager. Built on DigiCert ONE, PKI management platform Secure Software Manager is built on DigiCert ONE, a PKI management platform built with a new architecture and software to be the PKI infrastructure service for today’s modern cloud-native challenges. Released in 2020, DigiCert ONE software platform offers multiple management solutions and is designed for all PKI use cases. Its flexibility allows it to be deployed on-premises, in-country or in the cloud to meet stringent requirements, custom integrations and air gap needs. It also deploys extremely high volumes of certificates quickly using robust and highly scalable infrastructure. DigiCert ONE delivers end-to-end centralized user and device certificate management, a modern approach to PKI to provide trust across Kubernetes clusters and dynamic IT architectures.


Expert commentary
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Last year, Genetec predicted that cybersecurity would be taken much more seriously as the Internet of Things (IoT) opened more doors for hacking and network take overs. We also predicted that that there would be an increase in the adoption of Software as a Service (SaaS), expanding choice and convenience from new ownership models via hybrid (on-premises and Cloud) and Cloud-only models. Cyber Accountability Awareness 2017 was also a year of awareness about ‘Cyber Accountability’. Rising cyber-crime and the increasing threats saw organizations taking direct action to mitigate their risks. There was a greater demand for cybersecurity/cyber-incompetence malpractice insurance in the physical security space. The physical security industry is continuing to grow at a rate that most other industries would envy. However, the “race to the bottom” and the rise of ultra-low-cost surveillance sensor equipment is negatively affecting the industry as a whole on several levels: Not only are profit margins being eroded, but these ultra-low-cost devices are being fielded and subsidized by state-owned organizations which raises troubling questions around privacy, data sovereignty and cyber security. More Focus On Privacy Protection In 2018, we will see a lot more focus on privacy protection and compliance. People want to feel safe, but not watched. This is where privacy protection and encryption technology play a role in ensuring that security professionals have enough information to be able to do their job while protecting the privacy of the public. In addition to privacy and data protection, there is a greater demand for organizations and institutions to not only make sense of an increasing array of data from sensors and connected devices, but to take meaningful and smart action on these data. Software that help organizations build and activate this type of operational resiliency and security intelligence will lead the way in 2018. Genetec celebrated its 20th anniversary and welcomed its 1,000th employee in 2017. We are still proudly privately owned and will continue to grow and march to our own drummer while delivering our usual brisk pace of software innovation.
Organizations are moving to align their physical and digital security initiatives, especially in today’s more connected world Organizations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. At the same time, their users are demanding more choices of smart cards, smartphones, wearables, and other mobile devices that can do much more than simply open doors in an increasingly connected world. Cobbling together disparate solutions creates vulnerability gaps and can be expensive and difficult to manage. For these and other reasons, many organizations are moving to align their physical and digital security initiatives, especially in today’s more connected world tied to the Internet of Things (IoT). They are adopting new ways of thinking about trust in smart environments and evolving how they use trusted identities across their operations. In the process, they are discovering better ways to establish, create, use and manage secure credentials using hybrid on-premises and cloud solutions both for access control and to tie people, assets and processes to the Internet of Trusted Things (IoTT). Simpler And More Efficient Approaches Cloud-based solutions such as Microsoft Azure are already widely used for IT access management and there is now growing interest in harnessing the cloud to manage trusted identities used for physical access management as well. Today’s solutions span the full identity lifecycle, from badge printing or mobile credential issuance all the way through to the management and application of access rights. These solutions tie everything together and automate other manual workflows to provide an end-to-end physical identity and access management solution These integrated solutions will be joined by new cloud models for delivering network-based, service-focused badge printing and encoding that eliminates the need for stand-alone card printers attached to dedicated PC workstations and delivers the security of end-to-end encryption. Such