Facial recognition company Clearview AI is facing a potential fine in the UK and has also been handed a provisional notice to stop further processing of UK citizens’ data and to delete any data it already holds as a result of what the British Information Commissioner’s Office described as “alleged serious breaches” of national data protection law. The UK’s Information Commissioner’s Office announced the provisional orders following a joint investigation with...
SALTO Systems (SALTO) has introduced the XS4 Original+, the next generation of the world’s most flexible and reliable smart locking solution that features a beautiful design, with a sleek flat reader in two new colors. SALTO XS4 Original+ The new SALTO XS4 Original+ takes the trusted and proven flagship XS4 Original electronic lock product family and incorporates the latest technology, to accommodate access control needs of both today and tomorrow. Our customers, partners and users rely...
Intersec, the globally renowned emergency services, security, and safety event, has announced that ex-MI6 Chief, Sir Alex Younger is one of the first announced international headliners, speaking for the first time in the UAE, as a guest speaker. Ex-MI6 Chief, Sir Alex Younger Alex Younger joined the United Kingdom’s Secret Intelligence Service (SIS), also known as MI6, in 1991 and served as a Diplomat and Undercover Operative. He was appointed Chief or ‘C’ of MI6 in 2014 and...
To comply with regulations for the credentialing of airport and airline employees and contractors, airports have to undertake complex and time-consuming processes to issue and administer badges or face hefty fines. To help airports of all sizes automate and simplify this process, Genetec Inc. (‘Genetec’), a technology provider of unified security, public safety, operations, and business intelligence solutions, announces its new Genetec™ Security Center Airport Badging Solution...
Kwikset, brand of Spectrum Brands, Inc. - Hardware & Home Improvement division, the globally renowned company in residential security solutions, announced the availability of the Home Connect 620, the company’s newest Z-Wave connected smart lock. Home Connect 620 smart lock The Home Connect 620, which offers a 10-button keypad with one-touch locking, is Kwikset’s first smart lock in the ‘Home Connect’ line. It is also the company’s first lock, featuring the la...
Brivo – a pioneer in cloud-based access control and smart building technologies – announces the release of anomaly detection in its flagship access control solution, Brivo Access. Anomaly detection is a patent-pending technology that uses advanced analytics with machine learning algorithms to compare massive amounts of user and event data to identify events that are out of the ordinary or look suspicious, and issues priority alerts for immediate follow up. With anomaly detection, bu...
Dortronics Systems Inc., an industry-renowned company in off-the-shelf and customized door control solutions, is featuring its new 9-door controller for affordable multi-door interlocks and mantrap applications, from 2 to 9 doors, as well as its complete line-up of touchless door control solutions, at ISC East 2021 exhibition, in booth #1030. All of Dortronics’ product design and manufacturing operations are located at the company’s Sag Harbor, New York headquarters, which gives the company a unique ability to offer custom-fabricate a wide range of door control products, with fast turnaround times. Dortronics’ products at ISC East 2021 Bryan Sanderford, National Sales Manager of Dortronics Systems, Inc., said “Our new 48900 Series PLC interlock Controller answers users’ demand for a cost-effective and easy to install mantrap solution for specialized retail environments, with high-value merchandise, like jewelry, in cannabis dispensaries, or in clean room environments, at bio-tech labs or pharmaceutical manufacturing facilities.” Bryan Sanderford adds, “It’s a product developed in response to market demand, which has continued to differentiate Dortronics from the big box houses and offshore suppliers. At Dortronics, we specialize in delivering door control solutions with the performance, quality, and often customized features and aesthetics that installers need with fast turnaround times and at the right price.” Dortronics’ 48900 PLC Interlock Controller Dortronics’ 48900 PLC Interlock Controller is a cost-effective solution for implementing door interlock and mantrap systems Dortronics’ 48900 PLC Interlock Controller is a cost-effective solution for implementing door interlock and mantrap systems, with up to nine doors. Under standard operating conditions, unlocking or opening one door automatically secures other designated doors, within the Interlock group. The fully integrated single-board solution provides installers with complete control of all operating and configuration options, without the need for and expense of, complex software. The 48900 Series PLC Interlock Controller integrates with virtually any access control system, utilizing dry contacts. Dortronics 5278 Touchless Proximity Switch Dortronics 5278 Touchless Proximity Switch utilizes optical infrared technology with embedded sensors to pick up motion within a 4-inch range with an illuminated LED ring for visibility under low-light conditions. A simple wave of the hand activates the touchless switch. The Dortronics 5278 Touchless Proximity Switch greatly decreases the potential to spread contagious diseases, since no actual hand contact is required to activate. These switches are often utilized with electronic locks and automatic door operators. The 5278 switch’s illuminated LED ring allows for visibility under low-light conditions. Dortronics’ 6612 Request to Exit Motion Sensing Door Release Dortronics’ 6612 Request to Exit Motion Sensing Door Release provides safe and immediate hands-free door release, and reliable fail-safe operation. It offers fast and accurate detection, with easy field adjustments, plus range and sensitivity controls, in order to assure maximum reliability. Dual relay outputs are available to redundantly cut power to the electromagnetic lock, while simultaneously signaling an access control system to unlock the door. The 6612’s attractive, slim housing is ideal for mounting the unit inconspicuously above any door.
