IP security solutions
Tamworth-based trade association, DHF (Door & Hardware Federation), has, this week, launched its CSCS-approved card partner scheme in collaboration with the Automatic Door Suppliers Association (ADSA). The DHF CSCS card provision is for those who work with industrial doors, domestic garage doors, automated gates & traffic barriers and metal or timber doors. CSCS cards for construction workers “While not a legislative requirement, CSCS cards are supported by the government and pro...
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is cha...
Sandra Jones, founder of Sandra Jones and Company (“SJ&Co”), announced her retirement after 45 years in the security industry, including serving on the Board of Directors of the Security Industry Association (SIA) for 39 years. Sandy co-founded and produced the Securing New Ground Executive Conference and created The International Security Conference’s (ISC) New Product Showcase. Sandy has been honored with many industry accolades including PSA’s Marcus Award, SIA's...
Matrix, a manufacturer and provider of Telecom and Security solutions, is participating in the SICUREZZA 2019 to be held in Fiera Milano, Rho, Italy from 13th - 15th November 2019. Matrix will be showcasing its Telecom and IP Video Surveillance solutions at the event. Matrix is known for offering value driven solutions catering to diverse, complex applications especially for the enterprise sector. In the event Matrix will showcase futuristic technologies from the Telecom and security domain. At...
Scheduled to be held from 19 - 21 January, 2020, INTERSEC 2020 in Dubai will showcase the latest products in security, safety and fire protection. Bosch Building Technologies will display its innovative security, safety and communications products on booth SA-C26 in Saeed Arena. IP 3000i cameras with smart video Bosch introduces another industry first with the all-new range of IP 3000i cameras. The latest portfolio includes a range of four form factors that offer high quality...
Today’s market wants access management systems that are easy to set up and use. They must be easily scalable and able to integrate with other security solutions like video and intrusion systems. And access management systems need to be highly resilient and always available. With the introduction of the Access Management System 2.0, Bosch has addressed all these needs. Access Management System 2.0 The entire customer journey is designed to be as effortless and as simple as possible. Speci...
Johnson Controls has announced the release of the advanced CEM Systems S3050 Portable Reader is a lightweight hand-held card reading device for use with the AC2000 access control and security management system. It is designed to be used for ID card validation at temporary entrances or remote sites which have no power and as a mobile device for random checks within pre-defined zones. Portable ID card reader A large full color touch screen provides quick and easy navigation and also provides information about card validity A large full color touch screen provides quick and easy navigation and also provides information about card validity, including cardholder details such as name, date of birth and an image of the cardholder. The cardholder image display on the S3050 reader provides visual verification which is ideal for when mustering is required and for minimizing the threat of card sharing. Up to 250,000 cards ID’s can be held in the S3050 portable reader’s database for differentiation between authorized and unauthorized personnel. Up to 16,000 offline card swipe transactions can also be stored for on-line transmission to the AC2000 system. Card technologies supported include 125 kHz HID Proximity, DESFire CSN, HID iClass/iClass SEOS, PicoPass Sector and CEM DESFire. CEM Systems S3050 Portable Reader When defined as a muster reader, the S3050 portable reader is loaded with the current system muster state, and the total number of recorded cardholders is displayed. When cardholders swipe their card, the displayed muster count is decremented. Any remaining cardholders can then be listed in a mini report on the portable screen. An occupancy feature allows a cardholder head count to be performed within a defined area to prevent card sharing. Spot checks can therefore be carried out on the number of people on, for example a bus or plane.
NEC Corporation and NEC Asia Pacific have announced their participation at the inaugural SFF x Switch event at the Singapore EXPO Convention & Exhibition Center from 11th to 15th November 2019. SFF x Switch During the three-day exhibition and conference of SFF x Switch (11-13 November), NEC will exhibit a suite of digital solutions aimed at empowering financial service providers with the technology to create innovative digital services for their customers. Key solutions to be exhibited at NEC's booth (#2R17) include: NEC will showcase a cloud-based facial authentication solution with liveness detection Banking as a Service: This vendor-agnostic end-to-end solution provides financial service providers with a suite of innovative functions systems, such as deposits, loans, and asset financing as a subscription-based service. This service is provided by Banqsoft A/S, a fully owned subsidiary of KMD A/S, a NEC company. Digital ID: NEC will showcase a cloud-based facial authentication solution with liveness detection which forms part of its Biometric Digital Identity Service (BDIS); a federated ATM which allows users to withdraw money from different banks with only their face; blockchain technology to secure shared ATM-based bank transactions; and Denso Wave's SQRC (Secured QR Code) solution that combines facial recognition to facilitate POS transactions for offline authentication requirements. End-to-end digital solutions "With the rise in security risks and the need to develop new, unique products for customers, banks and service providers worldwide have to be agile to succeed in this digital age," said Daichi Iwata, Director, Digital Integration Division, NEC Corporation. "NEC's comprehensive, end-to-end digital solutions are well-placed to address the emerging challenges to create banks of the future." A combination of the Singapore FinTech Festival (SFF) and the Singapore Week of Innovation and Technology (SWITCH), this week-long event features various activities, conferences and exhibitions centered on innovations across the themes of FinTech and Deep Tech.
The new H.265 Wisenet XNB-H6461H Pinhole Height Strip camera from Hanwha Techwin offers users the opportunity to covertly capture an image of a person’s face, and when used in conjunction with another camera, establish the approximate height of the person. Ideal for banks, petrol stations, convenience stores and other retail type applications, the Wisenet IP network Pinhole Height Strip camera is able to support face recognition analytics and designed to be installed at an exit door. Positioned at eye level and looking in, it is able to capture clear frontal images of faces which can be recorded and used as evidence to prosecute anyone arrested for theft or fraudulent activity. IP network cameras The Pinhole Height Strip camera enables covert capturing of image of the culprit on their first visit to the store" “Loss prevention managers have told us that it is not unusual for a thief to ‘case out’ a store before attempting to steal anything,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. He adds, “Having taken a close look at where the store’s video surveillance cameras are positioned, as well as the level of staffing, the thief then leaves the store only to return shortly afterwards with a cap or hat covering their face from the view of cameras which are normally installed on a ceiling looking down. The Pinhole Height Strip camera provides the opportunity to covertly capture a clear image of the culprit on their first visit to the store.” Wisenet XNB-H6461H Pinhole Height Strip camera The 2 MP Wisenet XNB-H6461H pinhole camera comes equipped with a 4.6mm fixed lens that provides a 73° field of view. It also benefits from enhanced Wide Dynamic Range (WDR), which performs at up to 120dB, to produce clear images from scenes containing a challenging mix of bright and dark areas. This is quite often the case at entry/exits points of a building and normally results in overexposed or underexposed images. In addition, built-in Highlight Compensation (HLC) technology solves the problem of overexposure created by the presence of strong light sources, such as from store spotlights. The camera’s Hallway View provides a highly effective way to monitor narrow vertical areas such as shopping aisles and corridors. This enables the Wisenet XNB-H6461H, which can generate images in the 9:16 and 3:4 aspect ratios, to work effectively in tall and narrow spaces, with the added bonus of minimizing bandwidth and video storage requirements. Other features of Wisenet XNB-H6461H include: Audio analysis which recognizes critical sounds such as raised voices, screams, broken glass, gunshots and explosions, and generates an alert to enable security personnel to quickly react to any incidents. A Dual MicroSD/SDHC/SDXC memory slot which allows video or data to be stored at the edge. Support for H.265, H.264 and MJPEG compression formats. WiseStream II, a complementary compression technology which improves bandwidth, efficiency by up to 99%, compared to current H.264 technology when combined with H.265 compression. Power over Ethernet (PoE) which negates the need to install a power supply and separate cabling for the camera. A USB port which helps reduce the time installers have to spend on site by enabling them to remotely check via Wi-Fi the Wisenet XNB-H6461H’s field of view and focus, from the convenience of a mobile device.
Vaion is proud to announce the general availability of its innovative Vaion vcore video management system at the upcoming ISC East 2019 event in New York. Designed with scalability in mind, Vaion vcore is a proactive solution that allows threats to be detected and addressed as incidents unfold. This is made possible through the use of a new neural network that mimics the human brain’s ability to recognize patterns and categorize images. Vaion vcore is equipped with integrated machine learning capabilities that analyze all video feed from all standards-based cameras in real-time. The system monitors and understands behaviors; identifies, classifies, and tracks people, vehicles, and other objects of interest; and sends alerts before threats escalate. Vaion vcore video management system Vaion vcore is enhanced with a range of advanced features that make the system scalable, secure, and easy to useVaion vcore is enhanced with a range of advanced features that make the system scalable, secure, and easy to use, covering a wide range of enterprise security needs. The system can work with third-party cameras or be further optimized with the suite of specialized Vaion cameras, available in January 2020. Vaion’s complete enterprise security solution will allow organizations to leverage additional features, including directional audio analytics and advanced cybersecurity features. Vaion vcore enables a proactive approach with the Spotlight capability that changes video feeds dynamically and sends real-time alerts and notifications based on predefined rules and detection of unusual activity. Instead of merely investigating incidents, organizations can take the necessary steps to prevent them. Vaion Smart Search As events occur, Vaion’s Smart Search allows operators to conduct forensic analysis and build case files in minutes versus the hours, days, weeks of traditional VMS platforms. Also, Vaion vcore’s unique Map view with Smart Presence provides people and vehicle tracking and counting, as well as camera and alarm views, giving operators detailed situational awareness and advanced operational benefits. “Vaion’s impressive vcore software includes all the features you would expect in a legacy VMS platform. However, the embedded artificial intelligence provides immense insight with people/object/vehicle detection, anomalies, presence-based maps, and fast/scalable similarity searches. End-users will realize operational benefits of the Vaion platform beyond the improvements to security operations and focused situational awareness.” — Michael Miller, President and CTO, TWG Security Physical security In addition to Vaion vcore’s physical security features, the system is secure from the ground up to protect data and minimize the risk of breaches. This is achieved by end-to-end encryption and digitally-signed files for secure export. Vaion vcloud allows operators to access the system remotely, manage complex deployments in a single platform Ease of use, simple deployment, remote access, link sharing, and license pooling is made possible with the Vaion vcloud connection. Vaion vcloud allows operators to access the system remotely, manage complex deployments in a single platform, and stay up to date with Vaion vcore upgrades and features. Cutting-edge video analytics and surveillance “Vaion harnesses the most advanced technologies out there to solve real problems security personnel really care about. We don’t just deliver an affordable state-of-the-art VMS based on decades of experience in the industry; we apply cutting-edge analytics on every video stream all the time to provide insightful and actionable information in real-time!” — Ran Pugach, Chief Product and Development Officer, Vaion. Come see Vaion demonstrate vcore in action with solutions to real-life scenarios at ISC East 2019, Booth #351. As a global company with offices in New York, London, and Oslo, Vaion is changing the traditional video security landscape with AI capabilities that make it easier for businesses and organizations to monitor their assets proactively. With embedded video and audio analytics powered by machine learning algorithms, intuitive installation processes, and a range of smart cameras, Vaion offers an end-to-end surveillance solution that helps companies detect threats in their earliest stages and perform fast, effective investigations with fewer resources.
Fugue, the company delivering autonomous cloud infrastructure security and compliance, has announced the release of the Fugue Best Practices Framework to help cloud engineering and security teams identify and remediate dangerous cloud resource misconfigurations that aren’t addressed by common compliance frameworks. Users can deploy the Fugue Best Practices Framework within minutes to improve the security posture of their Amazon Web Service (AWS) cloud environments. Cloud misconfiguration, primary cause of data breaches Cloud misconfiguration is the number one cause of data breaches involving public cloud services Cloud misconfiguration is the number one cause of data breaches involving public cloud services such as those offered by AWS. The scale, complexity, and dynamic nature of cloud infrastructure environments often leads to significant misconfiguration events that traditional security analysis tools fail to prevent or detect. According to Neil MacDonald at Gartner, “Nearly all successful attacks on cloud services are the result of customer misconfiguration, mismanagement and mistakes.” While compliance frameworks such as the CIS Foundations Benchmarks address a number of cloud misconfiguration risks, recent major cloud-based data breaches were possible due to misconfigurations not necessarily covered by these standards. The Fugue Best Practices Framework is designed to complement standards such as the CIS Foundations Benchmark to provide additional protection against today’s advanced misconfiguration attacks. Fugue Best Practices Framework “Enterprise cloud and security teams are recognizing that their current cloud security posture leaves them vulnerable to newer and more sophisticated misconfiguration attacks,” said Phillip Merrick, CEO of Fugue. “The Fugue Best Practices Framework gives cloud teams a simple tool to quickly identify these misconfigurations in their cloud environment and the most comprehensive security against cloud misconfiguration risk when used in combination with a framework like the CIS Foundations Benchmark.” The Fugue Best Practices Framework includes rules covering the following cloud vulnerabilities: Identity and Access Management (IAM) misconfigurations that can provide bad actors, including malicious insiders, with the ability to move laterally and discover resources to exploit S3 bucket policy misconfigurations that can be exploited in order to take data exfiltration actions VPC Security Group rule misconfigurations that can enable malicious access via Elasticsearch, etcd, and MongoDB services Enhancing cloud infrastructure security Fugue will continue to add new rules to the Fugue Best Practices FrameworkFugue will continue to add new rules to the Fugue Best Practices Framework as new misconfiguration attack vectors are identified. The Fugue Best Practices Framework joins a growing number of out-of-the-box cloud compliance frameworks Fugue provides, including CIS Foundations Benchmarks, GDPR, HIPAA, ISO 27001, NIST 800-53, PCI, and SOC2. Fugue also supports custom rules using Open Policy Agent, an open source policy as code engine, making it easy for enterprise cloud teams to create cloud infrastructure policies tailored to meet their specific use cases and security requirements. The Fugue Best Practices Framework is available now for all Fugue customers and can be used with a 30-day free trial.
Vanderbilt, globally renowned provider of state-of-the-art security systems, has announced the addition of three ZKTeco biometric readers into its access control portfolio. ZKTeco biometric readers The latest addition to the ever-growing access control portfolio comes off the back of the launch of the company’s Bluetooth Low Energy (BLE) readers, plus the inclusion of Akuvox’s IP Door Entry Phones into their collection of products. As with the BLE readers, the biometric readers integrate with Vanderbilt’s access control ACT Enterprise software, version 2.10 or later. The ZKTeco biometric readers that now integrate with Vanderbilt’s ACT Enterprise are the MA300, the SF420, and theSLK20R. These readers are renowned for their fast and accurate fingerprint algorithm, easy installation and connectivity, and smooth operation and management. Advanced ZK fingerprint algorithm The MA300 offers unparalleled performances by adopting an advanced ZK fingerprint algorithm" Speaking on the MA300 fingerprint reader, Paul McCarthy, Product Manager at Vanderbilt, explains, “The MA300 offers unparalleled performances by adopting an advanced ZK fingerprint algorithm for reliability, precision, and excellent matching speed. It comes in a metallic casing and is IP65 rated. This means it is resistant to water, dust, and other outside damages. As such, this makes the MA300 ideal for both internal and external mounting scenarios.” Turning to the SF420, McCarthy states that “the SF420 brings the flexibility to be installed as a standalone or with any third-party panels that support 26-bit Wiegand.” SF420 and MA300 user recognition readers He adds, “Both the SF420 and MA300,” McCarthy continues, “Possess one-touch-a-second user recognition and can store 1,500 templates. But while the SF420 can host 5,000 cards and 80,000 transactions, the