solutions will transform the operational management of ID badge printing, reduce costs, eliminate capex outlay, simplify system maintenance and improve security as compared to on-premises solutions. Reducing Vulnerabilities And Simplifying Compliance In parallel with the move to the cloud, there is also a growing awareness of the interdependencies of technologies and platforms that are used to optimize business agility, manage costs and improve the user experience in today’s increasingly mobile environment, or to extend the reach, flexibility and security of digital commerce and relationship management. These interdependent technologies require an organization-wide approach to identity management that connects multiple platforms, systems and devices for multi-factor authentication. This approach increases security, reduces vulnerabilities and simplifies compliance. To achieve this vision, unified identity cloud-based physical and IT access management solutions can create a far more seamless experience for users while simplifying procurement, deployment and maintenance. These solutions tie everything together and automate other manual workflows to provide an end-to-end physical identity and access management solution that integrates with access control systems, logical identity and other applications so organizations can manage all types of physical identities and their details. Encompassing Identity Management Lifecycle This approach incorporates trusted credential and other advanced security technologies and encompasses the entire identity management lifecycle. The result: organizations achieve a single, comprehensive security view and more coordinated way to protect privacy, while also lowering total cost of ownership, extending strong authentication from the desktop to the door and supporting a multitude of advanced use cases. This unified approach is especially effective for government agencies and other regulated industries such as banking, healthcare, and transportation. It improves the organization’s overall security posture while consolidating physical and IT security into a single solution. The user experience is improved by having a single credential for opening doors and accessing IT systems, networks and data and the organization can more easily comply with federal security requirements while extending public key infrastructure (PKI) strong authentication throughout their operations. Unified identity cloud-based physical and IT access management solutions can create a far more seamless experience for users This unified approach also enables using strong cryptographic credentials in a range of additional applications, including digitally signing emails or documents, decrypting emails or files, full disk encryption and boot protection to secure laptops, among others. This approach also makes it easier to monitor and manage users’ access rights as their roles change within an organization, ensuring they only have access to what they need in a current role. Incorporation Of Biometrics In banking, unified platforms provide a holistic, mobile-relevant, multi-channel solution for managing customer identities across all channels, improving the user experience without increasing cost or complexity. The incorporation of biometrics further improves the user experience with higher levels of trust and makes it easier to combat fraud while complying with “know your customer” and other regulatory mandates. Unified platforms for healthcare enable administrators to consolidate identity and access management across the continuum from hospital to home, simplifying operations ranging from opening hospital doors and accessing healthcare records to e-prescribing while simplifying compliance and improving how healthcare professionals interact with patients and log their activities. Institutions can leverage e-prescribing architectures for other valuable capabilities such as authenticating to VPNs and enabling remote access using credentials, key fobs, mobile smartphones and other smart devices and one-time password (OTP) tokens. Path To Converged Solutions The move to unified platforms offers new ways to establish, create, manage and use trusted identities and combine on-premises systems and the cloud to simplify identity and access management using common, flexible and adaptable platforms. Organizations that adopt these platforms can more easily secure access to everything from the facility’s doors to its computers, data, applications, and cloud-based services and can also tie their smart buildings to the IoT. As they deploy these unified platforms, they will be embarking on a path to truly converged solutions that will ultimately consist of a single security policy, one credential and one audit log, delivered through a fully interoperable, multi-layered security infrastructure. Between now and then, they will be able to preserve their investments while continuing to grow, evolve and continually improve their security capabilities in the face of ever-changing threats.