Traka announced that the company has received LenelS2 factory certification for OnGuard access control solution, as a LenelS2 OpenAccess Alliance Program (OAAP) partner. Traka’s key and asset management system interfaces with the OnGuard access control system, and provides seamless, single-credential access to property secured by Traka. LenelS2 OAAP factory certification “Traka has completed the required factory testing at LenelS2, to validate the functionality of its interface to OnGuard. This partner interface provides regional security and control over important company assets,” said John Marchioli, Director of Strategic Alliances and OAAP Product Management at LenelS2. John Marchioli adds, “We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program.” Traka - LenelS2 partnership The combination of Traka and OnGuard allows companies to control access and permissions" “We’re excited about this latest certification with LenelS2. Our continued partnership ensures our mutual customers have the latest in innovative access management solutions,” said Wayne Stant, Product Director at Traka. Wayne Stant adds, “The combination of Traka and OnGuard allows companies to control access and permissions, monitored by OnGuard, to track who checks out vital keys and equipment. It simplifies and improves security, while reducing administration overhead.” Electronic key and equipment management solutions Traka provides electronic key and equipment management solutions, allowing organizations to secure, manage, and audit the use of their important physical assets, including facilities, equipment, machinery, and vehicles. Traka’s products can be used standalone or integrated with many of the world’s renowned access control systems.
IDEMIA announces that its facial recognition device for access control VisionPass has passed with 100% success the Level 1 and Level 2 Presentation Attack Detection (PAD/spoofing attack) assessments from the iBeta laboratory. VisionPass is the only terminal in the world for this market to achieve this performance constituting an essential guarantee of quality. External validation of IDEMIA biometric devices Without independent external sources to validate manufacturer claims, customers who wish to deploy biometric terminals have to believe the manufacturer’s statements on quality and performance as it is difficult to perform extensive testing on their own, other than empirical. However, as such terminals are meant to improve security by preventing intrusions, it is crucial to validate performance elements externally. For facial recognition, it is essential to choose a terminal that remains efficient with users wearing a mask For facial recognition, in particular, it is essential to choose a terminal that remains perfectly efficient with users wearing a mask, and that resists fraud attempts by presenting photos printed on paper, displayed on a smartphone screen, or even by use of 3D masks that reproduce the face of an authorized user. Such capabilities result from the combination of hardware components and biometric algorithms used in the device. Recognition by independent laboratories IDEMIA’s willingness to submit VisionPass for testing proves the device meets a level of performance recognized by an independent lab. As a digital security group with strong experience in cryptography, embedded security, and biometric algorithms used in government applications, payments, and telecommunications; and as the world pioneer in biometrics for access control, IDEMIA is the only manufacturer of biometric devices to submit its algorithms to the NIST and DHS evaluation sessions in the US, and to evaluate its software and products by the iBeta laboratory. iBeta testing iBeta has provided critical software testing services for the world’s most trusted brands since 1999 and has developed unique skills in biometric testing as a NIST NVLAP accredited biometrics testing lab. In particular, iBeta conducts Presentation Attack Detection (PAD) testing by the ISO/IEC 30107-3 standard and in alignment with the ISO/IEC 30107-1 framework. IDEMIA’s willingness to submit for testing to independent labs proves confidence in their algorithms and terminals. VisionPass VisionPass uses a combination of an advanced optical unit composed of 3 cameras VisionPass, launched in mid-2020, is an extremely powerful access control device using a combination of an advanced optical unit composed of 3 cameras (2D, 3D, and infrared) and IDEMIA’s pioneering facial recognition algorithms. VisionPass was submitted to the iBeta PAD tests, which took place in September and October 2021. Protecting physical security The terminal obtained the maximum score of 100%, thus perfectly resisting hundreds of different fraud attempts by the presentation of 2D and 3D photos and molded masks. These results confirm VisionPass as the most advanced and efficient facial recognition device on the market, as already highlighted by several industry awards. This iBeta evaluation is important guidance for Security Directors and Purchasing Departments as a key element to expect when selecting a facial recognition terminal that will be used to prevent intrusions and protect the physical security of their employees and company’s assets.