MA300 can take on an additional 5,000 cards more, and 20,000 additional transactions.” Adding further weight to the advantages of the MA300, it also contains full access control features with anti-passback, an access control interface for third-party electric locks, a door sensor, an exit button, an alarm, and a doorbell. Moreover, it works with ACT Mifare Classic cards. The SF420 also works with ACT Mifare Classic cards, but only UID versions. ACT Enterprise software The final addition to the portfolio is the SLK20R. For the MA300 and the SF420 to work with ACT Enterprise software, one enrollment reader, the SLK20R, is required. The SLK20R primarily operates by capturing the fingerprint template into the ACT Enterprise software, and then the template is distributed to the readers on a network via IP. These new biometric readers can be enrolled by an administrator card when the device works in standalone mode. TCP/IP and RS485 are available so that the devices can be connected quickly and conveniently. A license is also required to work with ACT Enterprise. ACTE-Bio licenses are sold as a per door license.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT Increases Threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organization recognize and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organizations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organizations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognizing and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favorites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-Store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behavior is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail Banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimize, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalized enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cybersecurity, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analog cameras. A higher percentage of commercial customers use cellphone applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
STANLEY Security, one of the UK’s renowned security providers, has completed a major CCTV installation for Bridgnorth Aluminum Limited, the UK's only manufacturer of aluminum flat rolled products. At 27 hectares, Bridgnorth Aluminum’s site in Bridgnorth, Shropshire is extensive. It is home to a casthouse, rolling mill, two litho centers, a multi-slitting line and finishing lines. IP CCTV system The IP CCTV system is critical to our business in terms of health and safety of our employees and site security" The company had previously been using three separate CCTV systems, each covering different parts of this large site, one of which was over 15 years old, had very poor image quality and was starting to show signs of failure. Furthermore, none of the CCTV systems had any level of redundancy, so if one failed access to those particular cameras were lost, along with any recorded footage. Steve Denton, IT Manager at Bridgnorth Aluminum, explains the decision to upgrade, stating “We needed to consolidate everything into one single CCTV system, including all of the cameras from the other three systems, and we needed to add a level of redundancy. The IP CCTV system is critical to our business in terms of health and safety of our employees and site security.” IP video surveillance Following detailed discussions with Bridgnorth Aluminum, STANLEY Security designed a new site wide IP based CCTV system, covering external areas and the perimeter of the site, along with internal areas including key indoor production spaces. The system takes advantage of Bridgnorth Aluminum’s existing IP network which is deployed in most areas of the site, negating the need to install COAX cable. Opting for an IP-based CCTV system has also enabled Bridgnorth Aluminum to make use of newer technology with better quality images, which was the key. STANLEY 2MP bullet cameras and dome cameras The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms The new IP CCTV system features STANLEY 2MP bullet cameras and dome cameras, including 360⁰ dome models. The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms; one of which is used in case of redundancy. Bridgnorth Aluminum is pleased with the new CCTV system as Steve Denton comments, “The image quality of the new system is streets ahead of the old system. The area of coverage is also far greater thanks to the addition of 180-degree wide angle and 360-degree cameras. The software is very easy to use and has some very useful features to aid with playback of recorded footage. The software has already helped us to retrieve footage that we would have had little chance of retrieving before.” Enhanced site security STANLEY Security has been working with Bridgnorth Aluminum since 2017 when it took over the support of the company’s existing CCTV systems. “The transition period had proved successful” states Steve, commenting on their decision to appoint STANLEY Security for this project. He adds, “The service from STANLEY has been excellent, our account manager Amber is one of a kind and always goes above and beyond for us to ensure that we receive the best service possible.”