Security beat
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long-term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Protecting critical infrastructure An attack by a disgruntled former employee, ideologically motivated activist, or a criminal could inflict significant damage Currently, a significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks can target the grid, and an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target,” could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. Data capture form to appear here! According to the Department of Energy, the number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year in lost output and wages, spoiled inventory, delayed production and damage to grid infrastructure. The number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year Large power transformers A large power transformer (LPT) is an enormous, custom-built piece of equipment tailored to customers’ specifications. They usually are not interchangeable with each other, and they are not produced for spare-part inventories; so if one blows, a lot of companies and homes could be without power for more than six months. They are not cheap, either. According to EEP (Electrical Engineering Portal), $10 million is a fairly average cost, but that doesn’t include transporting the gargantuan piece of equipment or installing it, which usually adds an additional 35 percent to the bill. Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. According to EEP, $10 million is a fairly average cost for a large power transformer NERC/CIP guidelines The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC/CIP) guidelines address security needs of electrical substations. Every facility has a baseline requirement for perimeter security protection around the site, although medium- and high-impact sites will have more stringent requirements. The geography surrounding sites – Is it an urban area or rural? Does the surrounding elevation provide additional lines of sight? – also impacts the types of systems they require. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities The U.S. power grid is divided into three sections: The Eastern Interconnection for states east of the Rocky Mountains, The Western Interconnection for states from the Pacific Ocean to the Rocky Mountains, and the smallest—the Texas Interconnected system—covering most of Texas. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities and they distribute power to homes and businesses, to millions of personal devices, lights, refrigeration, computers, and to other “loads,” that tap it. Inherited challenges According to the American Society of Civil Engineers (ASCE), the nation’s electric infrastructure is “nothing but a patchwork system” that has evolved wildly since the first substation was erected by Thomas Edison in 1882, on New York City’s Pearl Street. Contributing to the challenges of securing the grid are the crazily disparate ages and capacities of the grid’s equipment. There are many possible targets, too. Approximately 300 control centers around the country monitor voltage and watch the data from SCADA (supervisory control and data acquisition) systems, which are placed at transformers, generators and other critical areas. Ideally, this allows engineers to monitor the data for signs of trouble and then communicate with each other to deal with whatever is happening to the grid, but SCADA has cybersecurity issues.
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies, fusing critical data input from emergency calls and responder activity to enhance situational awareness. Electrical substations are particularly vulnerable (and in need of extra security) due to their role in power distribution and the nature of their equipment. The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. Data capture form to appear here! U.S. regulations In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-014 identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address CIP-104 specifically calls for implemented security plans that include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Manufacturers of video and other systems are designing products to serve the critical infrastructure market. For example, Dahua Technology offers explosion-proof cameras with a combination of rugged reliability and superior optics that is a fit for surveillance of explosive and corrosive environments, including chemical plants, refineries, and other facilities in the oil and gas industry. This explosion-proof series of cameras are housed in enclosures that are certified to the ATEX and IECEx standards for equipment in explosive atmospheres. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time. They are IP68-rated to prevent water and dust ingress. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time Video footage in extreme temperatures Another manufacturer, Videotec, offers a range of cameras and housings that provide video footage regardless of aggressive external factors, such as ice cold, scorching heat, desert sand, the force of sea or wind, total darkness, pollution, corrosion and even explosive agents. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sitesSightLogix smart thermal camera systems have been deployed to protect substations for electric utilities and other critical infrastructure facilities. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sites, ranging from copper theft to vandalism while also meeting regulatory compliance. At each substation facility, Thermal SightSensors are positioned along the perimeter, and are paired with a high-resolution pan-tilt-zoom camera for alarm assessment. When a Thermal SightSensor detects an intruder, the target’s location information is sent over the network to a SightTracker PTZ controller, which automatically zooms and steers PTZ cameras to follow the intruder. The target’s location is also displayed on a topology site map to provide real-time situational awareness. Alarms are sent to the utility’s 24-hour security operations center, which will contact law enforcement in real time when unauthorized intrusions are detected. Integrated intrusion detection and lighting systems The Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security at one U.S. electrical utility company. For years, the utility company had integrated its perimeter intrusion detection and lighting systems. The company has now installed the Senstar LM100 which provides detection and lighting in one product and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity.