Honeywell has announced that the company is launching the Pro-Watch 5.5, the latest iteration of its Pro-Watch Integrated Security Suite. The Honeywell Pro-Watch Integrated Security Suite is a software platform that is designed for enterprise and critical infrastructure markets, to help protect people and property, optimize productivity, and ensure compliance with industry regulations, all while helping to reduce operational costs. Honeywell Pro-Watch Intelligent Command Pro-Watch 5.5 upgrade enables operators to respond rapidly and effectively to alarms or incidents Honeywell Pro-Watch Intelligent Command, a user interface that allows organizations to construct a security system with total situational awareness, via the seamless integration of video and access control solutions, can now be upgraded to Pro-Watch 5.5. The Pro-Watch 5.5 upgrade enables operators to respond rapidly and effectively to alarms or incidents, by providing actionable intelligence, including a unified alarm view with maps and associated video, which includes the Standard Operating Procedures (SOPs) to be followed, thereby enhancing compliance with advanced reporting, and reducing security risks. Key benefits and features of the Pro-Watch 5.5 include allowing users to: Improve situational awareness: It provides a unified view of alarms and maps, incident workflows, and a space/area builder, in order to create logical zones and group-based, multi-site views. Upgrade integration with cyber security and data privacy: It integrates a new PW7K controller, enhances cyber security with Open Supervised Device Protocol (OSDP), and improves data privacy with selective masking. Enhance compliance: It enhances compliance with advanced reporting and reduces security risks, through an SOP process, and end-to-end TLS 1.2 encryption, and guided alarm/incident response. Increase productivity and system uptime: It improves operator efficiency with intuitive controls for effective incident management and simplifies maintenance with remote bulk camera firmware upgrade, and camera password changes capabilities, which includes specific non-Honeywell cameras. Pro-Watch Video Management System (VMS) R700 Honeywell is also launching the Pro-Watch Video Management System (VMS) R700 Honeywell is also launching the Pro-Watch Video Management System (VMS) R700, the latest iteration of its feature-rich and user-friendly video management software platform. Pro-Watch VMS R700 controls video subsystems, to collect, manage and present video, in a clear and concise manner. Honeywell’s Pro-Watch VMS R700 also intelligently determines the capabilities of each subsystem, across various sites, allowing video management of digital video devices, through a unified configuration and viewer. Key benefits and features of Pro-Watch VMS R700 include allowing users to: Enhance productivity: It allows users to access video footage and respond to alarms, via mobile app – anytime, anywhere. New video core features: It reduces solution cost with advanced GPU video rendering, salvo sequences, 64-bits optimized recording engine, and optimized server deployments. Provide emerging technology support: It works with H.265 smart video compression codec, multi-imager, and fish-eye cameras. Improve situational awareness: It provides multiple camera views in web clients, new integrations with artificial intelligence (AI) and analytics systems, and geographic information system (GIS) online maps. Integrate with Honeywell Series 70 AI cameras: It integrates natively with current and future Honeywell cameras for edge analytics and annotations, for license plate recognition, intelligent video analytics, and object classifications video analytics. Honeywell Pro-Watch Integrated Security Suite Pro-Watch Video Management System (VMS) R700 is part of the Honeywell Pro-Watch Integrated Security Suite, a software platform, which is specially designed for enterprise and critical infrastructure markets, to help protect people and property, optimize productivity and ensure compliance with industry regulations, all while helping to reduce operational costs. To enhance situational awareness, Honeywell’s Pro-Watch VMS R700 easily integrates with Honeywell Pro-Watch Intelligent Command, a web-based user interface that provides organizations the ability to construct a security system with total situational awareness, in order to better protect people, property, and assets.
CEO Avi Golan: “As a vendor of AI based facial recognition products for private companies and government agencies it is important for me to emphasize - facial recognition apps should be provided with an empty database” Australia privacy regulator, the Office of the Australian Information Commissioner, has found that the scraping pictures and identities from social networks breached citizens’ privacy. “The covert collection of this kind of sensitive information is unreasonably intrusive and unfair,” said OAIC privacy commissioner Angelene Falk in a press statement. “It carries significant risk of harm to individuals, including vulnerable groups such as children and victims of crime.” Facial recognition products Oosto CEO Avi Golan: “Oosto endorses the Australian Government's decision. Scraping images of people from the web without their consent is, in our view, a serious violation of the right to privacy. As a vendor of AI based facial recognition products for private companies and government agencies it is important for me to emphasize - facial recognition apps should be provided with an empty database.” Oosto, formally Anyvision, enables enterprises to better protect their customers, guests and employees Oosto, formally Anyvision, enables enterprises to better protect their customers, guests and employees by identifying security and safety threats in real-time using Vision AI and facial recognition technology, without compromising on fair and ethical use. Organizations in the financial services, buildings, retail, health, sports and gaming are using Oosto’s visual AI platform to positively impact safety, productivity and customer experience. It's important to understand that they are alternative ethical approaches to facial recognition that do not require scraping images of people from social media, Google images, LinkedIn, Instagram, among others. Specific security needs Oosto's perspective is that biometrics should be deployed with empty databases, adequate safeguards for data and privacy need to be built into the technology, and improved operational due diligence needs to be adhered to. Oosto has employed safeguards including databases created from scratch by the customer organization to meet their specific security needs, and the use of secure cryptography of any captured biometric data. Oosto points out that it also includes a ‘GDPR-mode’ which blurs the faces of people not appearing on the watchlist. In September the British Biometrics and Surveillance Camera Commissioner, Professor Fraser Sampson has approached the public to consult on revisions to the Surveillance Camera Code of Practice. Oosto has responded in an open letter entitled: ‘Facial Recognition Apps Should Be Provided to the Police with an Empty Database.’