Body Worn Cameras (BWCs) are transforming policing and security around the globe, helping to create new connected officers who can stream video, access information and collaborate in real-time enabling them to operate safely and more efficiently in the field. Richie McBride, Managing Director of BWC experts Edesix, says "BWCs are now built for a connected world and are being used by officers on the front line to help prevent both criminal and anti-social behavior when out on patrol.” Importance of body worn cameras in policing Innovative solutions driving creation of connected officers who can stream and access information in real-time He adds, "Technology has transformed policing and security in recent years. New innovative solutions have driven the creation of new connected officers who can stream, access information and collaborate in real-time. BWC captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas and saves officers valuable time as they often do not need to attend court”. Richie further said, "Police officers have always been connected, either to the public and communities they serve, or with their colleagues on the street and in the control room. They have shared information and generated insights to help address common problems and protect those with common vulnerabilities. However, digital technology has now enhanced these connections, enabling officers to feel more empowered, supported and secure." VideoBadges enhance police personnel VideoBadges have been utilized by police forces across the UK for some time now. Police forces, such as the Police Service of Northern Ireland (PSNI), have utilized our BWCs since 2016 to enhance the security of both officers and the general public, and to improve training and best practice. There are now 2,500 cameras being used by over 7,000 officers covering approximately 173,000 incidents each year in Northern Ireland. The BWCs are being utilized by Local Policing Teams, Neighborhood Policing Teams, Tactical Support Groups, Roads Policing Units, Dog Section, District Support Teams and Armed Response Units. Importance of good video evidence Body Worn Video has the potential to improve the quality of evidence provided by police officers" PSNI Superintendent David Moore adds, "Video evidence puts the victims of crime first. The pilot of this technology in Foyle district demonstrated how Body Worn Video has the potential to improve the quality of evidence provided by police officers and thereby increase the number of offenders brought to justice. Video evidence provides a compelling account of events and enables the raw emotion and action from a scene to be replayed in the courts in a manner that could never be captured in a witness statement.” He adds, "It also supports accountability and transparency, both of which are key elements in increasing public confidence in policing. The introduction of this new technology is the latest example of our commitment to these principles as we continue to work together with the community to keep people safe." Head-mounted cameras Armed response and firearms teams are also being equipped with head-mounted cameras due to the fact that chest-mounted cameras could potentially obstruct an officer's view during firearms use. The Metropolitan Police recently began rolling-out 1000 head-mounted cameras, with West Yorkshire Police and North Wales Police following suit.
APRR (Autoroutes Paris Rhin Rhône) Group has selected Teleste’s S-VMX Video Management System for upgrading its motorway safety and surveillance infrastructure. The system will be implemented by a consortium composed of Teleste and ENGIE Ineo, a part of worldwide renowned energy provider, The ENGIE group. Teleste S-VMX video security system APRR Group, a subsidiary of Eiffage, manages motorways and toll structures under concessions awarded by the French State. Under the terms of its concession agreements, the Group also invests heavily in its 2,323 km network in order to improve travel conditions and satisfy customers’ new mobility requirements. Teleste’s S-VMX system will be in charge of monitoring and securing the East & South of France Motorways network, including the motorway routes as well as car parks and rest areas. The project is expected to be delivered during 2019 and 2020, and the contract scope includes a 10-year maintenance agreement. Security and operations control systems Security and operations control systems are becoming increasingly complex as they are expected to process large amounts of information in real-time. Teleste’s S-VMX video surveillance and S-AWARE situational awareness platforms enable the building of security systems that will evolve alongside the changing needs of public authorities. In addition to the powerful video core, the systems can control large amounts of information from multiple sources within the operating environment to ensure that the right information is available to the right people, when and where needed, and that the correct action is taken promptly whenever unexpected situations occur.
A global UK department store, with a commitment to offering quality products and outstanding service, has ensured the protection of its customer service mobile equipment with Traka’s intelligent locker solutions. Traka’s specialist locker systems The high street favorite has integrated Traka’s specialist locker systems throughout its branch network and top ranking online operations, to store, charge and manage dedicated mobile devices, enabling instant availability for customer service teams across the UK. The high street favorite has integrated Traka’s specialist locker systems throughout its branch network The move was part of a key store investment strategy, which introduced the mobile devices to enable authorized users to take web orders and respond to customer enquiries and stock checks, instantly and efficiently. Digital key management Speaking about the use of digital key management and its impact on the department store processes, a representative for the store said, “We are devoted to working on every aspect of our operations, to continue our pledge of delivering quality products and outstanding service. We believe this, put together with our continued commitment to price matching is what is resonating with our customers.” “We want to streamline our stores and online services to be equally enjoyable places to shop. We are aware we need to respond to personalized customer queries quickly and efficiently, with the right information on any product or service. Intelligent tracking technology “To achieve this, we need our customer-facing teams to be equipped with fast working intelligent technology. Here, Traka excelled at providing a branch solution that allows us to not only store dedicated devices securely, but also integrates into our daily operational systems. We can track where each device is and provide staff with peace of mind that every device is fully charged and up to date with our latest exclusive offers.” Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software. This offered in-locker charging facilities, full audit control capability, dedicated fault reporting on any issues with a piece of equipment, and capability to exchange an item with minimal time or resource disruption. Intelligent locker systems Steve Bumphrey, Traka UK Sales Director added, “Any department store’s success is dependent on providing a high level of service, deep knowledge of what it is they’re selling, and a willingness to ensure customers receive the right item. Being able to do so quickly and efficiently, is where the introduction of mobile devices have proven invaluable.” Steve adds, “Traka’s involvement was to understand the unique requirements of the customer services teams and create and network our intelligent locker systems, to make a significant operational difference. Staff no longer need to hunt for working devices to respond to customer enquiries, safe in the knowledge they are ready to use with very latest cross brand and department product and service information and pricing.”