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernize the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and push data to the cloud. “What sets us apart is the system architecture that drives our solution,” says Brandon Davito, Verkada’s VP of Product and Operations. “Starting with edge processing, all data is instantly analyzed and processed at the camera. This enables enterprise users to scale coverage without traditional limitations like bandwidth consumption or the costs of supporting additional equipment for processing footage. Simultaneously, all footage is stored directly on each camera and can be streamed securely via Verkada’s centralized management platform to any device.” The product is simple: cameras record video, connect to the internet, and push data to the cloud Hybrid cloud architecture Verkada’s goal is to make it easy to buy, deploy and manage large-scale enterprise video security systems across hundreds of cameras and dozens of sites. The hybrid cloud architecture makes it easy to access video footage from hundreds of cameras across any platform (web, mobile apps, tablets, and AppleTV). Verkada is appropriate for any business, school or enterprise that needs a scalable, secure and reliable video security solution, says Davito. “Our system streamlines surveillance management, removes the need of supporting equipment, and is ready to use, out-of-the-box, without the need for technical configurations,” says Davito. The simplicity and scalability of the end-to-end solution is attractive to security professionals, simplifying the day-to-day of surveillance management and providing insights that drive a business forward in other areas of the organization. “This approach also allows us to provide customers with a complete experience, as we build our hardware and software to work seamlessly together,” Davito adds. Verkada does not integrate with other equipment or systems. “Taking an end-to-end approach ensures that we are able to develop and roll out features more quickly and take advantage of the edge-processing capabilities of our cameras,” Davito says. The simplicity and scalability of the end-to-end solution is attractive to security professionals Defending against IoT threats An end-to-end solution also increases defenses against threats in today’s Internet of Things (IoT) space. IP cameras have historically been some of the most vulnerable devices. Verkada cameras save time by updating automatically, and they are unable to accept 3rd party software (and the risks that come with it). Verkada partners with many of the leading channel distributors and is always recruiting new integrator/reseller partners. “The solution is easy to sell. It's a bolt-on value-add that doesn't require altering or configurations to existing infrastructure,” says Davito. “Sales cycles are also much shorter because implementation is simple and streamlined; it’s creating a lot of business efficiency.” The world of physical security is always evolving, so Verkada’s ongoing challenge is to continue delivering on the potential of hybrid cloud management of physical spaces. “We are always launching new features and enhancements, as well as ensuring the security and integrity of our customers’ environments,” says Davito. “We will look to continue to push the boundaries of physical security and deepen our use of technologies like machine learning and future advancements in video analytics and AI technologies.”
Case studies
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organizations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilize the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimize air quality, efficiency of our HVAC units, and behaviors in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernization process, the company decided to deploy new centralized CCTV systems to enhance the security level of passengers and drivers. First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command center in real time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command center. Customized mobile solution To help ARST revamp its bus security system, a customized Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras is integrated in the control room via DSS4004, where emergency calls, geo-localization of vehicles and statistics can be managed. Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are: data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board and geo-localization via DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. High performance sensor It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via wireless network - 3G/4G/WIFI. In addition, the device can also support connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than city bus, this device can be used in various applications, such as school bus, taxi, police car, train, truck, etc. The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high quality images and ensures real-time transmission. Also, it adopts a high performance sensor to provide incomparable performance even under extreme lowlight environment. Manage mobile devices The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses The Starlight feature allows capturing of more details and recognizing accurate colors at night or in scenes with limited illumination. At the control room, Dahua DSS platform was utilized to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimize driving route to generate more profit. High-definition monitoring With upgraded Dahua system, the command center can communicate with every single vehicle of ARST Bus Company in real time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command center in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses, and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operation. The Dahua mobile solution mounted on board has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
