Internet of Things (IoT)
‘Making things easier’ – Under this maxim, the Panomera multifocal sensor systems by video technology manufacturer, Dallmeier have guaranteed maximum image and analysis data quality with minimum camera units for ten years now. The latest generation of the Panomera S-Series features a completely new design and offers numerous innovations, from the one-man mounting concept to contactless front glass cleaning, and above all, superior video analysis capabilities. Panomera multifo...
Honeywell, a global provider of fire and life safety, launched the first tools from its new suite of Connected Life Safety Services (CLSS), its first all-in-one cloud platform for fire safety systems. Honeywell’s CLSS suite of tools, built on the Honeywell Forge platform, enable fire technicians to minimize disruption, prove compliance and reduce time needed for design, installation, commissioning, inspection, maintenance and reporting of life safety systems. “Today&rsqu...
Dahua Technology, a renowned, video-centric provider of smart IoT solutions, announced a major rebranding to reflect the company’s growth and evolution within the North American video surveillance market. WizSense (pronounced “Wise Sense”), Simplified Analytics for Accurate Results, and WizMind (pronounced “Wise Mind”), Advanced Analytics for Ultimate Performance, will be sub-categories under Dahua’s Analytics+ umbrella. Each line encompasses existing product...
DHF (Door & Hardware Federation), is highlighting the importance of safety – and legal responsibilities – for owners of automated products through a series of free two-hour Zoom seminars. The first seminar, held on 23rd September, and delivered by DHF’s Senior Training and Compliance Officer, Nick Perkins, offered a guide for owners and managers of industrial doors, garage doors, powered gates and traffic barriers, including vehicle/loading bay doors, and vertically acting...
Branded as ‘The New DICE’, DICE Corporation is changing the perception of monitoring and providing the industry with a game-changing way of doing business. ‘The New DICE’ 'The New DICE' is part of the company’s future roadmap, kicking off a multi-million-dollar investment in new technologies, products and services that include IoT solutions, Artificial Intelligence, machine learning, analytics, integrated audio and video, and much more. Going beyond basic s...
DH2i, a renowned provider of multi-platform Software Defined Perimeter (SDP) and Smart Availability software, announced the launch of DxOdyssey for IoT. The new edge-optimized Software Defined Perimeter (SDP) solution, ensures end-to-end Zero Trust IoT (Internet of Things) connectivity, for the highest possible levels of security for IoT data, communications, and operations. McKinsey advised that edge computing would represent a potential value of $175 billion - $215 billion in hardware by 2025...
The Zigbee Alliance, an organization of hundreds of companies creating, maintaining, and delivering open, global standards for the Internet of Things (IoT), announced its newly launched Europe Interest Group. Comprised of volunteer members with a shared focus on topics relating to Alliance technologies and the European market – including the Connected Home over IP project – the new Interest Group is designed to facilitate conversations and collaboration among members to strengthen Zigbee Alliance standards globally. Europe Interest Group We are creating a structure to provide better visibility into the important developments" Membership is open to all Zigbee Alliance Participants and Promoters. The group is chaired by Alliance Board Member and IoT Architect Ulf Axelsson of IKEA Home smart, and the Europe Interest Group will bring a European voice more formally into the standards work within the Alliance. “I am looking forward to collaborating on new levels with fellow Alliance companies from an EU perspective, and fostering more regular interaction between our members that are interested and invested in the European residential or commercial IoT markets,” said Axelsson. “We are creating a structure to provide better visibility into the important developments happening across the Zigbee Alliance, and our Europe Interest Group provides an efficient avenue for more two-way dialogue and information exchange between regions, countries, companies and individuals all working toward the same technology goals.” Tasks of the Board The Europe Interest Group operates under the supervision of the Zigbee Alliance Board of Directors, and is tasked with: Providing input to the Board regarding European technology needs and current events; Collecting, capturing and sharing ongoing information about EU regulation and standards to the Working Groups within the Alliance to aid in the development of global, open IoT standards; Sharing regular Project CHIP updates to EU member companies; Facilitating discussions around Project CHIP interoperability across Europe while providing insight to shape future endeavours for the European landscape; Coordinating and engaging with Alliance marketing teams to support EU events and speaker programs. European-Centric group “The formation of this European-centric group will take Alliance-wide cooperation and communication to new levels, which is essential as our game-changing Project CHIP initiative comes into focus and to the market in early 2021, and we continue to drive openness and interoperability through our flagship Zigbee standards,” said Bruno Vulcano, R&D Manager at Legrand and Chairman of the Board for the Zigbee Alliance. “We’re fortunate to have Ulf of IKEA Home smart leading this charge as he brings an ideal blend of technical experience, regional expertise and peer leadership to this role.”
