Check Point Software Technologies Ltd., a provider of cybersecurity solutions globally announced the launch of Check Point Cloud Academy in partnership with its Platinum Elite ATC Partners - Arrow Electronics, Red Education, and Westcon Security. Check Point Software is the first security solutions provider to address the knowledge gap in the industry by offering a dedicated certified education program specializing in cloud security globally. Opportunities for professionals Open to Check Poin...
Offering enhanced security and personalized access control, Nortek Control has launched its new Linear BT135-W Access Control Reader and Linear BT125-W Access Control Reader. The new readers integrate Bluetooth Low Energy (BLE) technologies, providing users intelligent, contactless and secure access control in a slim design, which fits seamlessly into any office or building environment. Furthermore, the new Linear readers provide dealers and end-users several options to customize access control...
In the AIoT era, the world is getting smarter. Everything is going to have an online “ID” and then connected into a vast net of IoT devices, like a laptop computer, a cellphone phone, a connected thermostat, or a network security camera. Cybersecurity in the AIoT era According to a Markets and Markets report, IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, currently, there are no unified global technical s...
Sepura launches SmartChat, a secure operational messaging solution that joins smartphone, tablet, and office-based staff with field officers equipped with TETRA terminals. SmartChat enables mission critical messages to be shared between users on a secure TETRA platform, enabling all members of the operational team to be kept informed and aware of developing intelligence. Crucially, SmartChat enables TETRA radio users to see and share text and image-based communications. It can be extended to mu...
Suprema, a pioneer in access control, biometrics and time & attendance solutions, announces that its compact outdoor RFID reader, XPass D2 has been verified by SIA as OSDP compliant. OSDP, or Open Supervised Device Protocol, is an open-source protocol devised to improve interoperability among access control products from different manufacturers. OSDP enables bi-directional communication between readers and controllers, an improvement from one-way data transmission of Wiegand interface. Inn...
On May 20 at 12:00 p.m. EEST, Ajax Systems will hold a big virtual presentation of new products. Partners and users will be able to see the new devices that the company has been working on lately and learn everything about them. Ajax Special Event 2021 This time, the show will be broadcasted in 13 languages, including English, Spanish, Italian, Turkish, French, German, Dutch, Arabic, Portuguese, Polish, Romanian, Ukrainian, and Russian. Attendees will also have the opportunity to choose their...
HID Global, a globally renowned company in trusted identity solutions, has announced the general availability of WorkforceID Authentication solution, the latest addition to its cloud platform for creating a seamless, effortless experience for issuing, managing and using identity credentials in physical and digital workplaces. Workforce ID Authentication Workforce ID Authentication builds upon HID’s proven and widely deployed multi-factor authentication platform for consumer applications, including online and mobile banking. It joins a growing suite of employee ID badging, visitor management and other trusted workforce identity solutions. “A person’s identity has become the new security perimeter in a hybrid workplace that now extends from home to the office and everywhere in between,” said Julian Lovelock, Vice President for Global Business Segment, IAM, with HID Global. Multi-factor authentication addition WorkforceID Authentication solution enables organizations to extend a simple and secure login for every user Julian adds, “The addition of multi-factor authentication to the HID WorkforceID platform advances our vision of a unified and flexible approach to identity and access management for an organization’s employees, partners and contractors. This is the next step in providing a suite of applications that manage digital and physical identity credentials through one convenient cloud platform.” Pivotal in HID’s overall multi-factor authentication portfolio, the HID WorkforceID Authentication solution enables organizations to extend a streamlined, simple and secure login experience to every user and application, throughout the diverse and dynamic enterprise environment. Integration with Active Directory and cloud-based Azure AD It easily integrates with Microsoft’s on-premise Active Directory (AD) or cloud-based Azure AD. This platform is positioned within the environment to enable: Simplified deployment and administration: Easy integration with cloud-based, on-premise, or hybrid legacy applications, as well as existing enterprise technology, including Virtual Private Networks (VPNs) for remote login. Multiple authentication factors: HID ActivID one time password tokens and security keys, smart cards, and the HID Approve mobile app that enables users to authenticate to applications and deny fraudulent login attempts via their phone. Standards-based security: ISO 27001 standards, SOC2-certified, and EU GDPR-compliant. Intuitive user experience: Featuring self-service tasks for setting up authentication methods. WorkforceID Digital Credential Manager The WorkforceID Authentication solution extends HID’s broader authentication ecosystem that includes its comprehensive credential offering and WorkforceID Digital Credential Manager, for easily managing workforce authenticators used for both physical and digital access. HID Global was recently recognized as the overall top challenger in the KuppingerCole Leadership Compass for Enterprise Authentication Solutions report and included as a renowned company in its market leadership category. Identity vetting and credentialing services The report noted that “HID Global has been a strong player in government and enterprise workforce IAM for years. The company’s inclusion of identity vetting and credentialing services is a valuable differentiating factor in their solution.”
Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd., a pioneering provider of cyber security solutions globally, has published its latest Global Threat Index for March 2021. Researchers report that the IcedID banking trojan has entered the Index for the first time, taking second place, while the established Dridex trojan was the most prevalent malware during March, up from seventh in February. First seen in 2017, IcedID has been spreading rapidly in March via several spam campaigns, affecting 11% of organizations globally. One widespread campaign used a COVID-19 theme to entice new victims into opening malicious email attachments; the majority of these attachments are Microsoft Word documents with a malicious macro used to insert an installer for IcedID. Once installed, the trojan then attempts to steal account details, payment credentials, and other sensitive information from users’ PCs. IcedID also uses other malware to proliferate and has been used as the initial infection stage in ransomware operations. Evasive trojan “IcedID has been around for a few years now but has recently been used widely, showing that cyber-criminals are continuing to adapt their techniques to exploit organizations, using the pandemic as a guise,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. “IcedID is a particularly evasive trojan that uses a range of techniques to steal financial data, so organizations must ensure they have robust security systems in place to prevent their networks being compromised and minimize risks. Comprehensive training for all employees is crucial, so they are equipped with the skills needed to identify the types of malicious emails that spread IcedID and other malware.” CPR also warns that “HTTP Headers Remote Code Execution (CVE-2020-13756)” is the most commonly exploited vulnerability, impacting 45% of organizations globally, followed by “MVPower DVR Remote Code Execution” which impact 44% of organizations worldwide. “Dasan GPON Router Authentication Bypass (CVE-2018-10561)” is on third place in the top exploited vulnerabilities list, with a global impact of 44%. Top malware families *The arrows relate to the change in rank compared to the previous month. Recently, Dridex is the most popular malware with a global impact of 16% of organizations, followed by IcedID and Lokibot affecting 11% and 9% of organizations worldwide respectively. ↑ Dridex - Dridex is a Trojan that targets the Windows platform and is reportedly downloaded via a spam email attachment. Dridex contacts a remote server and sends information about the infected system. It can also download and execute arbitrary modules received from the remote server. ↑ IcedID - IcedID is a banking Trojan spread by email spam campaigns and uses evasive techniques such as process injection and steganography to steal user financial data. ↑ Lokibot - Lokibot is an Info Stealer distributed mainly by phishing emails and is used to steal various data such as email credentials, as well as passwords to CryptoCoin wallets and FTP servers. Top exploited vulnerabilities Currently, “HTTP Headers Remote Code Execution (CVE-2020-13756)” is the most commonly exploited vulnerability, impacting 45% of organizations globally, followed by “MVPower DVR Remote Code Execution” which impacts 44% of organizations worldwide. “Dasan GPON Router Authentication Bypass (CVE-2018-10561)” is in third place with a global impact of 44%. ↑ HTTP Headers Remote Code Execution (CVE-2020-13756) - HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine. ↑ MVPower DVR Remote Code Execution - remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request. ↑ Dasan GPON Router Authentication Bypass (CVE-2018-10561) - authentication bypass vulnerability exists in Dasan GPON routers. Successful exploitation of this vulnerability would allow remote attackers to obtain sensitive information and gain unauthorized access into the affected system. Top mobile malwares Hiddad took first place in the most prevalent mobile malware index, followed by xHelper and FurBall. Hiddad - Hiddad is an Android malware, which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS. xHelper - A malicious application seen in the wild since March 2019, used for downloading other malicious apps and display ads. The application is capable of hiding itself from the user, and can even reinstall itself after being uninstalled. FurBall - FurBall is an Android MRAT (Mobile Remote Access Trojan) which is deployed by APT-C-50, an Iranian APT group connected to the Iranian government. This malware was used in multiple campaigns dating back to 2017 and is still active today. Among FurBall’s capabilities are; stealing SMS messages and mobile call logs, recording calls and surroundings, collecting media files, tracking locations, and more. Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 3 billion websites and 600 million files daily and identifies more than 250 million malware activities every day.
HID Global, a trusted identity Solutions Company announced that Mail.Ru has chosen its HID Mobile Access solution for secure and convenient access control using smartphones and other cellphone devices. Need for access control Mail.Ru reaches over 91% of all Russian internet users via its mail platform and social networks. The company has more than 7,000 employees and a high volume of visitors to its Moscow offices, necessitating an access control solution that provides best-in-class security and a seamless user experience. Mail.Ru was seeking a cellphone solution that would easily integrate into its own smartphone app to allow employees and visitors to easily switch from using physical access cards to cellphone IDs stored on their smartphones. cellphone solution “We considered several solutions and decided in favor of HID Global. Their reputation for reliable and secure solutions greatly contributed to our decision,” said Andrey Evtyushin, Mobile Development Team Leader Business Process Management Department, Mobile Development Group, Mail.Ru Group. “It was also important that HID Global provided the most convenient software development kit (SDK) for iOS and Android platforms to integrate into our cellphone application, compared to other competitor solutions.” Robust ID security HID Global worked closely with local integrator partner AAM Systems to install 300 HID readers and issue 3,200 HID cellphone IDs to enable employees to use their smartphones for access control. Easy-to-use HID Mobile Access solution makes it possible for Mail.Ru to easily manage off-hours access and configure individual users’ security rights The HID Mobile Access solution makes it possible for Mail.Ru to easily manage off-hours access and configure individual users’ security rights, as well as enable easy movement of people within the building while maintaining security. Seos credential technology, which powers HID’s solution, also enables robust cellphone ID security. Access to Mail.Ru’s global network of offices is centrally managed through HID’s cloud-based portal, and provisioning is done over the air to deliver cellphone IDs to users’ phones via a cellphone app. This makes it easy to add, remove or change access rights as required. Tailored customer experience “HID Mobile Access provides an ideal mix of security, convenience, and flexibility; our SDK means customers can tailor the user experience so it is unique to them and on-brand,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. Mail.Ru used the HID Mobile Access SDK to integrate the cellphone solution into its own company application to offer a consistent user experience across different cellphone devices and operating systems, including iOS and Android™. The solution enables Mail.Ru to also provide visitors with building access so contractors, vendors, and event attendees can use cellphone IDs on their personal devices as part of Mail.Ru’s holistic approach to maintaining high levels of security.