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorized employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
Central to the Italian motor racing scene, Gruppo Peroni Race organizes very high level car championships in the Imola, Vallelunga and Monza Italian racing circuits. For thirty years in the sector, the activity of the Peroni Race Group includes various championships and numerous special events such as endurance tests. When they wanted to open up the racing experience to more members of the public, they turned to a solution using Hikvision products. Partnership with Hikvision and Italec s.r.l The company decided to make its free events more accessible to the public The company decided to make its free events more accessible to the public and asked DirectE20, its historical partner in the audio-video industry, to come up with a solution to broadcast the live video-chronicle on YouTube, Facebook and other social events. They worked in close collaboration with Italtec, distributor of professional security solutions specialized in planning and technical assistance. In order for viewers to be able to experience the sheer thrill of the race, they needed cameras that could follow the high speed action. And due to the unpredictability of European weather, the solution needed to provide great images even in adverse weather conditions and other poor light situations. Speed Dome cameras and network video recorders Italtec chose to design the solution using Hikvision video solutions and products. In particular, they chose the company’s renowned 2MP and 4MP Speed Dome Camera solutions and the 96XX and 77XX series network video recorders (NVRs), together with monitor and keyboard to control the cameras. They chose Hikvision for the high performance of its PTZ products, able to obtain extremely interesting rapid-focus and self-tracking. Video management was entrusted to iVMS 4200, the free Hikvision software. All of these products were brought together in a mobile control room which could broadcast high quality images able to follow cars racing at high speed. The flexibility of the system and the adjustable nature of the cameras meant that they could respond immediately to the action, both automatically and on command from the control room. Camera installation and positioning In order to maximize the viewer experience, during the installation of the products installers needed to pay particular attention to camera positioning. It was essential to capture the images of the vehicles in the approach to curves with different viewing angles, both on arrival and departure of the circuit curve. Alessandro Rossi, Sales Manager of Italtec, has said, "We chose Hikvision for its leadership in the field of high-tech video surveillance. Analyzing the professional CCTV market, we received lots of positive feedback from those who have been using the brand for years: we therefore decided to carry out tests, following which we definitively decided to go with Hikvision.” Mobile technology solution Enthusiasts can follow live races and the material collected can be used later to make videos" Gruppo Peroni was also impressed. Sergio Peroni, the organization’s President, stated, "Thanks to the work carried out by DirectE20, that created the mobile technology solution, today we can collect high quality video material that perfectly meets the needs of our audience. He adds, “Enthusiasts can follow live racing competitions on the circuits and the material collected and filed can also be used later to make videos for advertising or repertoire purposes. We are very satisfied with the technical choices made and above all the results obtained.” Hikvision products delivered a result in the form of an innovative system for audio and video distribution of motor racing at its best, thanks to its simplicity and flexibility. This solution could be used to stream all kinds of sports events in the future.
Round table discussion
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasizing systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
IP security solutions: Manufacturers & Suppliers
- Dahua Technology IP security solutions
- Arecont Vision IP security solutions
- Hikvision IP security solutions
- Pelco IP security solutions
- LILIN IP security solutions
- IDIS IP security solutions
- VIVOTEK IP security solutions
- Vicon IP security solutions
- Avigilon IP security solutions
- Messoa IP security solutions
- Illustra IP security solutions
- MobileView IP security solutions
- Bosch IP security solutions
- MOBOTIX IP security solutions
- FLIR Systems IP security solutions
- Hanwha Techwin IP security solutions
- Teleste IP security solutions
- DRS IP security solutions
- BCDVideo IP security solutions
- Oncam IP security solutions