Reader plays a very important role in the access control solution, as it links the credentials and controller system. GV-DESFire Series reader GeoVision has announced the launch of a new series of readers, supporting DESFire, one of the most secure hardware encryption to protect data transmission. The company’s GV-DESFire Series reader allows enterprises to better secure their assets, avoiding intrusions and malicious exploits. 5 key features that open the door to new business opportunities include: Enhanced Security - DESFire EV2 3DES credential enhances security against transaction attacks. Flexible Integration - OSDP standard ensures interoperability and secure data communication from the reader to the controller. Longer Distance - RS485 interface can easily achieve 600 meter installation. Multi-technology - Compatibility with multiple credential technologies, QR Code, RFID MIFARE DESFire EV2 simplify the various requirements for different user profiles. Dual-band Frequency - 125 kHz EM and 13.56 MHz Mifare dual-frequency readers help to manage all the migration projects. GV-DESFire readers come in 3 models - RKD1352 and DES1352, QR1352: RKD1352 model combines card and/or PIN code, allows various access modes (card and key/card/key). OSDP standard provides bi-directional communication between reader and controller, so as to ensure inter-operation with security. DES1352 model projects 125 kHz and 13.56 MHz dual band frequency for all migration projects with higher secure technologies. This reader model comes in flush-mounted design with bi-color options, green and red, for instant grant and denial of access. QR1352 model is equipped with a QR Code module. Identification by QR code simplifies the management of visitors’ temporary access in offices and other facilities. The Virtual credential feature provides touchless access control and a safer experience to customers.
While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimizing operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilizing data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behavior. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customization while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.
More than a year and a half after the COVID-19 pandemic began, countless workers are still doing their jobs remotely rather than from their offices. While there are many positives to working from home, there can also be some negatives at play like nefarious actors taking advantage of the tools and connections that employees use in work from home environments. Insider threats, a security risk that comes from within the organization, are posing a major security problem for businesses. This is partially due to the widespread use of social media, encrypted communication platforms, and other tools. Now more than ever insider threats need to be identified, thwarted, and prevented. Social distancing policies When social distancing policies and mandates began keeping people apart, many turned to social media to stay connected. While social networking tools have provided a positive outlet and a way for people to feel more connected, these platforms have also become a hotspot for insider targeting because they provide a way to propagate disinformation and target individuals likely to be receptive to it. The ideal mark for an insider threat is someone who is active on social media Even more so, they have provided a means to develop relationships with organizational insiders and socialize with them. The ideal mark for an insider threat is someone who is active on social media, has sufficient access to sensitive information, lacks supervision in their day-to-day work, and works remotely. As the relationship develops, through the process of grooming, an employee can become more likely to disregard company policies and commitments. Disregarding company policies One reason insiders might act against their own organization involves monetary gain. The pressures of the pandemic have led to record levels of unemployment and financial strain for millions of Americans. Financial issues can include struggling to pay for childcare, supporting family obligations, paying rent and more. Those who find themselves in a financial bind might not just act against their own company but could also more easily fall victim to a threat. Another reason that insiders act is that they may be disgruntled. Insiders may hold a grudge because they were passed over for promotion, were given an unsatisfactory performance rating, or they may be facing termination. While just one of these factors may not be a trigger to involve the company’s security team, any combination of these factors along with a change in the employee’s demeanor or behavior should serve as a red flag to pay closer attention to the situation. Potentially malicious insiders Sending confidential information to an unsecured location in the cloud exposes the organization to risk Another challenge employers face directly relates to the somewhat limited supervision of employees who work remotely. In this situation, identifying potentially malicious insiders is more difficult, largely because face-to-face interactions are limited. When the pandemic began, many companies shifted their primary areas of focus to keeping the business viable, which is understandable. However, with this shift of focus, less attention may have been paid to security issues. The proactive company will have ensured their employees are aware of the following: Steps they should take to ensure their devices -- both company-issued and personal -- are secured at all times. Sending confidential information to an unsecured location in the cloud exposes the organization to risk. Breaking security policies to simplify tasks is prohibited. Ensuring their devices are updated with the latest security patches. A failure in any of these areas can produce an environment ripe for malicious insider activity. Cyber security teams This multidisciplinary group can lead the initiatives that are paramount to keeping the company secure The insider threat is an organizational threat and so it is most effectively addressed from a holistic perspective. Stakeholders from different parts of the organization need to be at the table to understand and address such threats. An effective team includes personnel from the legal, human resources, communications, and physical and cyber security teams. This multidisciplinary group can lead the initiatives that are paramount to keeping the company and its employees secure. Conduct a risk assessment of the company’s security processes or a threat assessment to the company’s people or assets. No organization is without some level of vulnerability, so identify the most critical assets, information, and systems; identify those who have access to these critical assets; and build controls around them to provide extra security. Delivering refresher training Build a training program to help employees and management identify concerning behaviors. Educate staff about insider threat indicators and provide instructions for how to report concerns. Require employees to complete training and deliver refresher training and updates throughout the year. Training on this matter is not a one-and-done situation. Ensure there is an impartial and confidential process in place