A new variant of the InterPlanetary Storm malware has infected roughly 13,500 machines across 84 different countries and counting, says email security firm Barracuda Networks in their September Threat Spotlight research. The malware, named InterPlanetary Storm, was initially uncovered in May 2019 as a malicious attack designed to target Windows machines. This new variant, which Barracuda researchers first detected in late August, is now also targeting IoT devices, such as TVs that run on Android operating systems, and Linux-based machines, such as routers with ill-configured SSH service. Essentially, this new variant gains access to machines by running a dictionary attack against SSH server, similar to FritzFrog, another peer-to-peer (p2p) malware. Access to infected devices It spreads using SSH brute force and open ADB ports, and it serves malware files to other nodes in the network It can also gain entry by accessing open ADB (Android Debug Bridge) servers. The malware detects the CPU architecture and running OS of its victims, and it can run on ARM-based machines, an architecture that is quite common with routers and other IoT devices. While the function of this malware is not known yet, it’s likely that campaign operators will be able to gain access to infected devices so they can later be used for crypto mining, DDoS, or other large-scale attacks. Some of the 84 countries which have so far reported cases of the InterPlanetary Storm malware, include: Argentina, Australia, Belgium, Brazil, Canada, France, Germany, India, Spain, the United Kingdom and the United States. It spreads using SSH (Soft Shell) brute force and open ADB ports, and it serves malware files to other nodes in the network. The malware also enables reverse shell and can run bash shell. Multi-factor authentication Fleming Shi, CTO for Barracuda Networks, comments: “This new variant of malware is extremely infectious and malicious, and it’s very likely that it will spread beyond the 84 countries which have already been impacted. Moving forward, it’s essential that tech users properly configure Secure Shell access on all devices." "This means using keys instead of passwords, which will make access more secure. Furthermore, deploying a multi-factor authentication enabled VPN connection to a segmented network, instead of granting access to broad IP networks is vital, particularly if users wish to share access to secure shells without exposing the resource on the internet.”
Intersec, the world’s renowned security, safety, and fire protection trade fair, has been rescheduled to take place in January 2022, organiser of the trade event, Messe Frankfurt Middle East confirmed on September 24, 2020. The 23rd edition of the three-day event was originally set to run from January 24-26, 2021, at the Dubai World Trade Center, in Dubai, UAE. However, the event has now been moved to 2022, after extensive consultation with key industry stakeholders. Intersec Dubai 2022 “We’ve spoken to many of our exhibitors, industry trade associations, supporters, and partners over the last couple of weeks and have heard first-hand the many challenges they’re facing putting pressure on their ability to participate at Intersec in January 2021,” said Alexandria Robinson, Intersec’s Show Director at Messe Frankfurt. He adds, “Moving Intersec to its customary January dates in 2022 at the Dubai World Trade Center will allow time for recovery.” Webinar series in 2021 Ms. Robinson said Intersec will be very active throughout 2021, via its ongoing webinar series, while the team is now working towards creating a virtual event early next year, so as to engage industry leaders, regulators, government agencies and opinion formers. “We might be restricted physically, but we know there is a definitive need for critical conversations and discussions to address the challenges the industry has faced,” said Robinson. Digital forum to share ideas and solutions By hosting these talks via a digital forum, it enables us to keep connected to the industry" He adds, “By hosting these talks via a digital forum, it enables us to keep connected to the industry and nurture our existing relationships, while sharing solutions and common goals. We’ll share further details and plans about the digital event in the coming weeks.” Intersec’s popular free-to-attend webinar series, of which there’ve been 11 so far in the last four months, have kept thousands of attendees abreast of the latest industry trends and opportunities. Ensuring safety in COVID-19 pandemic period “We know we have a vital role to play in connecting and supporting the industry, and the Intersec webinars stimulate meaningful conversations, collaborations and success stories,” stated Robinson, adding “We will continue to run these and support our stakeholders in every way possible until we meet again personally, and safely, at Intersec 2022.” She further said, “One thing is absolutely certain, our community is resilient and will bounce back. It has been involved in many frontline situations throughout the course of this year and it will continue to play a critical role in the months ahead. Throughout 2021 and come January 2022, we’ll have much to share and learn from each other.” Intersec 2020 Intersec in 2020 featured 1,100 exhibitors from 56 countries, while attracting 33,872 visitors from 135 countries. The global industry event is supported by Dubai Civil Defense, Dubai Police, the Security Industry Regulatory Agency (SIRA), Dubai Police Academy and Dubai Municipality.
Iris ID Systems Inc., a globally renowned iris recognition-based identity authentication solutions provider, has announced that it has entered into a global partnership with Remo+ (Olive and Dove Company) for smart home and IoT devices. Iris ID – Remo+ partnership This partnership will broaden the accessibility of home video security and IoT solutions for the global market and enable Iris ID to introduce new products which complement and expand the capabilities of its existing markets. The strategic collaboration will allow Remo+ to access extensive distribution networks for access control solutions, targeting market opportunities where consumers seek a superior security solution that is easy to use and contactless. Biometrics and home security solutions Our partnership with Remo+ is a first in the biometric and home security industry" "Our partnership with Remo+ is a first in the biometric and home security industry,” said Mohammed Murad, Vice President, Global Sales and Business Development, Iris ID, adding “Iris ID and Olive and Dove joined forces to produce innovative solutions for the consumer market. With Iris ID’s extensive global distribution channel and state-of-the-art product portfolio, this partnership will create greater accessibility for these technologies around the world.” He adds, “The Remo+ product brand’s proven track record of designing and manufacturing home security cameras is a perfect complement to Iris ID leadership in the biometric security industry." Exclusive distribution rights for consumer security applications The agreement grants Iris ID exclusive distribution rights for consumer security applications from Remo+ (Olive and Dove Company) in North America and non-exclusive rights in the rest of the world. Products under this arrangement will continue to be sold under the Remo+ brand. Iris ID will continue supporting existing distributors and resellers, while expanding the market for the consumer security marketplace. Murad further stated, “Iris ID looks forward to further collaboration with Remo+ (Olive and Dove Company) for future product development in this market.” Enhancing home security portfolio "We are very pleased to partner with Iris ID and combine forces in our industry,” said Moon-Chul Lee, Chief Executive Officer, Remo+ (Olive and Dove Company), adding “Success in the home security and other markets requires strong application software, as well as a strong sales channel and service support resources, which Iris ID has globally.” He adds, “This agreement allows Remo+ to concentrate on expanding its growing market in the Americas and beyond. We look forward to improving customer support and services through Iris ID’s outstanding worldwide solutions provider network."