For most people, prison ranks high on the list of places to avoid. Yet, take no pride: U.S. prisons are filled to capacity with individuals who have committed some type of crime that warrants incarceration. Prison Policy Initiative In 2018, according to data from the Prison Policy Initiative, there were 1.3 million U.S. adults in prison and 615,000 incarcerated in jails for crimes ranging from murder, manslaughter, illegal drug possession, burglary, theft, driving under the influence, property crimes, and more. In addition to traditional security concerns such as perimeter surveillance, ID card management, visitor and vendor management, crime, and theft, prisons and correctional facilities have unique security challenges that other enterprises typically do not have. Prison security Correctional facilities face regular security audits that are conducted by the National Institute of Corrections The challenges include inmate escapes, hostage situations, gangs, contraband, riots, and overcrowding, in addition to increasing privacy and regulatory mandates. Even more, correctional facilities face regular security audits that are conducted by the National Institute of Corrections. Security teams must always be on guard and watching every individual and action of the inmate population – for an inmate’s physical safety – in addition to their own. It is not uncommon for security staff and correctional officers to receive physical injuries from prisoners, especially when trying to break up an inmate fight or transporting them to other locations. Use of drones in prison smuggling An emerging concern for prison officials is the use of drones by individuals who are looking to smuggle drugs, cellphones, weapons, and other contraband into prisons for use by inmates. Many states are working on anti-drone legislation around correctional institutions. For example, Missouri is one of the most recent US States to have introduced legislation to tackle the problem. Missouri HB 324 would make it illegal for drone pilots to fly an unmanned aircraft near any correctional center, private jail, county jail, municipal jail or mental health hospital. Anyone caught violating the law would be charged with a Class A misdemeanor and possibly other felony charges, depending on the pilot’s illegal intentions. Importance of video surveillance Video surveillance is a necessary security technology for prison and correctional facility staff, as it allows personnel to mitigate those unique security challenges. “Video surveillance is prevalent throughout facilities; even if it’s a typical two-bed jail cell or a 2,000 bed prison,” says Brad Wareham, Director of Key Accounts at Salient Systems. He adds, “In cases where facilities face a shortage of staff members to watch over the inmate population, video surveillance supports the oversight of inmates and increases accountability. Inmates know that despite the lack of staff and officer presence, they are being observed by cameras that can catch even the smallest details. Video surveillance can follow inmates anywhere. There are very few blind spots.” Upgrading to hybrid video surveillance systems They are upgrading to hybrid and/or fully digital solutions, all while maintaining the HMI model Increasingly, prisons and correctional facilities are upgrading their older analog video systems, due to age degradation and lack of adequate support resources. “They are upgrading to hybrid and/or fully digital solutions, all while maintaining the Human Machine Interfaces (HMI) model,” Wareham notes. “They continue to face security challenges typical of the corrections space, such as PLC controllers, RTSP capture, intercoms, lock controls, and more, which are atypical of larger facilities. In addition, many older analog solutions will eventually be cost prohibitive,” Wareham said, adding “and will no longer operate, due to an increasing inability to find replacement parts and to the proliferation of IP-based video surveillance solutions”. IP-based video surveillance systems For many correctional facilities, upgrading a video surveillance system to an IP-based solution, in addition to a video management system (VMS), makes sense and benefits a prison or correctional facility in multiple ways. Solutions exist that allow prison facilities to keep pre-existing hardware in place during an upgrade, while allowing for replacements and component upgrades as funding permits. Specific benefits that advanced video surveillance and VMS solutions can provide a correctional institution include: Increased Coverage – Many prisons and correctional facilities are large, and have multiple areas that need to be under surveillance, such as hallways, throughout cellblocks, healthcare facilities, dining areas, exercise yards, and more. Outdated systems may have a difficult time monitoring all areas, while an IP video system can provide continuous coverage of an entire facility Clarity of Video – Older analog cameras struggle with the ability to provide clear images. New IP cameras, coupled with an advanced VMS, will produce crisp and clear images that are necessary to mitigate security risks. Inmate Tracking – One of the biggest benefit of a VMS solutions is video analytic software, which is capable of tracking a moving target and searching for specific objects. Video analytics can count human beings, monitor queues, and even identify a geographical location. VMS solutions allow security to search video archives quickly and find archived video that matches custom criteria within minutes, which is helpful in investigations. Alerts – Video analytics within a VMS solution can be programmed to detect specific activity and activate an alarm or alert system when the activity occurs. Facial Recognition – The ability to recognize a face is another key benefit of a VMS solution used in a crowded correctional institution, in particular when inmates may be wearing the same type and color of clothing. Perimeters – Video surveillance placement on the exterior perimeter of a facility can document suspicious activity occurring in outside recreational yards where contraband can enter. Many VMS solutions allow for detecting movement throughout specific areas for an established duration of time. Mobility – The ability for correctional officers to view video on a mobile device is