Suprema, a pioneer in access control, biometrics, and time & attendance solutions, shared partner testimonials about its security controller CoreStation that helps facilitate building multi-credential access control systems. Suprema CoreStation is a biometric-enabled security controller that provides great system design flexibility with credential options ranging from PIN, RF card reader, mobile access to fingerprint and face recognition. Meyer, a partner in Turkey, was able to construct a face recognition access control system for its customer using Suprema CoreStation and Suprema face recognition terminals. Fingerprint recognition system “CoreStation offers unrivaled matching speed. The customer preferred to connect the face recognition terminals to CoreStation instead of directly to the server for stronger security. This meant that all user data was saved in CoreStation and data had to be transferred to CoreStation for every matching operation. Despite this configuration, users do not notice any delay in authentication thanks to CoreStation’s powerful performance,” said Orcun Bayindir, CEO of Meyer. IQ trading, a partner in Ukraine, enabled a fingerprint recognition access control system for a banking customer. Andrii Glukhov, technical support lead at IQ trading, cited CoreStation’s scalability, enterprise level memory and interlock zone support as advantages. Increasing security level CoreStation is a unique, powerful controller that can store up to 500,000 users" “Using Suprema CoreStation, we connected 26 two-sided doors with high performance fingerprint authentication. CoreStation is a unique, powerful controller that can store up to 500,000 users, 1,000,000 fingerprint templates and 5,000,000 logs, providing uninterrupted service regardless of network issues. We were also able to create sequential passages with interlock zones, increasing overall security level and eliminating the possibility of a person entering the second door without closing the first one,” said Glukhov. Absolon, a partner in Europe, provided mobile access solution to Crestyl, a real estate developer in Czech, using CoreStation. The site had over 100 doors with 1,500 employees and required a secure yet flexible controller that could be easily integrated with third-party systems. Mobile credential compatibility Crestyl was operating a third-party system C4 software and was looking for a way to add mobile credential without a major system overhaul. CoreStation, together with Suprema BioStar 2 and Suprema XPass D2 readers, was a great answer because of CoreStation and BioStar 2’s integration flexibility. C4 was integrated with BioStar 2 via BioStar 2 API and XPass D2 were selected for mobile credential compatibility. “CoreStation’s appeal lies in the gamut of credential options it supports. Partners and customers can enable PIN, RF card, mobile access as well as biometric credentials like face and fingerprint with Suprema’s intelligent controller,” said Hanchul Kim, CEO of Suprema Inc.
Suprema, a pioneer in access control, biometrics, and time & attendance solutions, announces that it has integrated its latest facial recognition devices into Nedap's access control system, AEOS. This will enable organizations around the world to manage access control by making use of Suprema’s latest facial recognition technology. “The COVID-19 pandemic has shaken up the security and building management industry, resulting in a surge of interest in contactless access control. Thanks to the flexibility of our open platform, we have been able to quickly adapt to these changing customer requests. We have a great partner in Suprema who stands at the forefront of biometric innovation,” said Ruben Brinkman, alliance manager at Nedap. Facial recognition integration For the past years, Suprema and Nedap have continuously released new integrated solutions. Suprema achieved this facial recognition integration by using Nedap's Bio-API, specifically developed to enable biometric solution integration into AEOS. Suprema and Nedap will continue to strengthen our collaboration to bring new innovative solutions" “The addition of Suprema’s face recognition devices with Nedap AEOS will allow customers to take advantage of a wider variety of Suprema’s biometric solutions. Suprema and Nedap will continue to strengthen our collaboration to bring new innovative solutions to quickly adapt to market needs, such as the recent demand for contactless security solutions,” said Hanchul Kim, the CEO of Suprema Inc. Future backward compatibility The integration utilizes a ‘single platform’ approach, meaning that there is no need for operators to switch screens. They can continue working in AEOS to manage enrollment and biometric identities. The biometric profiles are stored in Suprema’s security platform BioStar 2 and are constantly synchronized with AEOS, an information exchange safeguarded through SSL certificates, which provides strong encryption. Both Nedap and Suprema are strongly committed to maintaining the integration, ensuring future backward compatibility, and adding new functionalities along the way.
Security and Safety Things GmbH has announced the launch of its second App Challenge to spur additional creative development in video analytic applications. Through April 26, 2021, participating developers have the opportunity to submit proposals for apps to address specific security, safety and business optimization use cases in the retail, transportation, stadiums and entertainment, and healthcare verticals. S&ST open camera OS and IoT platform The apps will be designed to run on smart cameras using the S&ST open camera OS and IoT platform The apps will be designed to run on smart cameras using the Security & Safety Things open camera operating system (OS) and S&ST open IoT platform, which enables cameras to run a variety of applications simultaneously, in order to perform different functions. The camera OS is based on the developer-friendly Android Open Source Project (AOSP). “While many vertical markets share a core set of operational needs, individual organizations also have unique requirements based on the nuances of their location, customer base or other circumstances,” said Adam Wynne, Head of the Security & Safety Things Innovation Accelerator based in Pittsburgh. Adam Wynne adds, “We are calling on the collective creativity and unique perspectives of the developer community to help solve distinct customer challenges, whether that’s a standalone solution or one based on a combination of different applications.” Creating innovative video analytic applications For this year’s challenge, a variety of system integrators responded to an S&ST survey asking for customer needs and challenges in the four vertical market categories. Based on this feedback, developers will be tasked with creating innovative video analytic applications to address a host of different use cases, including: Unmanned aerial detection for drones and other flying objects in stadiums, or during large events. Suspicious behavior analytics for the detection of fighting or stealing. Customer conversion and ‘out of stock’ analytics in retails spaces. Cargo protection for the detection of vandalism and theft in parking lots and other facilities. Hygiene and PPE checks in healthcare facilities, as well as anomaly detection for unusual behavior in elder-care facilities. ESCON 2021 Three winners will be chosen by a jury of 20 prominent system integrators Three winners will be chosen by a jury of 20 prominent system integrators and will be awarded individual prizes of 10,000€ (Euros) each. Winners will also be invited to showcase their solution at the Security & Safety Things (S&ST) booth at an upcoming event, ESCON 2021, depending on the COVID-19 situation. All participating developers will be able to benefit from various co-marketing opportunities with Security & Safety Things GmbH, throughout the duration of the App Challenge. App Challenge The winning apps from the 2020 App Challenge provided solutions for retail and commercial buildings, transportation and smart city, and manufacturing and logistics categories. Overall, the challenge resulted in 20+ new applications being added to the Security & Safety Things Application Store. How it works: Developers can submit multiple proposals for more than one vertical by April 26, 2021. Proposals will be reviewed and the most promising will be chosen by the Jury to proceed with development. Developers will have from April 29 to July 31, 2021, to create their solution(s). Once developed, the app will need to be uploaded to the Application Store by July 31, 2021. S&ST and the jury will test and review the apps. Winners will be chosen by the end of August, 2021. Developers can apply for the App Challenge by submitting their proposals latest by April 26, 2021 on the app challenge page on Security and Safety Things GmbH’s official website.