SecureBI, a strategic advisory firm delivering business intelligence to the security industry, and the American Crime Prevention Institute (ACPI) have established a partnership to bring online crime prevention training and certification courses to law enforcement agencies and security professionals across the country. ACPI has pioneered the development and delivery of in-person crime prevention training and certification programs for law enforcement since 1998. With the new online educational offerings, ACPI can provide efficient delivery of content for professional development and certification remotely using video and online communication tools. ACPI certifications are well-respected throughout the public safety arena, demonstrating a commitment to crime prevention and expertise in proactive security strategies. Law enforcement agencies "The future of professional development and certification will be driven by the evolution of online technologies and collaboration tools," said Dan Keller, Executive Director, ACPI. "As an organization dedicated to making learning accessible to everyone, we looked for ways to modernise our course delivery. Partnering with SecureBI allows us to meet demand for our rich library of offerings for law enforcement agencies, and to expand our reach to security industry professionals.” Initial online courses will be offered live and cover a variety of topics, including: Crime Prevention Through Environmental Design (CPTED), December 1-4, 2020 Community Engagement for Law Enforcement, December 8-10, 2020 Security Assessment for Law Enforcement Personnel, January 11-15, 2021 For security professionals As additional courses are added to the online collection, a certification track will be developed specifically for security professionals in addition to existing law enforcement certifications. "APCI and SecureBI both share a dedication to helping leaders achieve their goals through continuing education. As the world transitions to a more remote, online workforce, it is up to us to ensure e-learning opportunities are readily available and easily accessible," said Brandon Reich, CEO, SecureBI. "This partnership is about a joint vision of simplifying access to certification opportunities and education that enables law enforcement and security industry professionals to validate their expertise and proficiency in creating safe and secure environments."
Electric locking is among the most ubiquitous examples of everyday security. Yet the complexity of electric locks and the advanced technologies deployed to provide simple, dependable and, for the most part, impenetrable locking often goes unnoticed. And that’s a good thing: when we take things for granted, it usually proves they’re fit for purpose. As experts in the field of solenoid actuated designs, we’re okay knowing that remote electric locking solutions are taken for granted and that the design sophistication behind a functional and reliable locking assembly is often overlooked. As readers of this journal will know, security takes many forms. Perhaps the most recognizable application of a security policy is the ability to lock something. A door to prevent access. A gate to control the flow of people or vehicles. Or shutters to guard against theft. Or to unlock a turnstile to allow ingress and egress, as found in leisure centers and museums. Or to switch between either flow direction when required – think soccer match stand access, for instance. In part one of this feature, we look at straightforward electric locking solutions that use solenoid actuators. Straightforward security measures However, while locking can be one of the simplest security initiatives, it’s also capable of being among the most complex where sophisticated measures are called for. In part two, we will cover specialized electric locking technologies and some more unusual security solutions and application examples. Among straightforward security measures is remote locking Among straightforward security measures is remote locking – a function found almost everywhere you look. Unless you’re the proud owner of a classic car, when did you last physically put your vehicle key in the door lock? Remote locking ups the ante for designers who need to incorporate security in an assembly, an application, a product or a system. Solenoid Workhorses Solenoid actuators and electromagnet technologies are the bedrock of electric locks. Remote operation – activating a lock from a distance – is commonplace. Wireless RF transmitters in the key fobs of modern vehicles activate the central locking system. Cards with embedded RFID chips, fingerprint readers and facial recognition systems provide selective access to buildings, typically by either actuating a solenoid lock or releasing a powerful door magnet. You can see examples on the Jubilee and the new Elizabeth (Crossrail) lines on the London Underground. They use electric solenoid-based locks to secure platform access screen doors, only allowing them to open once the underground train has arrived. Solenoid-based electric locking is at the heart of safety-based security in applications such as elevator doors and disabled access lifts, on building hoists, and as interlocking systems for screens and safety covers on machine tools, to name a few. Solenoid-based electric locking is at the heart of safety-based security These are straightforward applications that address a range of issues that come under the general heading of security. Others demand special features built into the electric locking mechanism to meet specific end user requirements. This added complexity can present a design challenge to the inexperienced. Electro-mechanical design engineers invariably have a useful broad knowledge for developing products but not necessarily a core expertise in solenoid technology. One example we like to use is a railway carriage. To design and build that takes a huge breadth of knowledge and expertise due to the many systems and assemblies a carriage comprises. But passenger trains now feature remote electric door locking which must function perfectly – and without which the rolling stock is unfit for purpose. That electric locking subassembly design is a critical feature and a specialist development project. Solenoid actuators and electromagnet technologies are the bedrock of electric locks Shotbolts A generic term used for electric solenoid locks is shotbolts. In these linear actuating units, the solenoid typically moves the bolt directly or through a bell crank to turn the actuation through 90 degrees, or to extend the linear movement of the bolt. They can be built as Fail-safe or Fail-secure models, meaning energise-to-lock, or energise-to-release respectively, which determines the state they adopt in the absence of power. You would want some applications to default to unlock in the event of power loss, and others to default to the locked state. Both types usually deploy a spring to return the bolt in the quiescent unenergised state. Bi-stable is another functionality available. In this design, no power is consumed in either position. A loss of power will leave the device in its last state. Scaling down Some shotbolts are large. Those designed to secure the access ramp on the Solent hovercraft built by Griffon Hoverwork are powerful units – and in that application a weatherproof design is deployed to withstand the saltwater spray and frequent washdowns. But a shotbolt and the solenoid contained within it can be physically quite small and require minimal power, yet still provide highly secure locking in a mortice lock arrangement. This is where the locking assembly starts to become complex Over the years, bespoke designs have been developed for diplomatic bags and Cash In Transit (CIT) cases. Both use small, low power actuators. In the latter