critical, given the large landscape of facilities. For example, Salient’s TouchView Mobile solution, combined with its CompleteView 20/20 VMS, allows users to instantly access, monitor and review live and recorded video from any camera connected to any CompleteView 20/20 recording server. Cameras from multiple servers can be accessed simultaneously with PTZ control. The solution’s DRS (dynamic resolution scaling) automatically sizes the video for live viewing, which significantly reduces network usage and provides higher frame rates over mobile connections. Securing prisons and correctional facilities You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence" Overall, Wareham notes, video surveillance and VMS solutions are a necessary and critical solution for securing prisons and correctional facilities. “You can’t have a correctional facility without video surveillance and an audit trail for forensic evidence,” Wareham stated, adding “Facilities with challenging budget constraints are still required to have a functional Video Management System, regardless of the technology or age of their infrastructure.” Salient VMS solution For security integrators, Salient’s VMS solutions provide a steady ROI. “Salient plays a critical role in providing a viable cost per channel ROI that is superior in the VMS industry,” Wareham said. He adds, “As the requirements for third-party encoding hardware is negated, and coupled with our customer support for virtually all aspects of the detention and corrections space, Salient’s VMS solution addresses budget constraints.” For prisons and correctional facilities, an advanced video surveillance and VMS is not just a product, it is a necessity that enables correctional facilities to stay safe and secure. “In the corrections industry, surveillance goes hand in hand with the employee, inmate, and visitor safety, while coupled with procedural compliance and enforcement,” Wareham concluded.
Chocolate Nation’s decision to partner with Panasonic for technology at the immersive Belgium museum has delivered the sweet taste of success. Having already attracted over 100,000 visitors in the first nine months of opening, the Antwerp museum says its technology partnership with Panasonic has underpinned its rapid rise as a visitor attraction. Panasonic security cameras Chocolate Nation has deployed Panasonic equipment throughout the museum, shop, restaurant, event and meeting rooms. The technology provides a truly immersive experience for visitors and underpins the effective operation of the business. The range of solutions includes 20 professional display screens, 10 laser projectors, security cameras and the latest telephony solution. Chocolate Nation has deployed Panasonic equipment throughout the museum, shop, restaurant, event and meeting rooms From initial concept, the museum set-out to be an immersive experience for visitors to discover the wonders of Belgium chocolate using their five senses. Through 14 thematic areas, visitors are taken on a journey from the jungle where cocoa beans are grown, through their transportation across the ocean to Antwerp (the world’s largest port for cocoa bean storage), to the making of exquisite chocolate delights and, of course, lots of tasting. High quality video security “The immersive experience is where Panasonic plays an important role,” explains Catherine Stuyck, Head of Marketing and Communications at Chocolate Nation. “Thanks to the large projections on the ceiling, walls, and floor, visitors can really have the feeling they’re standing on a floating container ship. Using light and sound effects, visitors can pass in front of a large imaginary machine in true Willy Wonka fashion to understand how chocolate is made. Afterwards, visitors virtually meet the great Antwerp chocolate makers and are seated in an experimental restaurant where surprising images are projected onto their plates.” More than three years in the planning, the Chocolate Nation founders knew that choosing the right technology partner for the brand-independent museum was going to be critical to creating the magical environment for visitors and a reliable and cost effective business infrastructure. Seamless, flexible installation "After extensive market research, we chose Panasonic as our technology partner for Chocolate Nation," said Jeroen Jespers, Co-Founder of Chocolate Nation. “Panasonic had all the product categories we required and solid in-house expertise. The result is a visitor attraction of the highest quality and an outstanding experience. Obviously, it is only possible because of the absolute reliability of the technology provided by Panasonic”. Jeroen adds, “In addition, their flexible installation outside opening hours and the low maintenance equipment saves a lot of time. If we decide to expand our activities to other countries, we will quickly have a full on-site service with Panasonic, a global player in the sector.” Panasonic LCD and DLP projectors A variety of Panasonic LCD and DLP projectors, ranging from 32” to 65”, have been used in the museum A variety of Panasonic LCD and DLP projectors, ranging from 32” to 65”, have been used in the museum to create the immersive tourist installations and to provide the quality audio visual experience in the event and meeting spaces. The highest levels of security with the lowest total cost of ownership are ensured with the effective use of Panasonic’s 360 degree and indoor dome cameras combined with Panasonic’s Video Insight system management solution. KX-NS700 Smart hybrid communication system The extensive coverage from the 360 degree cameras reduced the number required across the venue and minimized the bandwidth impact on the network. For its unified communication system, Chocolate Nation chose Panasonic’s KX-NS700 Smart hybrid communication system. By using the Panasonic desktop phones, DECT handsets and intercoms as one integrated system, the guests are supported directly when needed. The size of the system ensures Chocolate Nation can expand its communications infrastructure quickly and efficiently as the organization grows.
Pulse Secure advances remote access to web applications such as Microsoft Office 365 and network resources to help 3,000 staff enjoy a better work-life balance leveraging Pulse Secure. Pulse Secure, a provider of software-defined Secure Access solutions, has announced the delivery of a successful project at one of Italy’s largest media organizations designed to help foster mobile workforce productivity while ensuring protected, compliant access to cloud and data center applications. RCS MediaGroup is one of the leading multimedia publishing groups, active mainly in Italy and Spain across all publishing fields, spanning from newspapers to magazines, from digital to books, from TV to new media, and to training. It is also one of the top players in the advertising market and in the organization of iconic events and major sporting formats, such as the Giro d’Italia. Protecting against cyber-attack We maintain several security controls across our network, as well as regularly cyber-security training" The RCS Group publishes the daily newspapers Corriere della Sera, La Gazzetta dello Sport, El Mundo, Marca and Expansion, as well as numerous magazines, the most popular including Oggi, Amica, Io Donna, 7, YO Dona and Telva. Like many other popular enterprises, being an integral part region’s culture and communications has made RCS Group a target for cyber threat actors. “Protecting our systems against cyber-attack is a critical requirement as is ensuring our staff and journalists have easy, flexible and secure access to their work,” says Monica Venanzetti, Network Manager for RCS MediaGroup in Milan. “To meet this need, we maintain several security controls across our network, as well as regularly conduct cybersecurity training. We deployed our first VPN solution in 2006 to enable secure access to our systems and it was time to progress our capabilities.” New cloud services RCS MediaGroup employs over 3,000 staff including 700 journalists and as Giandomenico Oldano, Director of IT operations for RCS MediaGroup, explains, “As a group, we have an ongoing strategy to help our staff embrace smart working. This is part of an initiative to improve the work-life balance of our employees and reduce their traveling time, which in a busy city like Milan can be very time consuming.” As part of this work-life balance strategy, RCS MediaGroup has invested in more remote, mobile and cloud technologies and recently moved its staff onto Microsoft Office 365 to encourage this transition. “To meet this need and as part of our commitment to ensuring best practice secure access, we decided to upgrade our legacy VPN to provide more capacity and to better integrate with new cloud services such as Office 365,” says Venanzetti. Cloud single-sign on The simplified management interface allows RCS MediaGroup to set up enterprise-wide policies" “We examined several options and Pulse Secure provided us a modernized platform with more advanced features including endpoint compliance and cloud single-sign on. We found the tool comparatively simpler to administer, very interoperable and with a broader feature-set.” The upgrade process was straightforward, and the simplified management interface allows RCS MediaGroup to set up enterprise-wide policies that make it easy for its remote users to connect to its critical publishing systems. The solution also incorporates client checking technology that ensures that its users’ devices, both corporate and personally owned endpoints, are running the right system and security patches before they can attach to the corporate network. “One of the most important features was deep support for our users’ devices including tablets, laptops and PCs across both Apple and Microsoft environments,” says Oldano. Cloud-based applications “Our upgrade has been a success and provides a lot of potential for future projects that will allow us to offer secure access for more cloud-based applications. Pulse Secure has been with us throughout this process and its technology is helping us to deliver on our commitment towards smarter working for all our staff.” Pulse Secure enables enterprises to centrally manage Zero Trust Secure Access to applications, resources and services that are delivered on-premise, in private cloud and public cloud environments. The Pulse Access Suite delivers protected connectivity, operational intelligence and threat response across mobile, network and multi-cloud environments in order to provide easy, compliant access for end users and single-pane-of-glass management for administrators. “Enterprises are fortifying capabilities to accelerate mobile workforce productivity and take advantage of cloud computing.” Comprehensive and integrated Pulse Secure offers a proven, comprehensive and integrated suite that works with an enterprises hybrid IT infrastructure to enable a simpler, more manageable and scalable approach to secure access,” said Paul Donovan, vice president of EMEA sales at Pulse Secure. “We are pleased to have been selected by RCS MediaGroup, a prominent and progressive market leader in multimedia publishing and look forward to supporting their on-going digital transformation initiatives.”
Security is always one of the top concerns for any stores, especially for multinational hypermarkets, and IP surveillance is becoming the norm in the retail sector. The multinational hypermarket in South America has adopted 70 Surveon NVR7816, which was designed as a recording server with an archiving function that offers cost advantages and easy maintenance. Besides, NVR7816 ensures high video image quality with high throughput capability, providing a safe environment for people and goods in their 66 stores. Price and performance are always the key elements to help SI win projects. Surveon NVR7800 Series was designed as a recording server with an archiving function that offers cost advantages compared to traditional system structures composed of recording server plus a separate storage device, making it the top choice for the multinational hypermarket. Better Image Quality The NVR7800 Series is 100% compatible with major 3rd party VMS, including Milestone and Genetec VMSEach hypermarket installs 80 to 100 cameras with improved image quality. The multinational hypermarket needed a reliable system which supports recording with hundred channels and is able to transmit high resolution images smoothly. The NVR7800 Series delivers a high level of recording throughput of nearly 2000 Mbps, supporting recording with more channels, allowing system to receive better video image quality by higher bitrates, and ensuring smooth transmission even with high frame rate. The multinational hypermarket bought 6,000 channels Genetec VMS license before deciding the supplier of server and storage, making the system most composed by brands. The multinational hypermarket needed a solution which is fully compatible with Genetec VMS. The NVR7800 Series is 100% compatible with major 3rd party VMS, including Milestone and Genetec VMS. Hybrid Server-Storage Design The hybrid server-storage design of NVR7800 Series gives us a big hand with its high throughput and easy maintenance" With Genetec VMS, NVR7800 Series can serve up to 300CH 1.3MP cameras with continuous recording or 190CH 1.3MP cameras with motion detection recording. Based on Milestone test findings, NVR7800 Series supports up to 150 cameras, more than twice Milestone’s benchmark level in a non-stop recording scenario. The system is even capable of supporting more than four times the number of cameras estimated by benchmark under the testing scenario where motion detection is enabled, giving medium to large projects the best price-performance solution. "The hybrid server-storage design of NVR7800 Series gives us a big hand with its high throughput and easy maintenance. And it also gives us a better performance with affordable budget in every perspective. We are very satisfied with the result and look forward to working with Surveon in the future." said the administration manager of the multinational hypermarket.


Round table discussion
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
Will 2016 see faster adoption of video analytics? Will cyber-security have more impact on physical security? Is the market likely to see greater use of cloud-based products and services? Will technology help to drive greater involvement by everyday citizens in public safety initiatives? Could the market focus shift from selling products to selling solutions? We asked this week’s SourceSecurity.com Expert Panel to look ahead to 2016, and these were some of the surprises they see in our industry’s near future. Specifically, we asked this week’s panel: What will be the biggest surprise in 2016 for the security market?
Products


Videos
Hybrid security: Manufacturers & Suppliers

How To Ramp Up Perimeter Security With License Plate Reader Technology
Download
Solve Access Control Challenges in the Healthcare Sector
Download
Getting the Most Value From Software Subscription Agreements
Download
Shifting Trends in Operation Centers and Control Rooms for 2021
Download