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organizations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centers or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognize individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analyzing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognize. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the center of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
This year has brought about changes in virtually every sector. As with other frontline industries, the security sector has been tested more than those able to move entirely to remote working. While the promise of a vaccine means an end is in sight, the post-COVID era will not bring with it a return to the ‘normal’ we knew before the pandemic. Organizations have adapted, becoming more resilient and agile and this will have lasting effects. The coming months will continue to be testing. The tiered system will see the precautions in place fluctuate with the situation. Initial lockdown period At the same time, a gradual return to normal as the vaccine is rolled out will require adaptive measures. The security sector will be at the heart of keeping people safe throughout this process. The initial lockdown period and the first wave of panic buying might seem like a lifetime ago. However, the introduction of the second lockdown in November was accompanied by another wave of stockpiling despite organizations trying to reassure their customers. It is uncertainty that breeds anxiety, and we continue to see this as the restrictions fluctuate across the country. The tier system depends upon a number of factors: case detection rate, how quickly case numbers are rising or falling, positive COVID-19 test numbers in the general population, pressure on the NHS in that region, and local context and exceptional circumstances. Social distancing measures For the sector to meet demand, technology will be needed to work alongside the manned guarding role While travel is allowed in all tiers if necessary for work, government advice still recommends that those able to work from home should do so. This means that throughout the country, many buildings will remain empty or at minimal capacity for some time to come. Security risks vary with the restrictions in each area. Although shops are largely open, tier three still requires the closure of many premises. Vacant premises are more vulnerable to theft and damage, meaning officers and security technology remain in higher demand than usual. As more premises are allowed to open, the need for officers to implement social distancing measures increases, stretching the sector like never before. For the sector to meet demand, technology will be needed to work alongside the manned guarding role. Temperature checking devices It will continue to be important in providing security when officers cannot be present in person through CCTV and sensors. But it will also be integrated into the manned guarding role to streamline processes. We are already seeing the start of this as many officers are using handheld temperature checking devices to reduce the spread of COVID-19. We’ll also see temperature scanners installed into buildings to allow security guards to focus on other priorities. Those businesses that are open will need to continue to adapt to the changing regulations in the coming months. Christmas is a busy period that stretches the retail sector. Unpredictability results in heightened stress levels and makes it more difficult for people to reliably take in and recall information. Security officers are a key first point of contact both to enforce measures and reassure anxious staff and members of the public. Enforcing one-Way systems Security staff will need to keep members of the public safe and prevent disruption Some shops are enforcing one-way systems and limiting the number of customers allowed inside. Over Christmas, many more may choose to do so. Security officers will be responsible for ensuring these precautions are followed. With the heightened pressure of the festive period, it can be hard to predict how members of the public will respond to officers enforcing measures. Security staff will need to keep members of the public safe and prevent disruption. Doing so will require tact and empathy in dealing with customers. Within shops, too, officers will be tasked with ensuring social distancing and other measures are followed effectively. Doing so, they must work closely with clients to understand what protocols are in place and how to handle a breach. They must also be able to enact discretion. For example, clients may not take issue with protocols being broken momentarily or accidentally. Extensive government guidance There is extensive government guidance on the precautions that should be taken on various premises. They include the introduction of one-way systems and limiting building capacity. Measures such as one-way systems may be broken by those that don’t notice or don’t care. Officers must be able to judge what responses are appropriate while maintaining a calm and reassuring presence. The security officer role has long been moving toward a more front of house position as, for many visitors to a building, they are the first point of contact. The pandemic has accelerated this trend. Working on the frontline of the pandemic, officers have had to play a more multifaceted role than ever before. Officers still act as deterrents and manage security issues, but they must also use empathy and strong communication skills to inform and reassure customers and staff onsite. Adapting to new technology They will need to be able to learn quickly on the job and adapt to new technology and practices Being able to demonstrate this flexibility and to read a situation and react appropriately will be some of the skills most in demand in the industry in the future. Officers will need to build close working relationships with clients. In addition, many will have new roles, such as taking temperatures with handheld devices. They will need to be able to learn quickly on the job and adapt to new technology and practices. Technology, too, will be more important. If the global pandemic has driven any point home, it is that we cannot always see or sense threats. Data-Driven insights Temperature checks and occupancy sensors will be the norm in protecting from COVID, while security technology and data-driven insights will continue to grow in popularity. The security sector specializes in adapting to the unexpected and the threatening. It continues to demonstrate incredible value through the pandemic. While the coming months will undoubtedly be trying, the sector is adapting. Lessons have been learned from the pandemic that will affect business globally. Security specialists are taking these on and creating a stronger and more effective industry.
Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an emergency and need to make sure everyone’s exited the building. Indoor positioning helps in all these situations, because it can locate items and guide you to where they are. The importance of “where” Knowing where an asset is located in real time is useful in many ways. In industrial settings, it improves item utilization rates and saves time spent searching for things. It opens the door for a new level of “just in time” efficiency on factory floors, and for inventory management in warehouses and retail environments. Safety is another benefit of accurate location, because knowing where people, automatic guided vehicles, and robots are in real time can help prevent accidents and keep people out of harm’s way. Accurate location in real time also enables contextual decision-making, so your smart house adjusts your stereo automatically as you move from to room or lets you control objects by simply pointing at them. Lets you control objects by simply pointing at them Security authorisations based on location is another possibility. Precise real-time location is something that can be hard to fake, so it can be used to restrict access to an area or used to add protections based on where an asset sits, where a piece of data resides, or the origination point of a communication. Getting the technology right Developing an effective technology for indoor positioning requires several things. To begin with, location readings needs to be very precise, with accuracy down to as small an area as possible. The technology has to be secure, because location often needs to be kept private. The technology has to be reliable, even in harsh environments, and easily scalable, too, so it can address the thousands of people and assets in large venues. It has to be low power and affordable, so it can be embedded in everything from high-end, complex devices like smartphones to low-end, simple devices like asset tags. And, of course, the technology has to have latency low enough that it can track movement in real time. Various wireless technologies, including Bluetooth and Wi-Fi, are already used for indoor positioning, but they don’t deliver on the full set of requirements, especially in terms of accuracy. A different kind of wireless, called Ultra-Wideband (UWB) checks all the boxes. It has the potential to change the way we do all kinds of everyday tasks. What is UWB? UWB is based on the IEEE standard 802.15.4a/z, which has been optimized for micro-location and secure communication. UWB is highly accurate. It can pinpoint people and things to within just a few centimeters, making it 100 times more accurate than the current implementations of Bluetooth Low Energy (BLE) and Wi-Fi. UWB is reliable because it has high immunity to various types of interference, including multipath, which is when a wave from a transmitter traveling to a receiver by two or more paths causes interference. UWB also offers very low latency, with update rates of up to 1000 times per second and readings that are as much as 50 times faster than satellite navigation. UWB is also implemented using mainstream technology, so it’s both affordable and optimized for low power. Lastly, UWB leverages distance-bounding techniques defined by the IEEE to provide a level of security that makes it extremely difficult to hack. Ultra-Wideband (UWB) checks all the boxes How is all this possible? Physics! UWB out-performs other location technology because, unlike Bluetooth and Wi-Fi, which transmit narrowband signals and use Received Signal Strength Indicator (RSSI) to determine location, UWB transmits wideband signals (500 MHz) and uses Time-of-Flight to determine location. Already in 40+ verticals UWB is already bringing value to products and services in more than forty verticals covering the consumer, automotive, industrial, and commercial market segments. For example, it brings operational visibility to manufacturing and logistics, helps businesses protect workers, and reduces safety-management costs. UWB also lets robots and drones self-navigate, and enables secure, hands-free access to cars, front doors, and other secure locations. It even helps with contact tracing and social distancing in the fight against COVID-19. Now in smartphones Recent adoption in smartphones means UWB is ready to grow quickly. Developers are using UWB as part of new services, with an eye toward making various everyday activities more convenient and safer. With UWB as part of smartphone apps, purchases will be more secure, accessing your car will be possible without a key fob, and misplaced items won’t stay hidden for long. Retail outlets will use location for targeted marketing, and finding things on store shelves will be easier than ever. Home automation will become seamless, and friends and family will be easy to find even if they’re in a crowd. The question of interoperability Having UWB in smartphones is an important first step Having UWB in smartphones is an important first step toward making UWB an everyday part of life, but interoperability is another key factor, since smartphones have to interact with a wide range of other devices and services. That’s where the FiRa Consortium comes in. Launched just over a year ago, the FiRa Consortium is a member-driven organization of market leaders from the consumer, mobile, industrial, enterprise, and semiconductor industries. FiRa members work collectively to define the future standards that will make interoperability across UWB products a reality. With FiRa making it possible for developers to use UWB in all kinds of new ways, the future of indoor location is really only limited by the developer’s imagination.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organizations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-Life balance In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organizations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasizing both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-Based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com has adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts. Helping customers remain connected Adapting to challenges of the coronavirus pandemic, Alarm.com is further investing in solutions that help customers remain connected and engaged. The company has created a resource hub called “Succeeding Remotely” that provides tools, tips and news links that partners can use to adapt their business operations. From adjusting sales and installation techniques to maintaining cellular upgrades, Alarm.com is helping partners stay connected to customers remotely, keep their teams trained, and address rapidly evolving customer concerns without rolling trucks.The company has created a resource hub called “Succeeding Remotely “Additionally, after seeing all that our partners are doing to support their local communities in need, we were compelled to highlight those efforts with ongoing videos called Good Connections, which we’re sharing with our partner community to spark more ideas and ways to help,” says Ferguson. “Though our partners have experienced varying degrees of disruption to their business, we’re inspired by their adaptability, ingenuity and resilience,” says Ferguson. “Along with establishing proper safeguards for operating in homes and businesses, our partners are leveraging our support resources more heavily, while our entire staff has worked tirelessly to deliver new, timely resources.” Do-It-Together solutions Alarm.com partners are successfully employing Do-It-Together (DIT) solutions, focusing on 3G-to-LTE upgrades, and pivoting to new verticals like commercial and wellness. Many are also streamlining their business operations and taking advantage