for employees to report possible insider threats. Employees need to trust that if they report concerns about behaviors or actions on the part of a fellow employee, their information will be handled discreetly and if warranted, acted upon. Write a communications strategy clearly defining the process for relaying insider threat incidents. An effective plan lays out what information and when this information should be shared with specific individuals and to the broader community, who has authority to communicate sensitive information, and how the information should be disseminated. Remote working challenges Establish a check-in process for managers and their direct reports to enable a means for employees to share concerns and for managers to identify challenges or opportunities to assist employees working in the virtual environment. Make an EAP (employee assistance program) readily available to employees. Ensure they understand how to access their EAP and assure them that contacting the EAP will not have a negative impact on their career or growth potential. Providing venues for employees to share their concerns and talk with trained staff can greatly help organizations navigate insider threats and general remote working challenges. Security risk environment The virtual workplace has created a serious security risk environment for companies in which employees who would not normally engage in insider threats become more vulnerable to them. Through new technologies and possibly due to new financial hardships, those looking to harm an organization are out there, searching for opportunities to strike. It is leadership’s responsibility to take proactive action to ensure their employees are aware of the possibility of insider threats, the seriousness with which management views them, and the resources available should someone fall victim. It is everyone’s responsibility to remain vigilant.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before they happen. Vehicle security barriers Even amid the pandemic, manufacturers of vehicle barriers have not seen a major impact on their sales. “Half of the battle against aggressors perpetrating a vehicle attack is pre-planning,” says Greg Hamm, Vice President of Sales and Marketing, Delta Scientific. He says Delta is fortunate to have long-standing trust relationships with many agencies, built over the last 46 years. “We're happy to see that demand for vehicle security barriers has not changed much – customers are preparing for the future when crowds will be present again, and probably larger than ever,” adds Stuart Glen, National Sales Manager of Jackson’s Fencing. “Lots of councils are using the downtime to install or upgrade security around town and city centers, which is promising.” Physical structures such as bollards, barriers, and barricades can stop a vehicle from entering a high-foot-traffic area. Temporary venues can deploy portable barriers. "We're happy to see that demand for vehicle security barriers has not changed much" Fully automated system The first consideration is the level of security required for a particular location. A parking garage for a foreign embassy or federal courthouse will require far more serious security measures than a parking lot for a mall. Other primary factors to consider include the frequency of vehicles moving in and out and whether there will be vehicle inspections performed or a fully automated system at the entrance. “A key challenge when protecting people from vehicle attacks is trying to ensure that the public are kept safe, but do not feel worried or overly aware of any risks,” says Glen. “People should feel protected and be able to move freely. Discreet measures such as bollards are ideal as they don't restrict pedestrian flow but are very effective in the case of a hostile vehicle attack.” Sparking future assaults The use of vehicles as tools of destruction has become one of the top concerns for security specialists Events and sports venues need increased protection as they are likely targets due to the high numbers of crowds. Places of worship are sadly another target that should be given extra protection, says Glen. The use of vehicles as tools of destruction has become one of the top concerns for security specialists. This tactic has grown popular regardless of ideology and is especially alarming when coupled with cars’ accessibility. In many places, individuals only need a valid driver’s license to rent a truck. News of a particular attack encourages or inspires other individuals to perpetuate the same form of violence. Unfortunately, this creates a feedback loop as more reports emerge following these tragedies, potentially sparking future assaults. Straightforward security solutions In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Delta Scientific offers over 100 product designs, emphasizing barriers that stop and destroy attacking vehicles. Delta’s barriers carry crash ratings from PU50 up to K54 and include sophisticated control systems that provide custom optimization. Control systems feature the latest, most advanced protection technology. Early warning systems enable active security measures built into Delta products plus alert features to on-site security personnel. Delta Scientific’s High Security Protection and Barricade Systems are used internationally by governments, armed forces, federal agencies, private corporations, and other industries. Jackson’s Fencing’s range of solutions includes fencing, bollards, road blockers, and gates. They have been tested to PAS 68 standards and can stop a 7.5-ton vehicle traveling at 50mph (80km/h). The products come with a 25-year guarantee. Attractive timber appearance They offer crash ratings up to M50 and include both automated barriers and passive bollards In addition, their unique Linebacker PNR system is a cable crash fence, encased within a timber post and rail fence, offering a completely discreet yet highly effective vehicle security barrier with an attractive timber appearance. Facilities that require day-to-day employee and civilian access need permanent solutions installed to thwart daily terror threats, says Hamm of Delta Scientific. Solutions include wedge barriers, bollards, beams, and sliding gates with high duty cycles and excellent reliability coupled with appropriate crash ratings. Local fairs and festivals, parades, conventions, sports, and vaccination sites utilize portable barriers that can be towed into place and set up within 30 minutes. They offer crash ratings up to M50 and include both automated barriers and passive bollards. They can be plugged into a local 120v source and provide a portable solution that allows vehicle throughput by pushing a button. Vehicle-borne attacks Both temporary and permanent barriers are extremely effective, says Glen of Jackson’s Fencing. Temporary barriers can be deployed rapidly and removed when a threat has passed (for example, an event such as the London marathon, where large crowds gather), while permanent measures are used for sites that will always be a high-risk target. Glen says temporary barriers also generally have a more dominating appearance and wider footprint. Permanent measures are used for sites that will always be a high-risk target. Temporary barriers can be used immediately after a risk assessment highlights vehicle-borne