application by specialist Cash In Transit equipment manufacturers HDH, intelligent electric lock technology provides unique features – and there’s a range of surprises in store for anyone accessing cash boxes illicitly. Technologies in cash transit solutions include GPS tracking, alarms, remote monitoring and automatic ‘cash degradation’ systems if a case is forced open. Ensuring that degradation systems don’t activate when a case is opened legitimately is equally important. This is where the locking assembly starts to become complex, requiring special design expertise. The CIT solenoid lock uses a 90°actuator to latch, lock and arm automatically if required but can be set to not lock or arm as the actuator travel doesn’t engage with the mechanical latch mechanism by default. Integrated technology solutions inside the case include daylight sensors, surface protection wires inside and out, and reed switches between the lid and the base. All contribute to safety precautions that prevent accidental activation and protect the valuable cargo and the operator. But for first line security, straightforward shotbolt electric locking is still at the heart of CIT cases. Internet of Things Miniature shotbolts are also used in some medical ventilators – a topical subject at the time of writing during the global coronavirus pandemic. They are also increasingly appearing in consumer-level Internet of Things (IoT) applications, being a key component in home automation applications. Our goal at Magnet Schultz is to provide a clearer insight into today’s electric locking industry sector and the wide range of locking solutions available. We dealt with some straightforward technologies and applications here. In part two, we will look at special technologies built into more sophisticated solenoid locks to prevent forced entry, at materials that guard against explosion risks in hazardous environments and even at the use of proportional solenoid technology to manage pressurized gases.
As the media often reports, the world of cybersecurity can be seen like the ‘Wild West’. There’s now a wide range of Internet of Things (IoT) devices connected to the web, making this a hot topic. Among these devices are security cameras. IoT devices are computers that use software that makes them vulnerable. As the famous cybersecurity evangelist Mikko Hypponen says, "If a device is smart, it's vulnerable!" Hypponen is right. On a daily basis, new vulnerabilities are found in software, regardless of the manufacturer. In 2019, more than 12,000 vulnerabilities worldwide were made public and reported as a CVE (Common Vulnerability and Exposure) in the National Vulnerability Database (NVD). Unfortunately, vulnerabilities are a given. What really matters is how a company deals with and resolves vulnerabilities. Cybersecurity vulnerabilities Awareness of cybersecurity vulnerabilities is vitally important Awareness of cybersecurity vulnerabilities is vitally important to protect you, your business and the Internet, but it’s also important to understand that a vulnerability is not synonymous with “backdoor”, and is not necessarily indicative of “cheap quality.” But there are companies out there that are embedding safeguards into their development processes to reduce the risks. You could see them as ‘Sheriffs’, taking steps to make this Wild West a little safer. Why Hikvision chooses ‘Secure-by-Design’ Security cameras, like all other IoT devices, are vulnerable to cyberattacks. Fortunately, manufacturers of IoT devices can significantly reduce these vulnerabilities during the production of devices, using a process called ‘Secure-by-Design’. Implementation of Secure-by-Design requires a commitment on the part of the manufacturer’s management team and a serious investment in resources and technology, which can result in a longer production process and a higher cost of the IoT device. Cost is often the reason why some IoT device manufacturers do not use Secure-by-Design (and are indeed cheaper). Hikvision is a producer of IoT devices that takes security and privacy very seriously and has implemented Secure-by-Design in its production process. Management supports this process and has even set up a dedicated internal cybersecurity structure charged with product cybersecurity. This group is also the central point of contact for all other cybersecurity matters. The Hikvision Security Development Life Cycle (HSDLC) is an essential part of Hikvision's cybersecurity program. Cybersecurity checks take place at every stage of product development — from concept to delivery. Cybersecurity checks take place at every stage of product development For example, product testing takes place during the verification phase, the company also regularly invites well-known security companies and public testing platforms to conduct penetrating testing. Does this mean that all Hikvision products are immune to hacking? No, that guarantee cannot be given, but the HSDLC is a testament to a manufacturer that makes every effort to produce products that are as cyber secure as possible. Source code transparcency center In addition to the Secure-by-Design process, Hikvision opened a Source Code Transparency Center (SCTC) lab in California in 2018, being the industry’s first-of-its-kind lab to open such a center. At this center, U.S., Canadian government and law enforcement agencies can view and evaluate the source code of Hikvision IoT devices (IP cameras and network video recorders). It’s important to emphasize that no product is 100 percent secure. Hikvision has a Vulnerability Management Program in place when a vulnerability is discovered in a product. To date, vulnerabilities that have been reported to Hikvision and/or made publicly known, have been patched in the latest Hikvision firmware, and are readily available on the Hikvision website. In addition, Hikvision is a CVE CNA, and has committed to continuing to work with third-party white-hat hackers and security researchers, to find, patch and publicly release updates to products in a timely manner. These vulnerabilities are collected in the National Vulnerability Database (NVD) and are public. Hikvision recommends that customers who are interested in purchasing security cameras inquire about a manufacturer’s cybersecurity practices and if they have an established Vulnerability Management Program. Cybersecurity questions to consider The cybersecurity of IoT devices is a topic that needs to be addressed in a serious way and it should play an essential role in the product development process, beginning at the concept phase of an IoT product. This requires time, investment and knowledge. Consider the following questions: Do I trust the manufacturer of a low-cost security camera? Does this manufacturer have a dedicated cybersecurity organization? How does this manufacturer handle vulnerabilities? These are the questions that everyone should ask themselves when making a purchase, be it a camera or any other IoT product. There is no absolute 100% guarantee of security, but Hikvision has industry-leading practices to ensure the cybersecurity for its cameras. Cooperation, with its customers, installers, distributers and partners, and full transparency are key elements to successfully secure IoT devices. When you read cybersecurity news, we invite you to look beyond the headlines, and really get to know the companies that produce the IoT devices. Before you buy a security camera or any IoT device, check out the manufacturer’s cybersecurity practices, look for a company with a robust vulnerability management program, a company that aligns itself with Secure-by-Design and Privacy-by-Design and a company that employs cybersecurity professionals who are ready and eager to answer your questions. Remember, there are Sheriffs out there, as well as bandits.
Security experts have discussed the demise of the passwords for years. As early as 2004, Bill Gates told the RSA Security Conference that passwords “just don’t meet the challenge for anything you really want to secure.” Change has been slow, but the sudden increase in remote working and the need for enterprises to become touchless as they try to encourage teams back to the office is increasing traction. Here we look at the future of passwordless authentication - using the example of trusted digital identities - and share tips on choosing a solution that works for your organisation. The move away from passwords was beginning to gain momentum pre-pandemic. Gartner reported an increase in clients asking for information on ‘passwordless’ solutions in 2019. Now Gartner predicts that 60% of large and global enterprises, and 90% of midsize enterprises, will put in place passwordless methods by 2022. This is up from 5% in 2018. The many limitations of passwords are well-documented, but the cost of data breaches may be the reason behind this sharp upswing. Stolen credentials – usually passwords – and phishing are the top two causes of data breaches according to the 2019 Verizon Data Breach Incident Report. Each breach costs businesses an average of anywhere between £4M to £8M depending on which studies you read. A catalyst for change As in so many other areas, the pandemic has been a catalyst for change. Newly remote workers using BYOD devices and home networks, sharing devices with other family members, and writing down passwords at home all make breaches more likely. And seasoned home workers represent a risk too. It also means that enterprises are developing new procedures to mitigate the spread of disease. This includes a thorough examination of any activity that requires workers to touch surfaces. Entering passwords on shared keyboards or touchscreens falls squarely in this area of risk. As does handling physical smart cards or key fobs. Enterprises are expanding their searches from “passwordless” to “passwordless and touchless,” looking to replace physical authenticators. In the quest to go touchless these are items that can be easily eliminated. The future of passwordless authentication Using fingerprint or facial recognition often only provides a new front-end way to activate passwords Common alternatives to passwords are biometrics. But, using fingerprint or facial recognition often only provides a new front-end way to activate passwords. Passwords are still required for authentication after the biometric scan and these live in a central repository vulnerable to hackers. With one successful hack of the central repository, cyber-criminals can swipe thousands of details. In other words, biometrics on their own are not an improvement in security, only a better user experience. They need to be combined with a different approach that adds another layer of security. A more secure option is to move away from the centralised credential repository to a decentralised model. For example, one based on trusted digital identities. This is where digital certificates are stored on users’ phones. Think of encrypted digital certificates as virtual passports or ID cards that live on a worker’s device. Because they are stored on many separate phones, you are able to build a highly secure decentralised credential infrastructure. A solution that uses people’s phones is also compatible with touchless authentication systems. You can replace smart cards and key fobs with a phone-based security model and reduce the number of surfaces and items that people touch. This is especially beneficial for workplaces where people have to visit different sites, or for example in healthcare facilities. Replacing smartcards with a phone in a pocket reduces the number of items that clinicians need to take out and use a smartcard between and in different areas, which may have different contamination levels or disease control procedures. How do trusted digital identities work? Workers unlock their mobile devices and access their trusted identity using fingerprint or facial recognition Here’s an example installation. You install a unique digital certificate on each user’s mobile device — this is their personal virtual ID card. Authorised users register themselves on their phones using automated onboarding tools. Workers unlock their mobile devices and access their trusted identity using fingerprint or facial recognition. Once they are authenticated, their device connects to their work computer via Bluetooth and automatically gives them access to the network and their applications with single sign on (SSO). This continues while their phone is in Bluetooth range of their workstation, a distance set by IT. When they leave their desk with their phone, they go out of range and they are automatically logged out of everything. Five tips on choosing a passwordless solution More automation means less disruption Consider how you can predict and eliminate unnecessary changeover disruptions. The task of onboarding large or widely dispersed employee populations can be a serious roadblock for many enterprises. Look for a solution that automates this process as much as possible. Scalability and your digital roadmap Will you maintain remote working? Having a high proportion of your team working remotely means that passwordless solutions will become more of a necessity. Are you expecting to grow or to add new cloud apps and broader connectivity with outside ecosystems? If so, you need password authentication that will scale easily. Encryption needs and regulatory requirements If your workers are accessing or sharing highly sensitive information or conducting high-value transactions, check that a solution meets all necessary regulatory requirements. The most secure passwordless platforms are from vendors whose solutions are approved for use by government authorities and are FIDO2-compliant. Prioritise decentralization Common hacker strategies like credential stuffing and exploitation of re-used credentials rely on stealing centralised repositories of password and log-in data. If you decentralise your credentials, then these strategies aren’t viable. Make sure that your passwordless solution goes beyond the front-end, or the initial user log-in and gets rid of your central password repository entirely. Make it about productivity too Look for a solution that offers single sign on to streamline login processes and simplify omnichannel workflows. For workers, this means less friction, for the enterprise, it means optimal productivity. Security improvements, productivity gains and user goodwill all combine to form a compelling case for going passwordless. The additional consideration of mitigating disease transmission and bringing peace of mind to employees only strengthens the passwordless argument. The new end goal is to do more than simply replace the passwords with another authenticator. Ideally, enterprises should aspire to touchless workplace experiences that create a safer, more secure and productive workforce.
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com has adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts. Helping customers remain connected Adapting to challenges of the coronavirus pandemic, Alarm.com is further investing in solutions that help customers remain connected and engaged. The company has created a resource hub called “Succeeding Remotely” that provides tools, tips and news links that partners can use to adapt their business operations. From adjusting sales and installation techniques to maintaining cellular upgrades, Alarm.com is helping partners stay connected to customers remotely, keep their teams trained, and address rapidly evolving customer concerns without rolling trucks.The company has created a resource hub called “Succeeding Remotely “Additionally, after seeing all that our partners are doing to support their local communities in need, we were compelled to highlight those efforts with ongoing videos called Good Connections, which we’re sharing with our partner community to spark more ideas and ways to help,” says Ferguson. “Though our partners have experienced varying degrees of disruption to their business, we’re inspired by their adaptability, ingenuity and resilience,” says Ferguson. “Along with establishing proper safeguards for operating in homes and businesses, our partners are leveraging our support resources more heavily, while our entire staff has worked tirelessly to deliver new, timely resources.” Do-It-Together solutions Alarm.com partners are successfully employing Do-It-Together (DIT) solutions, focusing on 3G-to-LTE upgrades, and pivoting to new verticals like commercial and wellness. Many are also streamlining their business operations and taking advantage of virtual training opportunities to enhance their technicians’ skills and knowledge, says Ferguson. Do-It-Together installs involve depending on customers to perform part or all of the installation process. Partners can send customers fully configured kits with mounting instructions, or technicians may guide customers on a remote video call. Alarm.com’s tools, training and products help partners modify remote installation options depending on each customer’s needs. End users can validate the Alarm.com Smart Gateway with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app Alarm.com Smart Gateway For example, the Alarm.com Smart Gateway can be pre-configured with indoor and outdoor cameras for easy customer installation and to reduce the likelihood of future service calls. Also, end users can validate with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app. “DIT is helping our partners continue onboarding customers and avoid backlogs,” says Ferguson. “We’ve been pleasantly surprised by the resiliency and level of future investment that our residential and commercial partners have shown in the face of adversity,” adds Ferguson. For example, a significant number of business customers have used the slow period to install systems that are typically too disruptive to put in during normal business hours. Similarly, service providers are adopting new technologies or business models, such as cloud-based access control. “They’re often saying to us, ‘I’m going to take this opportunity to make changes to improve our business,’ and have been working closely with us on training and business consulting to support their efforts,“ she says. Shift to the cloud Ferguson sees a growing preference for cloud-managed surveillance and access systems over ones that have historically been run on-premise. The technology itself is attractive, but especially driving change is the enhancement to the daily lives of service providers and customers, which have been strained during this time. “The foundational benefit of our cloud-based solution is the hassle-free, seamless customer experience it delivers,” says Ferguson. “We make this possible by taking ownership of the servers, software maintenance, firmware updates, health monitoring, and more. With cloud technology, these aspects become invisible to the customer and take a lot off their plate, which is more important than ever.” End users can take advantage of Smart Tip video tutorials to help with DIT installations, or they can use the Alarm.com Wellcam to connect with loved ones anywhere.End users can take advantage of Smart Tip video tutorials to help with DIT installations Partners can attend training workshops focused on remote installation tactics, while driving consumer interest in new offerings through Alarm.com’s Customer Connections platform. The goal is to make it simple for partners to stay connected to their customers to maximize lifetime account value. “We are well-positioned to endure the pandemic because of the strength of our partners in their markets along with our investments in technology, hardware and our team,” says Ferguson. “As restrictions slowly lift, there is cautious optimism that the residential, commercial, property management, plumbing/HVAC, builder and other verticals will recover quickly. We believe that as more partners adopt the DIT model and add commercial and wellness RMR, they will find increasing opportunities to deploy security, automation, video, video analytics, access and more throughout their customer base.”
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
Allot Communications Ltd., a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has announced that a Tier-1 telecom operator in APAC has selected Allot HomeSecure to provide consumers with zero touch clientless cyber security and parental control services, to protect the CPEs/routers and devices in their homes. HomeSecure solution The HomeSecure solution will be deployed in CPEs provided to consumers by the operator, and in the operator’s cloud-native environment. The services are expected to be made available to millions of the operator’s fixed broadband customers. The operator has ordered an enterprise-wide perpetual license from Allot. According to the Microsoft Security endpoint threat report 2019, the malware encounter rate in APAC was 1.6 times higher than the global average. In light of these conditions, Allot HomeSecure gives telecom providers in APAC a unique opportunity to deliver zero-touch, fully automated services that protect their customers while generating supplemental revenues. Security for home IoT and smart home devices Allot HomeSecure provides security for home IoT devices and smart appliances Allot HomeSecure provides security for home IoT, smart appliances, and the devices connected to the home network. It integrates into the existing home router with the addition of a thin software client that provides home network visibility, cyber security and parental controls without the need for any configuration by the consumer. Allot HomeSecure uses AI to identify and profile connected home devices and to detect and act upon anomalous device behavior. HomeSecure has the option to be managed from an easy-to-use app for every household that gives consumers control over their network security and parental controls. “Our customer in APAC sees anti-malware protection for all home-connected devices and parental controls as basic requirements for any offering they provide to their millions of fixed broadband customers. HomeSecure gives them a single zero-touch clientless solution that satisfies both of these demands,” said Ran Fridman, EVP Global Sales at Allot.
Axis Communications, the provider in network video, has helped develop an innovative and clean energy solution which illustrates the potential of sustainable surveillance technologies in remote locations. In response to a request to produce a system to document part of a major program of improvements to Scotland’s A9 carriageway, Axis and its partner Camera Control UK, developed a solution which is capable of capturing high-quality 4K time-lapse imagery using entirely renewable sources. One of the main challenges was that the solution needed to be able to capture high-quality surveillance video in an area with no communication networks or local power, while coping with weather extremes and construction logistics. With diesel generators disregarded due to the pollutants they would produce, and the challenges associated with trying to lay power cables over a considerable distance along a route that twists and turns, a clean and sustainable solution was required. Video surveillance helps in better traffic flow The highways project will see a 10-mile stretch of the A9 from Perth to Inverness widened to increase the efficiency of the route and allow for smoother traffic flow. After winning a tender to document the project, local company, MB Productions Ltd, commissioned Camera Control UK to produce a solution. Camera Control UK in turn contacted Axis Communications, the provider in network video technology, to work in collaboration. The resulting video would be used for audit purposes, to provide evidence of best practice, and to serve as example material for future projects. All captured video is relayed back to a central control location using a dedicated wireless network Martin Naylor, Director of Camera Control UK, elaborates: “We realized it had to be an off-grid solution to avoid using local power; a solution that could incorporate wireless communications and utilize renewable energy sources to be environmentally friendly and sustainable over the longer term.” Bullet cameras To bring the solution to life, AXIS P1448-LE 4K short bullet cameras were chosen for their robustness and durability. The final system uses eight solar power packs, charged by a mixture of wind turbine and solar PV panels. Eight towers with mounted cameras are employed at various key touchpoints along the A9. Communications masts, installed to enable cloud connectivity, ensured that the Axis cameras, connected via the IoT, were able to deliver imagery of incredible quality. The whole solution illustrates the possibilities for innovation when utilizing the natural elements, having a virtually zero carbon footprint. All captured video is relayed back to a central control location using a dedicated wireless network. The whole system can be remotely monitored to continually check its status of operation. Remote management also enables the cameras to be fine-tuned for precision imagery of the work in progress, without the need to manually touch the cameras, or even to be on-site in person. 4K Imagery Martin Naylor commented on the relationship with Axis that has made this solution possible: “Axis really values innovation and is therefore an ideal partner, not only because the team takes the time to understand the challenges when trying to push the boundaries of what’s possible in surveillance, but also because their drive towards sustainable and ethical practices is an inspiration to other technology companies.” Matt Brown, Director, MBP, said of the solution: “We are now able to capture fantastic 4K imagery of the ongoing work on the A9. Camera Control UK has produced an entirely green solution, an incredible feat of engineering. The Axis cameras are in a completely different league, in terms of quality, to others we’ve seen. This project has been a great success.”
BBVA Compass Stadium is a soccer-specific stadium located in Houston, Texas, USA and home to the Houston Dynamo, Major League Soccer club (part of MLS in USA). It also is home to the Houston Dash of the National Women’s Soccer League and to Texas Southern University Tiger football. It is also going through a major retrofit with its security systems to include a best of breed, open architecture solution. The stadium first opened in 2012, but six years later, Cultris Security Systems of Houston is back upgrading and expanding the current security installation. After spending five years with another security provider, the Dynamo and Dash, who maintains the facility, opted for a completely new solution. Axis cameras integrated with Salient Systems VMS Along with their current Panasonic cameras, stadium officials opted for Axis Communications cameras Along with their current Panasonic cameras, stadium officials opted for Axis Communications cameras. Both camera manufacturers play well with Salient Systems VMS. The result was an image resolution much more enhanced than they had been experiencing. “With all of this equipment brought together, we found it to be easy to use, user-friendly, and supported a very complimentary search function,” said Paul Fisher, Director of Key Accounts at Salient Systems, adding “For those people hired as facility guards, and with a sometime frequent turnover in staff, new people were able to use the Salient software right away and were able to do their job guarding the facility more quickly.” Paul further stated, “An installation like this is a great reference for us, and it is a very exciting security installation. Although there are fewer than 100 cameras, the placement and location of the cameras will allow security to monitor the sometimes over-zealous fans, and with BBVA Compass Stadium officials installing our synopsis video tool, stadium officials will be able to key-map the entire facility, gain analytical data and improve the customer experience.” CompleteView VMS platform Salient also partners with Dell, taking its CompleteView VMS platform into the booming Internet of Things market. The CompleteView VMS’ ability to quickly render and manage video surveillance over a WAN or LAN makes it a compelling offering for solution providers looking to gain a foothold in IoT. The manner through which the video is processed is very efficient, and can render the video and perform forensics on the video rapidly. As more businesses look to video surveillance as an IoT application, the CompleteView VMS platform can be integrated with other software packages will enable partners to work with customers to solve specific problems through big data and analytics capabilities. DSX software installed for secure access control BBVA Compass Stadium officials also switched out the outdated access control software and installed DSX software to complete the upgrade. “We have long known that DSX is a workhorse software solution,” said Jason Smith, President of Cultris Security Systems Inc., adding “It is easy to use and a lower cost to use. These upgrades are exciting for us to be part of because the installation will come in several phases, with the integration supported for years to come.” Open architecture security solutions Cultris technicians almost had a blank canvas to begin their security installation Jason adds, “We also found working with BBVA Compass Stadium staff very easy because they were receptive to open architecture security solutions. Phase Two will begin in 2019, and we’re excited to design the next layer of security at the stadium.” Cultris technicians almost had a blank canvas to begin their security installation. The facility itself is an open architecture facility, so facility managers were very receptive when plans were drawn up for security equipment. Much of the focus was on the stadium concourses, where the bulk of the soccer fans’ traffic is found during a match. 360-degree cameras installed The new master plan now included 360-degree cameras along the concourse, which offered coverage in every direction. The same 360-degree cameras were also placed near the locker rooms, loading docks and service areas. PTZ and fixed lens cameras were upgraded and placed in each corner of the facility where there is a gate for entrance and exit. As imagined, soccer fans are very passionate about their sport and teams, so cameras on the concourse were placed in a planned manner for the guarding staff to be able to know and react quickly if or when a fight broke out among spectators. The 360-degree cameras also enable the security staff to mobilize and reach the incident spot, where they would be required, as quickly as possible. 4K PTZ cameras Stadium security staff is able to view cameras placed in an adjacent parking area Houston’s BBVA Compass Stadium has a capacity of 22,039 seats, including 34 private suites, 1,100 club seats, an indoor premium club area, a dedicated supporters/fans stand and a food court. The stadium is designed to accommodate Major League Soccer (MLS) and FIFA standard international soccer, as well as other sports including football, lacrosse, and rugby and live concerts. Stadium security staff is able to view cameras placed in an adjacent parking area, as well as city security cameras (live view only) in order to ensure the safety and security of people coming to the venue and leaving after the match. These cameras have a 4K PTZ quick drive function, which helps establish a clear view of events, if additional security help is needed. As an integrator, Cultris Security has clearly installed a solution that will work properly for BBVA Compass Stadium, and their tenants, who are always looking to strike a goal.
The year 2020 is bound to be a special year with the outbreak of coronavirus disease 2019 (COVID-19) globally. The highly contagious disease has taken away many lives and counting, especially in China, South Korea, Japan, and some countries in Europe and Middle East. Dahua Technology, globally renowned video-centric smart IoT solutions and services provider, has been an early participant in the epidemic prevention and control in Asia, joining the global efforts in combating the virus to minimize the impact on mankind. Dahua Thermal Solution Since sending its first batch of thermal cameras to the hardest-hit area Wuhan on January 24th, 2020 Dahua Thermal Solution has been deployed in thousands of sites in China, including transportation hubs, commercial complexes, banks, and other places, and some are on the way to multiple countries in Asia. Hong Kong, a financial capital in Asia, also suffers from the COVID-19 epidemic situation. Dahua Thermal Solution has been applied in some local business complexes, banks, company parks, and other places. To enable safe and smooth work resumption recently, quite a few major corporations have been using Dahua Thermal Solution in their headquarters and subsidiaries to improve their workplace safety. Dahua Thermal Solution measures the body temperature of their employees, handling thousands of staff flow every day. Thermal cameras deployed at virus-hit zones Using Dahua Thermal Solution will significantly improve speed and accuracy in body temperature measurement Compare to the traditional way of body temperature measurement – a forehead thermometer, using Dahua Thermal Solution will significantly improve speed and accuracy, and at the same time, help reduce cross-infection via non-contact measurement. To measure the temperature of 5,000 people, it will take about 4.2 hours using a forehead thermometer, as it takes at least 3 seconds to measure a person. However, it takes only 30 minutes if using the Dahua Thermal Solution, which measures 3 person per second. It also features a high accuracy of ±0.3℃ . Epidemic prevention and control “Dahua Thermal Solution helped us detect a couple of suspected cases in just a few hours of operation, which we greatly appreciate,” a Hong Kong user commented. Dahua Thermal Solution has been on the front line since the very beginning, helping with the epidemic prevention and control in airports, railway stations, hospitals, schools, and other sites all over Asia. Featuring high accuracy, high efficiency, strong adaptability and easy deployment, Dahua Thermal Solution can also be applied to all kinds of entrances and exits, kitchens and kindergartens.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
Round table discussion
Artificial intelligence (AI) and machine learning have made a big splash in the physical security market, transforming video analytics to a new level of accuracy. In fact, the terms have become common buzzwords throughout the industry. However, the potential for AI and machine learning to impact the physical security industry goes far beyond their ability to improve video analytics. We asked this week’s Expert Panel Roundtable: Beyond better video analytics, how can artificial intelligence (AI) and/or machine learning benefit the physical security market?
The emergence of smart cities provides real-world evidence of the vast capabilities of the Internet of Things (IoT). Urban areas today can deploy a variety of IoT sensors to collect data that is then analyzed to provide insights to drive better decision-making and ultimately to make modern cities more livable. Safety and security are an important aspect of smart cities, and the capabilities that drive smarter cities also enable technologies that make them safer. We asked this week’s Expert Panel Roundtable: What are the physical security challenges of smart cities?
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
Software Libraries, Security Applications and Open Platforms: '5 Minutes With' Video Interview with Fabio Marti from Security and Safety Things
Security And Safety Things On Integrating Applications For Security Cameras To Unlock The Future Of IoT