of virtual training opportunities to enhance their technicians’ skills and knowledge, says Ferguson. Do-It-Together installs involve depending on customers to perform part or all of the installation process. Partners can send customers fully configured kits with mounting instructions, or technicians may guide customers on a remote video call. Alarm.com’s tools, training and products help partners modify remote installation options depending on each customer’s needs. End users can validate the Alarm.com Smart Gateway with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app Alarm.com Smart Gateway For example, the Alarm.com Smart Gateway can be pre-configured with indoor and outdoor cameras for easy customer installation and to reduce the likelihood of future service calls. Also, end users can validate with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app. “DIT is helping our partners continue onboarding customers and avoid backlogs,” says Ferguson. “We’ve been pleasantly surprised by the resiliency and level of future investment that our residential and commercial partners have shown in the face of adversity,” adds Ferguson. For example, a significant number of business customers have used the slow period to install systems that are typically too disruptive to put in during normal business hours. Similarly, service providers are adopting new technologies or business models, such as cloud-based access control. “They’re often saying to us, ‘I’m going to take this opportunity to make changes to improve our business,’ and have been working closely with us on training and business consulting to support their efforts,“ she says. Shift to the cloud Ferguson sees a growing preference for cloud-managed surveillance and access systems over ones that have historically been run on-premise. The technology itself is attractive, but especially driving change is the enhancement to the daily lives of service providers and customers, which have been strained during this time. “The foundational benefit of our cloud-based solution is the hassle-free, seamless customer experience it delivers,” says Ferguson. “We make this possible by taking ownership of the servers, software maintenance, firmware updates, health monitoring, and more. With cloud technology, these aspects become invisible to the customer and take a lot off their plate, which is more important than ever.” End users can take advantage of Smart Tip video tutorials to help with DIT installations, or they can use the Alarm.com Wellcam to connect with loved ones anywhere.End users can take advantage of Smart Tip video tutorials to help with DIT installations Partners can attend training workshops focused on remote installation tactics, while driving consumer interest in new offerings through Alarm.com’s Customer Connections platform. The goal is to make it simple for partners to stay connected to their customers to maximize lifetime account value. “We are well-positioned to endure the pandemic because of the strength of our partners in their markets along with our investments in technology, hardware and our team,” says Ferguson. “As restrictions slowly lift, there is cautious optimism that the residential, commercial, property management, plumbing/HVAC, builder and other verticals will recover quickly. We believe that as more partners adopt the DIT model and add commercial and wellness RMR, they will find increasing opportunities to deploy security, automation, video, video analytics, access and more throughout their customer base.”
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
SmartSec Solutions, a specialist front of house security provider, has been appointed by Colliers International to oversee security at the prestigious 10 Old Bailey, London. SmartSec has been working with Colliers for almost three-years across other London-based properties including at Idle Lane, Southampton Street, King Street, and Bartholomew Lane and this appointment adds to SmartSec’s growing corporate portfolio. High-Profile security service The three-year contract, will see SmartSec provide high-profile security service The three-year contract, starting in May 2021, will see SmartSec provide high-profile security service to welcome tenants and visitors as well as protecting assets, property and the occupiers. 10 Old Bailey is an eight-storey building across 86,625sq ft. St Paul’s Underground station is within 5 minutes of the building providing access to the Central Line. Thameslink and Blackfriars are also in close proximity. Solid customer service Rachel McMahon, Colliers International Facilities Manager, said: “SmartSec’s staff are fantastic. They are great communicators and have always displayed that wow-factor. I know that I can approach Dele Ogunlaru and his team and speak openly and candidly to them. This personalized service is invaluable to Colliers and is what separates SmartSec from any other security provider I have previously worked with.” Dele Ogunlaru, Director, Compliance & Key Accounts, comments: “First class security underpins everything. However, it’s also about solid customer service, good communication, and welcoming building tenants and visitors coming through that front door. We are the first person they see at the start of the day and often the last person they see when they leave. It’s about making a visit to the building an enjoyable experience, and that starts with the officer on the front desk.”
Suprema, a global company in biometrics and access control solutions, announced that it supplied BioSign 4.0, its under-display fingerprint recognition algorithm to the Samsung Galaxy S21 smartphones with support from Qualcomm Technologies, Inc. BioSign, Suprema’s smartphone fingerprint recognition technology, has gained global recognition since its installation on Samsung Galaxy J5 models in 2017. Since then, Suprema has been supplying BioSign solutions to other Samsung smartphone models including Samsung Galaxy S10, Galaxy Note10, Galaxy 20, and Galaxy Note 20 series. Fingerprint recognition speed BioSign 4.0, installed in the Galaxy S21, has been receiving great reviews for its fingerprint recognition speed. BioSign 4.0 delivered enhanced speed and accuracy compared to its predecessor, BioSign 3.0, significantly upgrading user convenience with 50 percent faster and more than twice as accurate recognition performance. BioSign 4.0 employs deep-learning mechanisms to optimize fingerprint analysis to efficiently recognize rich fingerprint information obtained from the larger sensing area of the second-generation Qualcomm® 3D Sonic Sensor Gen 2 installed in the Galaxy S21 series. Qualcomm 3D Sonic Sensor Gen 2 Qualcomm Technologies unveiled the high-performance ultrasonic sensor, the Qualcomm 3D Sonic Sensor Gen 2 that was supplied to Samsung Galaxy S21 series, in January at CES 2021. With a 77%-larger fingerprint sensing area than the previous generation, the Qualcomm 3D Sonic Sensor Gen 2, was able to significantly improve fingerprint recognition performance. The ultrasonic sensor has ultra-thin form factors and is optically isolated from the display panel allowing for sleek smartphone designs. Performance and user convenience “Suprema's fingerprint recognition technology has been continuously selected for the Samsung Galaxy S series, proving to the world the technological superiority of our solution,” said Brian Song, the president of Suprema Inc. “With the excellent reviews BioSign 4.0 has been receiving for its overpowering performance and user convenience, we expect to be able to grow sales and market share. Suprema will continue to advance our fingerprint and face recognition technologies using AI and deep learning, leading the biometrics market into the future,” Song remarked.