attacks as a threat to a site before permanent measures are installed. They can help to identify the ideal positioning of permanent barriers – often it's a case of trial and error before finding a solution that works well for one’s particular needs. The United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. Access control products This certification minimizes insurance risks for organizations that deploy authorized Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorized to carry the SAFETY Act Designated mark. By minimizing insurance risks to deploying authorized Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security. A common planning deficiency occurs when designers choose non-certified barriers or barricades A common planning deficiency occurs when designers choose non-certified barriers or barricades. Certified equipment has been tested and proven to work under extreme conditions, thus giving planners the confidence they rely on. No area is more critical to the vehicle barrier selection process than testing. Without adequate testing, there is no assurance that the barrier will resist the threat. Independent testing company Testing is normally done by an independent testing company or government agency, such as the Department of State (DOS) and ASTM. Comprehensive reports of test results are issued and are available from the testing agency or manufacturer. A common misconception among the general public is that the barriers are ‘ugly,’ but this often comes from the appearance of temporary barriers that are installed for testing purposes before deciding on permanent measures. Temporary barriers often have a large footprint because they have no foundations and can be quite obtrusive. There are actually many discreet and attractive permanent solutions such as road blockers and stainless steel rising bollards, which allow flexible control over entry and security, and can be rapidly activated.
Following a change in employment practices, created by the COVID-19 pandemic, many office-based employees now follow a hybrid schedule, working where they are needed or find convenient. The fast-growing use of flexible offices and co-working spaces is a testament to this emerging trend. With employees coming and going as they please, a change in how security and access control are managed is an urgent, but overlooked aspect that many firms are just waking up to now. Clockwise, renowned office space provider Clockwise is the UK and European provider of flexible office space for entrepreneurs and established businesses. The company’s expanding offering includes contemporary offices, meeting rooms, and shared workspaces, across multiple cities. Any business, which relies on flexibility, places high demands on door security and access control. Clockwise needs a broad choice of electronic devices to secure meeting rooms, private offices, communal spaces, and main entrances, which may not all require the same lock type. Access management should adapt to changing needs Access management must be able to adapt and change, as fast as Clockwise clients’ needs The office space demands of a start-up, freelance co-worker, or growing SMB can change at any time, so Clockwise offer a range of membership levels and packages. Access management must be able to adapt and change, as fast as Clockwise clients’ needs. Because tenants come and go frequently, Clockwise facility managers need tailoring of user access rights, to be as easy as possible. Clockwise’s own spaces and a portfolio may also evolve, so any access system must be able to scale instantly up or down. How flexibly Clockwise can deliver for their clients is essential to growing in such a competitive market. Incedo Business offers versatile access control The range of Incedo-enabled devices and door hardware, managed by simple cloud-based software, convinced Clockwise to choose ASSA ABLOY Opening Solutions’ Incedo Business, for all their premises. This platform-based access solution connects security software and hardware within a single, future-proofed ecosystem. The diversity of Incedo-enabled devices enables Clockwise to select the ideal electronic lock for every opening in their properties. Internal private office doors, ‘Zoom rooms’ and meeting rooms, as well as communal area doors, and entrance/exits, are now secured with wireless access control devices from the Incedo Business range. Flexible system management options Incedo’s flexible system management options help Clockwise to operate access control with maximum efficiency. Administrators quickly create groups with tailored access for specific doors. Access permissions may also be time-limited, which is perfect for meeting room bookings or for facilitating access hours for different membership options. Private desk members get 24/7 admission, whereas hot-desk membership is only allowed entry during office hours. According to Clockwise, the flexibility to create groups and the ability to remotely update cards, both work really well for their business.
RPG Life Sciences Ltd. formerly Searle (India) Ltd. is a full spectrum, world class, customer focussed, innovative pharmaceutical organization. They develop, manufacture and market, for national and international markets, a broad range of branded formulations, generics and bulk drugs developed through fermentation and chemical synthesis routes. RPG Life Sciences were facing service issues with their outsourced payroll provider. Not only was the service not up to the mark, the payroll solution provided did not include any employee self service module. This led to a large number of employee queries being unanswered each month. Comprehensive payroll solution Also the multi-location nature of the business made distribution of reports and payslips a challenge. Delays were encountered in the delivery of reports along with inflexibility of reporting formats. RPG Life Sciences approached TopSource Worldwide to provide a comprehensive payroll solution that needed to be delivered on time, accurately and be able to respond to their growing needs. The Payslip distribution took place thru Portico to the multiple locations TopSource Worldwide provided employee self service thru Portico that gave access to employees to their payslips and enabled them to make investment declarations. The Payslip distribution took place thru Portico to the multiple locations. 24X7 access to payslips was provided by Portico from anywhere via the web. Adhoc reporting requirements Special reports such as Cumulative MSR, CARO Report, Additions and Deletions report and many more were provided to facilitate internal reporting for Finance and HR. A customized JV program was built to provide the journal entries from payroll to SAP. Bonus, Exgratia and Superannuation calculations were provided along with the necessary Journal entries for accounting each month. A Cheque writing service was also implemented in a few cases where required. RPG Life Sciences has to no longer spend time on administrative work and queries related to payroll. They have eliminated the risk of issues caused due to employee dissatisfaction with payroll and are now getting their payroll reports on time. Online availability of information has changed all that. They also have the added benefit of a flexible service provider to meet their adhoc reporting requirements.
The Kalyani Group had promoted Kalyani Wheels as a part of its diversification plan. Kalyani Wheels then had a technical collaboration with Lemmerz Werke, Germany. Subsequently, Lemmerz Werke became a joint venture partner and the new company was christened as Kalyani Lemmerz Ltd (KLL). The company manufactures Wheel Rims for utility vehicles, light and heavy commercial vehicles and tractors. Wheel rim technology Lemmerz is a pioneer in wheel rim technology and supplies to automotive manufacturers. KLL manufacturers wheel rims using the flat stock, cold pressing and flow forming method pioneered by the Lemmerz Group. This process gives Kalyani Lemmerz a competitive edge over other wheel rim manufacturers. The HR team was also spending time on providing ad-hoc reports post payroll KLL's HR department was responsible was processing its payroll. The HR team desired to focus on labor law issues. Also running a payroll in-house came with the risks of information and data leakage resulting in compromising the confidentiality of data. The HR team was also spending time on providing ad-hoc reports post payroll. KLL approached TopSource Worldwide to provide a comprehensive payroll solution that needed to be delivered on time, accurately and be able to respond to their growing needs. Comprehensive payroll solution TopSource Worldwide provided an end-to-end payroll service that freed up HR to continue to focus on HR related activities. Special reports were developed as part of the automation initiatives to produce Bonus Calculation, CTC summary, LIC reconciliations and Trust PF contributions. Timelines (including working on Sundays if required) are being followed by TopSource Worldwide to deliver the service. KLL has to no longer spend time on administrative work and queries related to payroll. The HR team is able to focus on core HR issues and industrial relations. They have eliminated the risk of issues caused due to employee dissatisfaction if HR issues are not handled in a timely manner. They also have the added benefit of a flexible service provider to meet their adhoc reporting requirements.
Dorabjee's identified that there was a problem in their bank reconciliation and invited TopSource Worldwide in May 2012 to review their Bank reconciliation process and controls and provide recommendations to address this problem. Bank reconciliation at Dorabjee's was reconciled till March 2011 with unreconciled transactions from 2006. Bank reconciliation was also completed episodically. There was no specific process or controls in bank reconciliation process. Bank reconciliation process TopSource Worldwide took a number of steps to arrive at an effective solution: Dorabjee's internal accounts team completed the bank reconciliation as on 31/3/12. Dorabjee's internal accounts team cleared historic unreconciled transactions from 2006. Dorabjee's internal accounts team recorded payment transactions which were not posted for the period - April'12 till July'12. TopSource Worldwide completed reconciliation from April'12 till July'12 as a 1st step. In reconciliation completed as on July'12 TopSource Worldwide identified all open items > 30 days and resolved them with the help of Dorabjee's internal accounts team. TopSource Worldwide then completed reconciliation from Aug'12 till Sep'12. TopSource Worldwide prepared a delivery schedule for receiving inputs, delivery of reconciliation and completed reconciliation from October'12 on a monthly basis. Cash flow monitoring Bank reconciliation is up to date and completed on monthly basis. All open issues are reported to Dorabjee's and resolved. Dorabjee's can rely on and use the bank reconciliation as a tool to identify any errors in the accounting records of the company or bank. It provides an added comfort to Dorabjee's that the bank transactions have been recorded correctly in the company records. Monthly preparation of bank reconciliation assists Dorabjee's in the regular monitoring of cash flow of a business.
Dahua Technology is a globally renowned video-centric smart IoT solutions and services provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services, in order to create value for city operations, corporate management, and consumers. Dahua Technology has designed a video surveillance and control solution for a popular Panamanian Food Company - Empresa Panamena de Alimentos (EPA). Dahua’s Security solution Empresa Panamena de Alimentos is a renowned company in the processed food industry in Panama, Central America. It was founded in 2012 and owns production plants and warehouses in the capital city, as well as agencies around the country. EPA’s products, including all kinds of cookies, coffee, and pasta, are already important parts of consumers’ day-to-day life. With the prevailing COVID-19 pandemic risks, EPA needed a system to sustain efficient management and operation, over their staff and facilities. Implementing multiple access controls in the facilities As a food company, the operations of the company need to be under caution, especially during the pandemic As a food company, the operations of the company need to be under caution, especially during the pandemic. It was necessary to implement multiple access controls in the facilities. With multiple plants located around the nation and accelerated growth, a centralized monitoring system for all equipment, alert management and user reports was needed. The solution, applied at EPA’s facilities, integrates various electronic security systems under a single platform and was evaluated based on the company’s needs. ANPR, AI-based cameras and access control systems “Currently, 480 Dahua devices have been arranged. Among them are different models of cameras, access control systems, and automatic number plate recognition products. AI-based cameras enhance the level of personnel protection. Everything is monitored by a DSS Express server in the main plant,” said Luis Araujo, the Manager of Infrastructure and Telecommunications of the Secutec Panama. Every day, more than 800 employees enter EPA facilities nationwide, the access control system allows a faster and safer automated entry of the staff and their cars. access controllers and Pro Network Video Recorders Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted Apart from automatic number plate recognition (ANPR) devices, more than 20 access controllers (ASI7213X-T1) were installed in main offices for temperature monitoring and attendance management. Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted. With a powerful processor, they have the capability of 4K resolution processing and high definition recording quality. Perimeter protection and access control In Dahua Technology’s security solution, perimeter protection and access control are both realized. “We have had Dahua equipment for 7 years. It is a brand that has been of great help to our safety. It has contributed to continuous and steady operations throughout the COVID-19 pandemic,” said Guillermo Figueroa, EPA’s Safety and Control Manager. Javier Rodríguez, Secutec Panama’s Operations Manager, valued the quality and technology of Dahua’s solution, which has been ‘key’ for the development of their projects, the support and accompaniment to the brands that are planned to be developed. Trust in Dahua Technology’s solution “We are very proud that our teams are here for EPA and that companies, like EPA and Secutec, trust Dahua Technology. We continue to innovate to offer solutions that help companies to work in a safer and smarter way,” said Fermín Osorio, an Engineer at Dahua Technology Ltd.
Gindi TLV, a residential complex in the heart of Tel Aviv, Israel, maintains the safety of its community, by using Oosto’s face and object recognition, to reduce contact with surfaces and enforce a policy of density, distance and wearing masks in public areas. Securing Gindi TLV complex Gindi TLV is an innovative residential complex, located in the heart of Tel Aviv, which includes 4 towers, restaurants, cafes, a country club and a mall. The complex has been planned and designed to allow community life for families and individuals, who have chosen to live in the beating heart of Tel Aviv, located within walking distance of the city’s business and entertainment areas. Gindi TLV residents use a dedicated app for convenient booking of the complex’s facilities Gindi TLV residents use a dedicated app for convenient booking of the complex’s facilities, parking, guest invitation and as a social network that is the basis for community life in the complex. Gindi TLV is also equipped with advanced and interconnected technological systems that enable efficient and cost-effective management of infrastructure and service for tenants. Oosto’s facial recognition technology The Prop-tech technology in the complex was developed and managed by the start-up, MyTower, which serves as a design partner in the project and is responsible for making it the first smart residential neighborhood in Israel. Gindi TLV uses Oosto’s facial recognition technology, in order to provide tenants with touchless and secure entry. Dan Stern, the Vice President (VP) – Digital, at Gindi TLV, explains “On the one hand, the tenants in the complex are highly sensitive to personal security and privacy, and on the other hand, because it is their home, we did everything to avoid using cards, chips or fingerprints, and allow easy access control for tenants, and their guests, using Oosto’s advanced facial recognition technology.” Visual AI and touchless access control Dan Stern adds, “Following the ongoing COVID-19 epidemic, there has been a need to expand the use of visual AI, to maintain community safety, by reducing contact with surfaces, monitoring density in facilities and public areas in the complex.” Ofer Schmidt, Sales Director of Central Europe & Israel, Oosto, said “Pre-COVID-19, maintaining tenant safety was primarily about security - letting tenants and their guests in and keeping unauthorized people out, in a transparent and smooth manner. Deployment of facial and object recognition solutions These days, we are seeing more and more prestigious residence complexes using face and object recognition" Ofer Schmidt adds, “These days, we are seeing more and more prestigious residence complexes using face and object recognition, to maintain the health of the tenant and staff, for example by enforcing a policy of on distance, density, wearing masks and allowing only vaccinated, or those with a negative test, access to common facilities, such as the gym.” He further stated, “The high accuracy of the computer vision algorithms, operating in Gindi TLV, enables the maintenance of the health of those who live or visit the complex, while minimally interfering with their daily routine. “ Video analytics using AI Video analytics using artificial intelligence (AI) to reduce COVID-19-related risks is not unique to residential complexes. According to a recent survey, 82% of academic institutions in the US and Western Europe will adopt face and object recognition technologies, in order to maintain safety through enforcing mask wearing, social distancing and reducing contact with surfaces to a minimum.
Round table discussion
Keeping prisoners safely housed is among the biggest challenges the security industry faces. Correctional applications of security technology are often more extreme and require a specialized mix of technologies. We asked our Expert Panel Roundtable: What are the video security and surveillance needs in prisons, and how well do technologies meet those needs? Are there any ethical qualms about selling to prisons?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security. As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the trends in residential security in 2021?
14 Success Stories About How Video Technology Is Improving City LifeDownload
Empowering Cameras With AIDownload
The Rise of Ethical Facial RecognitionDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download