Optilan, the security and communications company for the energy, infrastructure, pipeline, and rail sectors, has been appointed by Limak to deliver communications and security systems on the Jubail - Riyadh Water Transmission System in the Kingdom of Saudi Arabia. Optilan has been selected by Limak, the Principal Contractor for the state-run Saline Water Conversion Corporation (SWCC), which owns the water transmission system. Upon completion, it will be one of the largest water transmission systems in the world. Leak detection systems Optilan will support Limak in delivering this project by providing the necessary security and communications systems, which will ensure the safe and efficient operation of the water system. Optilan will define the basic layout, design and construction requirements Optilan will define the basic layout, design and construction requirements and guarantee performance, by providing key leak detection systems so that the two 88” pipes will be able to transport 1.2 million m³ of potable water per day, once implemented. Optilan will leverage its expertise in Critical National Infrastructure and precisely list the required key equipment, including the main data, and the necessary functions for the 412 km long twin pipeline. Leak detection systems Optilan will also provide Limak with a further range of services including: Design, documentation Project management Procurement Building cabinets LAN and WAN networks FAT Leak detection systems Third-party intrusion detection Testing and commissioning at site This is the latest in a series of international project wins for Optilan This is the latest in a series of international project wins for Optilan as it gears up for another year of strategic growth. In the last year, Optilan, which is backed by private equity firm Bluewater, has secured contracts within critical infrastructure, rail, and renewables sectors that span from the UK, Europe, Middle East, and Asia. Critical infrastructure projects Optilan has been appointed by Limak on the basis of its proven expertise and its successful track record of delivering high profile critical infrastructure projects, globally. Bill Bayliss, CEO of Optilan, says: “We’re delighted to announce we’ll be supporting Limak on the state-owned Jubail - Riyadh Water Transmission System. As we ramp up for another year of growth, we’re committed to demonstrating our communications security Critical National Infrastructure expertise globally.” “We’re proud that our strong success record led Limak to appoint Optilan for, what will be, one of the world’s largest water systems. With this project in our portfolio of work, we’re on track to successfully achieve our key strategic aims, and continue on with our global expansion.”
Wind is a free and unlimited resource that provides potential energy toward the growing demand for clean, renewable power. In coastlines, islands, grasslands, mountainous areas, and plateaus that lack water, fuel, and convenient transportation, wind power poses a potential boon for addressing local challenges. Chaka Wind Farm is located on the Gobi Desert in Qinghai Province, China. At an altitude of 3,200 meters (nearly 2 miles), Qinghai has abundant wind energy reserves. Since its commissioning in December 2012, the energy-capturing capacity of the installed wind power turbines has reached 99 MW, while the annual average power generation is about 184 million kWh and the average annual utilization hours are a mere 1,850 hours. Mechanical energy of rotation However, the plateau environment experiences squally winds all year round, and in severe cold winters the temperature often falls below minus 30° C! At those temperatures, the biting cold wind carries a severe risk of freezing for wind farm employees, and the harsh weather makes operation and maintenance extremely difficult. The difficulty lies in the fact that most of the wind farms are located in remote areas A wind turbine’s transmission system is composed of blades, hubs, main shafts, gear boxes, and couplings. Its main function is to convert the kinetic energy of wind into mechanical energy of rotation, then into electrical energy. As the key element in wind power, these wind turbines require routine maintenance. At present, maintenance relies mainly on the on-site staff climbing up the towers to check for and predict unit failures. However, the difficulty lies in the fact that most of the wind farms are located in remote areas. Personnel safety management When they rely solely on manual maintenance, the costs remain high enough to threaten the economics of the whole operation. Chaka Wind Farm hosts 62 wind towers, distributed across a wide 38,000 square meters (9.4 acres). This generous area creates a big challenge for maintenance staff who spend large amounts of time on transportation and logistics from tower to tower. Furthermore, according to the maintenance plan, workers have to climb each 80-meter-high wind tower for routine inspections each month. To solve these challenges, Hikvision provided a set of intelligent operation and maintenance systems for Chaka Wind Farm, including intelligent visual inspection equipment, personnel safety management, and real-time communication, providing a 24-hour online ‘Smart Examiner’ for the wind farm. Monitoring equipment temperatures Technicians at headquarters can remotely support personnel during on-site maintenanceFirst, for core unit components, thermal cameras are deployed in the wind turbine cabin to monitor equipment temperatures. This way, machine failures can be detected immediately, and staff can be automatically alerted when abnormal conditions (such as overheating) are found. In addition, with the wind towers located in the expansive Gobi Desert, unstable communications can leave operating personnel feeling disconnected. To resolve this, Hikvision’s one-key alarm intercom at the bottom of wind tower provides communication with the control center. Technicians at headquarters can remotely support personnel during on-site maintenance operations, assisting with diagnoses and repairs. Lastly, panoramic and thermal cameras and other equipment vastly expand the visual capabilities of the control center. Staff can monitor the situation and various parameters around the wind turbines at all times. If an abnormality is found, they can immediately receive an alert from the system and identify specific problems. Engine room equipment “Originally, each wind turbine had to be inspected by staff members every month; climbing the towers was difficult and the risk factor was high. After the intelligent operation and maintenance system was installed, the engine room equipment on each tower can be inspected daily through the video system. Now each wind turbine only needs to be visited once every three months, and the frequency of climbing is reduced more than 60 percent,” said Sun, a technical operating engineer from Chaka Wind Farm. “More importantly, those problems that could only be discovered by personnel on the scene can now be identified by the intelligent operation and maintenance system – even proactive and early warnings of abnormal problems – which is a great help for our overall equipment operation and maintenance.”
Essence SmartCare, part of global IoT solutions provider, Essence Group, has announced that ADT Security Australia, a globally renowned provider of security monitoring services, has selected its Care@Home Enhanced Telecare Services platform to expand ADT’s Health and Wellness services offering in Australia. Care@Home solution ADT Security Australia is part of Johnson Controls, the global company in smart, healthy and sustainable building solutions. This partnership was facilitated in conjunction with, HSC Technology Group. It will enable ADT to enhance its senior care offerings in Australia by providing a new range of assistive services through Essence’s Care@Home solution, under the banner of ADT Home Assure. The rollout of Essence’s technologies will allow ADT Security Australia to offer breakthrough telecare services to seniors using state-of-the-art technology and utilizing the LTE network. Enhancing senior care offerings This announcement comes as the senior population is set to grow rapidly in Australia, with the proportion of seniors who are over the age of 75 to grow from 33% to 55% in the next 30 years and annual revenue for home-based care and services of around $ 4.5 billion AUD (Australian Dollar). “We are honored to be joining forces with ADT Security Australia, one of the largest security and safety solutions providers, to enable them to provide the best care and protection to Australian seniors,” said Barak Katz, General Manager for Essence SmartCare. Unified telehealth and care platform Our unified telehealth and care platform enables monitoring at any level" Barak Katz adds, “Our unified telehealth and care platform enables monitoring at any level and through any type of caring device for a wide range of health conditions, both at home or on-the-go, all through one connected Care@Home smart platform.” Essence SmartCare’s award-winning Care@Home platform is an aging-in-place product suite, providing seamless health monitoring solutions that enable seniors to live independent lives, while also providing their families with peace of mind. Leveraging deep AI capabilities Leveraging a variety of advanced technologies, including deep AI capabilities, to ensure the safety of seniors, the platform comprises an integrated suite of services, including continuous monitoring of daily activities, advanced fall detection, and voice-activated alerts to facilitate real-time communication with caregivers and emergency services providers. “At ADT Asia Pacific, our mission is to protect the lives of our customers and their assets across the region by providing the highest quality solutions and services leveraging best-in-class partners,” said David Kirubi, Vice President of ADT Asia Pacific. David Kirubi adds, “Essence’s Care@Home solution presents a substantive and unique industry value proposition in enabling this mission, for the benefit of our customers, while ensuring peace of mind for their loved ones and caregivers.”
Access IS, part of HID Global, is delighted to celebrate the successful launch of contactless payments across the Stockholm region by SL (Storstockholms Lokaltrafik). Building on the successful mass deployment of Access-IS ticket readers and validators back in 2019, the latest upgrade to the system sees Access-IS devices in train gates and ticket offices as well as bus mounted validators being upgraded to permit full cEMV contactless payment capability. Contactless ticketing Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read Stockholm is leading the way with this deployment of contactless ticketing across a true multi-modal transit network. Barcode and NFC tickets, as well as bank and credit cards by VISA, Mastercard or American Express are all presented to a single, intuitive-to-use, point of presentation. Ticket reading is fast and dependable with clear visual indications when tickets and cards have been successfully read, meaning passenger throughput is maximized for a great user experience and reduced operational costs. Access IS transit validators and readers Common to many Transit Authorities, SL continues to operate its ‘Accesskort’ proprietary closed loop ticketing scheme in tandem with the new upgrade. However, plans are in place to migrate ‘Accesskort’ to a new SL transit (EMV technology) closed loop card, which will be read/processed on the Access-IS reader, making a single point of presentation for all tickets and payments. All of the Access IS transit validators and readers are non-proprietary, open architecture units, which free the city to use any software backend system they desire. Access IS and SL partnership When Access IS first started to work with Storstockholms Lokaltrafik (SL), it was the beginning of a journey to modernize ticketing across Stockholm. At any ticket reader on buses, metro barriers, commuter trains and boats, rail or tram platform, or with the tram conductor, passengers can now simply tap to make a payment using all major payment schemes, as well as Apple Pay, Samsung Pay, Google Pay via their mobile devices’ digital wallet. A single tap buys them a single trip, priced at SEK 38, the same as the SL app, the ticket machines, or the ‘SL Accesskort’. Initially the system has gone live with adult tickets, but concession tickets for pensioners, students or children will follow. Contactless cards for passengers For passenger security, SL does not see debit card numbers or card account The ticket becomes valid the moment a passenger taps on their contactless card for the first time, at the start of their journey and remains valid for 75 minutes. All of a passenger’s journeys are tallied up and debited as a single payment the following day, making travel payments easy to understand and simple to track for the passenger. For passenger security, SL does not see debit card numbers or card accounts, but uses a technology where the correct card number is exchanged for a random number. This means that SL cannot see which person the payment card is linked to. Deployment of contactless transit payments Speaking about the project, Charlotte Modig, Payments and Cards Senior Business Manager for SL Stockholm said, “As we modernize our ticketing system to be leading edge, the learning curve for all involved is steep. Close cooperation between SL and Access has managed to overcome challenges and deliver a service we are all rightly proud of.” Speaking about the project, Cliff Hunter, Head of Sales for Access IS said, “Our relationship with SL goes from strength to strength with a great deal learnt on all sides during this ‘the largest of its kind’ deployment of contactless transit payments.” Cliff adds, “We champion software agnostic transit products to give operators flexibility in how they implement their mobile ticketing and payment schemes.”
Round table discussion
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Six Things To Look For When Adding AI Cameras To Your OperationDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload