Network / IP security
Antaira Technologies, globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNX-C800 and LNX-C800G Series. LNX-C800 and LNX-C800G series Antaira Technologies’ LNX-C800 and LNX-C800G series are 8- port industrial compact unmanaged Ethernet switches embedded with 8*10/100Tx RJ45 ports (8*10...
System Surveyor has upgraded its intelligent system design platform created to digitize and streamline the industry’s historically manual approach to site surveys and design. Driven by customer feedback, these upgrades include expanded product catalog capabilities and enhanced Google Earth functionality. Expanded product catalog Both updates augment the virtual, collaborative elements central to System Surveyor and used by security professionals, deemed “essential critic...
Coronavirus (Covid19) pandemic has hit the world unprepared for its consequences on the healthcare system and economic life. As a result, the number one priority for countries and states is to flatten the infection curve and provide them with time. Essential policies adopted to achieve this are directed at changing and controlling human daily behavior. AI-Based solutions viisights has Artificial Intelligence-based solutions to help authorities enforce those policies, help prevent the virus spr...
Hikvision UK & Ireland has announced offering security installers, integrators and end users the opportunity to undertake free online training on its fever screening thermal products and solutions. Hikvision thermal cameras Hikvision’s newly developed thermal cameras can be configured to aid high level screening by detecting elevated skin-surface temperatures, and are suitable for use in rapid preliminary fever screening in office buildings, factories, railway stations, airports and...
Platinum CCTV has announced the development and release of a unique body temperature sensing security camera designed to help protect against pathogenic community spread by rapidly pre-screening individuals before they enter a facility. The new thermal body temperature camera identifies individual body temperatures in addition to providing visual security, which is an innovative tool to rapidly pre-screen individuals for fevers when entering a facility and help fight future pandemic spread. PT-...
With the Government directives brought into action earlier this week, Security Systems and Alarms Inspection Board (SSAIB) has had to change certain aspects of their working practices, while also ensuring that it doesn’t impact negatively on the registered firms and the level of service that the company provides to customers. UKAS accreditation SSAIB is fully aware of the uncertainty and worry that our firms will be facing at this difficult time" Security Systems and Alarms Inspection B...
IDIS has further enhanced its IDIS Center VMS, adding new features and functions targeted at small to mid-sized enterprises and multi-site customers. Organizations can build powerful centralized monitoring solutions, quickly and easily, when implementing IDIS Center together with the wide selection of IDIS DirectIP cameras and powerful NVRs. These deliver customer lifecycle savings of 50% or more compared with server-based solutions, thanks to reduced installation time, no upfront or ongoing license fees, easier maintenance, and the industry-beating IDIS Ultimate Warranty. IDIS Center VMS Important new features now included with the cost-free, license-free IDIS Center VMS include MapVue Important new features now included with the cost-free, license-free IDIS Center VMS include MapVue, an easy-to-use search function that speeds up operator navigation across building layouts and floor plans. Its intuitive interface helps users to view live and play back video streams across multi-camera systems, while maintaining an overview perspective of their facilities’ layouts and camera positions. MapVue also provides easy bookmarking, allowing operators to search the recorded data for persons and activity of interest. Bookmarked footage can then be saved in an Excel file, creating a library of video clips. Instant Meta Filtering (IMF) capabilities IDIS Center users can also now benefit from IDIS Instant Meta Filtering (IMF) capabilities without any licensing or maintenance fees when using the new range of IDIS 6000 Series Edge VA (EVA) cameras. IMF speeds up incident investigations from days or hours to mere minutes. It allows operators to easily collate footage and scan hours of recorded video, from multiple streams, to pinpoint the movements and last-known locations of persons or vehicles of interest. “With these innovative features, IDIS Center is delivering great new benefits and further improving value for our customers,” says Andrew Myung, President, IDIS America. IDIS For Every Network (FEN) technology Surveillance configured with IDIS Center at its heart also ensures greater cyber security Surveillance configured with IDIS Center at its heart also ensures greater cyber security, because devices mutually authenticate and eliminate the need to for passwords to be entered manually. In addition, IDIS For Every Network (FEN) technology lets engineers connect sites to a control room or other centralized monitoring environment with one-click configuration. IDIS Center gives users all the essential features they need to centrally and locally manage surveillance operations. These include live video and remote playback, real-time notifications of events, panic recordings, device system logs, and authority access set by individuals or groups. User-friendly interface Plus, its user-friendly interface is not only appreciated by security operatives but also praised by non-specialists, including teaching staff, healthcare professionals, and store managers who regularly need to access surveillance to investigate incidents quickly and efficiently. “Thousands of customers worldwide are benefitting from the low cost of ownership that IDIS Center offers,” Myung adds. “With the ability to register up to 1024 devices, IDIS Center is powerful enough for medium to large sites. It’s particularly beneficial to multi-site retailers that are tasked with the dual challenge of reducing shrinkage while keeping operating costs low.”
Interface Security Systems, globally renowned managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to distributed enterprises, has announced a new strategic partnership with OpenEye, international provider of cloud-managed solutions for video security, business intelligence, and loss prevention. OpenEye – Interface Security strategic partnership The strategic partnership will combine the proven solutions of both companies — Interface’s interactive monitoring service with OpenEye’s innovative Web Services Platform (OWS) — to deliver a powerful remote video surveillance solution with seamless cloud video management to retailers, restaurants, and distributed enterprises. “This partnership brings together the best of breed solutions from the two companies with deep market experience,” says Lee Doyle, Principal Analyst at Doyle Research. “Interface has a powerful interactive video monitoring solution for enterprise customers in the retail, restaurant and hospitality space. Combining that with OpenEye’s very popular and easy-to-use cloud-based video management platform is a great fit for asset management teams looking for a fully-managed and scalable video surveillance as a service.” Enhanced asset protection “Today’s sophisticated asset protection teams demand a broad suite of functionality, and our state-of-the-art interactive monitoring solutions must be supported by an easy to use cloud-based video management platform that gives the customer a full complement of reporting and administrative capabilities,” says Michael Shaw, CEO of Interface Security Systems. Marrying OWS to the Interface solution set makes for a truly potent combination" Michael adds, “Our decision to partner with OpenEye was based on their advanced platform meeting the demands of our enterprise customer base. Marrying OWS to the Interface solution set makes for a truly potent combination. Our customers will benefit tremendously from having a single managed services provider to deliver alarm monitoring, remote video surveillance, video verified alarms, and the supporting network infrastructure with a simple and scalable cloud video management system with one invoice.” 24/7 virtual monitoring Enterprises can now leverage the power of the Interface Central Command Center’s 24/7 virtual monitoring and the ease of use of accessing and managing video on the OWS platform. The combined solution offers several key benefits to enterprises, including: 24/7 advanced video and audio monitoring by life safety experts Real-time intelligence with actionable insights Streamlined investigation capabilities Advanced mobile features for Loss Prevention teams on the go Easy to use Video Management Systems “Our combined solution helps enterprises innovate and stay ahead of the rapidly changing video surveillance needs,” said Ed Solt, Executive Vice President, OpenEye, adding “We’re excited about the successful integration of our offerings and look forward to winning
Hanwha Techwin America, global supplier of IP and analog video surveillance solutions, has announced that Hanwha’s Wisenet L series cameras are now compatible with the Genetec Stratocast cloud-based video surveillance-as-a-service (VSaaS). Through this technology partnership, customers across a broad range of industries will now be able to reap the benefits of an easy to install true-cloud solution whether they want to support hybrid-cloud deployments, add new cameras in remote locations, or serve the needs of small and mid-sized installations in a cost-effective way. Integration with Stratocast cloud-based VSaaS Stratocast cloud-based video surveillance-as-a-service (VSaaS) requires no software installation, port forwarding or network setup, and allows organizations to significantly reduce installation and on-going maintenance costs, making it an ideal solution for sites where IT staff, resources, and budget are limited. To make the enrolment process easier than ever before, customers can simply scan a QR code to bring L series cameras into the Stratocast portal in one simple step instead of logging into multiple webpages. Enhanced cyber security We are offering a solution that is cyber secure, cost-effective and easy to install" "We are pleased that Hanwha is first to market with a Stratocast-ready QR code enrollment option,” said Oktay Yildiz, Product Line Manager for Genetec Stratocast. “At Genetec, we believe strongly in building a network of trusted partners that have our customers’ cyber security best interests at heart. By extending our deep strategic partnership with Hanwha into the cloud, we are offering a solution that is cyber secure, cost-effective and easy to install.” Wisenet L series cameras The Wisenet L series cameras are very affordable surveillance cameras with essential features ideally suited for the needs of small and mid-size installations. The broad line-up includes fixed and varifocal lens, and bullet, dome and vandal-resistant dome cameras that are designed for both indoor and outdoor use. “With the L series now Stratocast-ready, and other camera families soon to follow, we will be offering our joint customers a comprehensive line-up of video surveillance solutions, that satisfy the needs of projects across a wide range of market sectors, from small/medium businesses and retail chains to city-wide surveillance,” said Ray Cooke, Vice President – Products, Solutions and Integrations at Hanwha Techwin America.
PerpetuityARC Training, part of Linx International Group - the world’s renowned provider of accredited security systems training courses, is responding to a surge in demand, for its portfolio of online training courses. The company is experiencing unprecedented international demand from organizations of all sizes, operating across a wide range of sectors, as they look to ensure they have the skills in-house to coordinate their response to the rapidly changing coronavirus (COVID-19) situation. Demand for online training course Director of Sales and Marketing at the Linx International Group, Sarah Hayward-Turton stated, “Even the very well-prepared organizations with extensive contingency plans, based on thorough risk assessments, have been stunned by the scale and speed of the situation we currently face.” Effective risk, crisis & disaster management begins with preparation for the worst case scenario" She adds, “Key personnel off sick or isolated, travel restrictions, offices and stores shutdown, supply-chain issues affected by manufacturing shortfalls, import delays, and panic-buying. These are just some of the issues impacting organizations right now. The scale is unprecedented, but effective risk, crisis and disaster management begins with preparation for the worst case scenario.” Latest methodologies and best practices Hayward-Turton further said, “We are helping small businesses with no continuity strategy, through to large multi-national organizations who want to train more employees on the latest methodologies and best practice, to ensure that expertise resides in-house, to help manage their response to this crisis, as well as being as ready as possible for what the future may bring.” Crucially, the accredited training courses provided by PerpetuityARC Training are available online and all offer CPD points. Courses range from bite-size introductions, through to formal accredited security risk management programmes. PerpetuityARC Training online training courses available now include: Security Risk Management – Learn how to identify threats, risks and vulnerabilities, and create a comprehensive plan that will enable practical measures to be applied to mitigate the impact. Crisis Management & Business Continuity - Learn about risk assessments, how to identify threats, and how to build a crisis management team. Risk, Crisis and Disaster Management – BTEC Level 4 qualification of immediate benefit to those working as security managers, intended to introduce and develop security and risk management to the highest level. The syllabus includes: risk communications, business impact analysis, continuity planning and crisis management, forming and operating a crisis management team, command and control structure and liaison with the emergency services. Managing Security Risk in the Oil and Gas Sector – IQ Level 4 qualification addressing some of the more complex risks associated with the oil and gas industry in a range of environments and examines the risks in upstream and downstream operations. Topics covered include: security risk analysis, corporate social responsibility, human rights, and community management, managing activism risk, managing acts of militancy and terrorism against the oil and gas sector, oilfield and pipeline security, refinery security, maritime and offshore security and downstream (retail security). Hayward-Turton concludes, “Whilst there is no precedent in modern times for the global situation we are facing, there are tried and tested tools, techniques and methodologies that every organization can put in place today that will help.”
Quantum Corporation today announced new product lines and capabilities which significantly expand its video surveillance and physical security product portfolio. The expanded portfolio includes: A new line of network video recording servers A new line of servers for building management systems and GPU-based video analytics New capabilities for the VS-HCI Series, which the company launched in 2019 to provide hyperconverged infrastructure (HCI) for surveillance recording, video management, and building operations. These expanded product offerings add to Quantum’s existing solutions for shared archive storage for surveillance, based on its StorNext® file system and the recently announced acquisition of the ActiveScale™ object storage solutions. The result is one of the broadest security infrastructure solution portfolios available from any single vendor. With new NVR servers, building management and video analytics QuantumCorp offers the broadest security infrastructure portfolio available. New Network Video Recording Server Line These expanded product offerings add to Quantum’s existing solutions for shared archive storage for surveillanceQuantum’s new line of Network Video Recording (NVR) servers complement the company’s VS-HCI Series and are offered in both mini-tower and rack-mounted form factors to provide customers with a range of affordable, reliable, and high-performance options for surveillance recording and video management. Quantum’s VST mini-tower NVRs are designed to support the surveillance of retail stores, gas stations, small buildings and campuses, and other small implementations, while Quantum’s VS4160 NVR is one of the most dense and highest capacity NVRs available for environments with large retention requirements. New Analytics and Application Servers To support the extreme graphics processing and parallel workload demands of video analytics, Quantum has introduced the VS2108-A analytics server. The VS2108-A can be configured with up to six GPUs in a compact 2U chassis and will accelerate results with leading video analytics software platforms. For access control and building management applications that require a highly available architecture, Quantum is introducing a new highly available application server, the VS1110-A. Quantum’s new VS1110-A Enterprise application server utilizes the same virtual machine (VM) failover capability found in Quantum’s VS-HCI series. Like the VS-HCI series, the VS1110-A server can be monitored remotely via a secure web-based portal, enabling facilities managers, integrators and Quantum support to proactively monitor this system anytime, anywhere. Monitor VS-HCI Series Health Remotely via Secure Web-Based Portal To support the extreme graphics processing and parallel workload demands of video analytics, Quantum has introduced the VS2108-A analytics serverQuantum has enhanced the capabilities of the VS-HCI series with secure, remote monitoring via a web-based portal. The Quantum VS-HCI series provides hyperconverged infrastructure for surveillance recording, video management, and building operations. The highly available architecture scales out as video camera counts increase and makes it easy to manage operations by running multiple physical security workloads on a single platform. Quantum StorNext and ActiveScale Storage for Large Surveillance Archives On March 16, 2020, Quantum announced that it had completed the acquisition of the ActiveScale object storage business from Western Digital. Object storage can be used as a tier for multi-petabyte surveillance infrastructure. Video is typically captured and recorded on higher-performance servers, then archived on object storage-based systems. The combination of Quantum’s StorNext file system and ActiveScale object storage can be a valuable solution for shared archive storage in many surveillance environments. Supporting Quotes “The most important message from Quantum to all of our customers and partners during this unprecedented time is that our top priority is the health and safety of our society, our employees, our communities and all of you. Our next priority is to ensure business continuity and site security,” said Jamie Lerner, President and CEO, Quantum. “Video surveillance plays a vital role in securing infrastructure and critical assets, and in protecting citizens. We’ve applied our years of expertise to build a comprehensive portfolio for surveillance, and we are responding quickly to the needs of our customers.” “Kepler Networks customers are on the front line of change in the surveillance industry, and as video surveillance technology has evolved it has placed unprecedented strain on storage,” said Gavin Bortles, President, Kepler Networks. “Customers who adopt intelligent, scalable storage as the foundation of their new surveillance and security system leave more budget for cameras, analytics, and other tools dedicated to protecting people and property.
Focused on Revenue, Knowledge and Branding, whether its profitable new cloud services, specialist ‘how to’ training or simply making a company stand out from the competition, GAP has what a business needs for success. Pyronix has launched their ‘GAP’ initiative, in an effort to help installers and their businesses grow, by working smarter and building their brand. Key areas Providing free tools to make an installer’s business grow faster, GAP focuses on taking a smarter approach to business performance, identifying three key areas: Revenue - ‘Not all clouds are gray’ With an emphasis on providing superior tools for installers, in order to develop and grow their business, with offerings including PyronixCloud, an evolving product range, and additional value-added services; there’s something that all installers can benefit from with GAP. Built with businesses in mind, Pyronix can help installers grow and excel. Knowledge - ‘Knowledge is Power’ Pyronix believes knowledge within the industry is key to being a leader, which is why they devised a knowledge-focused branch of GAP. Focusing on installation and product knowledge, and how installers can gain and use this to their advantage. Enabling them to accelerate ahead of the competition and be the best. Brand - ‘Make Yourself Famous’ GAP guides installers by providing brand focused tools and tricks, to make their brand stand out. Encouraging installers to look at customized products and sales tools, GAP will soon also introduce the new Pyronix Personal Print Portal. Providing a one-stop solution for designing and ordering promotional materials, Pyronix is set to demonstrate the importance of an installer’s brand and presence within the market. Helping installers grow business Laurence Kenny, Pyronix Marketing Manager commented, “This new initiative highlights the additional commitment Pyronix wants to make to installers. We want to help them grow their business and thrive within the industry.” We feel that this is a really positive step towards helping installers of Pyronix intruder systems" “This initiative is flexible and built with several interchangeable drivers, all designed to suit an installer’s business needs, whether they’re an experienced installer or just starting out.” Brand marketing tools He continued, “We feel that this is a really positive step towards helping installers of Pyronix intruder systems, guiding them through multiple aspects for business success, including recurring revenue business models, branding and training elements within their business. This initiative will provide practical tools installers need, to help them go that little bit further and realize their potential.” “We’re very excited to see the uptake in GAP and showcase our revenue, knowledge and brand marketing tools, providing the best platform to both new and existing installer businesses within the industry.” For any installers who would like to develop their brand and business, GAP has the needed tools.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organizers globally have canceled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was canceled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theater offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local /national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Intelligent Light Detection and Ranging (LiDAR) sensors from OPTEX, global sensor manufacturer and supplier, are at the heart of a new security access control solution that is helping to protect endangered elephants at the Mount Kenya National Park in Kenya, Africa. Countering the threat of poaching Mount Kenya is the second largest mountain in Africa, and the UNESCO (United Nations Educational, Scientific and Cultural Organization) listed National Park was established to protect the mountain, which is a water tower for the surrounding area and whose forest reserves and surrounding areas provide refuge for a vast array of wildlife, of which there is a large population of elephants, estimated at around 2,500. Despite the numbers, the animals are under constant threat from poachers Despite the numbers, the animals are under constant threat from poachers. The changing geography of the region and the proliferation of agricultural farms have also resulted in increased incidences of human-elephant conflict, with the elephants causing damage to the fencing and property that surround these farms when trying to re-enter the park. Elephants' access control system Instarect Limited, a security fencing solutions provider based in Nairobi, was approached by the Mount Kenya Trust – a non-profit organization running conservation projects for the forests and wildlife of Mount Kenya – to design and install a new elephant access control system within the three elephant ‘corridors’. The corridors are designed not only to keep the elephants protected but also allow them to re-enter the park safely and securely, without causing any damage to the fencing or farmland. Instarect selected OPTEX’s intelligent RLS-2020 LIDAR sensors as an integral part of the project. Solar powered gates and CCTV cameras installed In conjunction with new solar powered gates and CCTV cameras that have been installed, the RLS-2020 sensors, with a 20x20m detection range, are being utilised to detect the elephants as they approach and automatically open the gate for them. The sensors have been programmed to only detect elephants and will not open for smaller animals or humans. When the elephants trigger a gate to be opened, authorized park rangers are immediately notified via an SMS and are then able to view the CCTV cameras on their phone to check whole herd of elephants have re-entered the park safely. The rangers then send an SMS to close the gate. REDSCAN RLS-2020 sensors The new system is working well, the elephants are very intelligent and have quickly adapted to these new gates" Ebrahim Nyali, Security Solutions Designer at Instarect Limited, says “the new system is working well, the elephants are very intelligent and have quickly adapted to these new gates. They have learned to wait for the gates to open for them to re-enter the park and do not try to enter with force.” Masaya Kida, Managing Director of OPTEX EMEA, says “the REDSCAN RLS-2020 Series provides enhanced detection in even the most challenging environments and easy integration with any video security solution. These sensors are intentionally designed to create customized detection area and set a wide range of target sizes. This flexibility allows it to be used for many different and sometimes unusual applications; the elephant detection is a perfect illustration of that.” Advanced sensor technology Masaya adds, “We are pleased and proud to be chosen to work with Instarect Ltd. on this important project and that our leading sensor technology is helping to protect the elephants & reducing human wildlife conflict around the Mount Kenya National Park”. OPTEX Co., Ltd is a globally renowned manufacturer of sensing technologies for a number of sectors, ranging from security, entrance systems and factory automation to measuring instruments and transportation safety.
While HENSOLDT is a global pioneer of technologies that are designed for protecting armed forces, civilians, assets and borders, the company is also actively making a difference as a protector of endangered species. South Africa is known for its iconic wildlife and is also home to one of HENSOLDT’s largest industrial sites. As a result, it came as a natural progression to protect the country’s wildlife using state-of-the-art defense and security technologies. Rise in rhino poaching In recent years, animals such as rhinos have been under increased pressure due to rising poaching levels, threatening the future of these animals. South Africa holds nearly 80% of the world’s rhinos and has been hit the hardest by poaching, with more than 1 000 rhinos killed each year between 2013 and 2017. HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy HENSOLDT responded to this threat, and is now combining advanced intelligence, radar and optical surveillance systems with physical security for high-end wildlife protection. This week, HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy, where HENSOLDT’s technologies have been keeping a large number of rhino safe. HENSOLDT South Africa designed and installed a surveillance and security system on the farm and since then, not one animal has been lost to poaching. “Before that, we had poaching every month, sometimes every week,” says John Hume, owner of Buffalo Dream Ranch. Situational awareness In 2017, Buffalo Dream Ranch, the world’s largest rhino farm, started a partnership with HENSOLDT to secure 8000 hectares of land, where some 1800 rhinos now live peacefully, protected by state-of-the-art HENSOLDT technology. The specially developed system combines a number of advanced sensors, including optical and radar sensors, to monitor the rhinos, farm and surrounding area. Data from these sensors are fused using advanced analytics at a command and control center to provide complete situational awareness and early-warning of potential poachers approaching the area. In combination with existing physical barriers and a team of security personnel, the system augments the total security approach to create a surveillance solution, with technology that is always on guard, never fatigues and which cannot be compromised. “We are for the first time in years feeling confident, with HENSOLDT, of perfecting the protection of our rhino,” says Hume. Wildlife protection The know-how acquired through these projects can be applied for protecting other wildlife “We are honored to be part of important initiatives such as the conservation of our wildlife and we aim to expand our efforts,” says Hennie Venter, Chief Executive of the HENSOLDT South Africa GEW business unit. The know-how acquired through these projects can be applied for protecting other wildlife and national parks to safe-keep endangered species such as lions, elephants and even abalone. HENSOLDT prides itself on its relationship with its clients. “For us it’s not putting down the equipment and getting the business, for us it’s rather a journey,” says Werner Muller, GEW’s Chief Executive of Spectrum Monitoring and Security. Needs-based solutions Because of this philosophy, and because each wildlife scenario is different, with its own unique set of challenges, HENSOLDT’s experts collaborate with each client to develop a solution that addresses their specific needs. Through its business units, GEW and Optronics, HENSOLDT South Africa delivers solutions to clients across the world, and significantly contributes to South Africa’s export industry, while it is firmly grounded in its roots as a proudly South African company, operating in South Africa for South Africa. HENSOLDT is committed to continue innovating to protect the wildlife.
Upgrading a two-wire analog intercom to a conventional IP video system typically involves messy and costly rewiring work. So what happens when there is a need to install over 500 IP systems into a single building? One company, Hikvision, has developed an innovative two-wire solution, which is already making waves at the luxurious RiverGate condominium in Singapore. “If someone rang the bell at the side entrance, it wouldn’t always ring in my apartment upstairs,” says the Chairman of the Condo Council, who lives at the RiverGate condominium in River Valley, Singapore. “Visitors often had to call me to let them in, and I would have to travel down 20 floors to the main entrance. It became incredibly frustrating.” Switching from analog to IP system The intercoms in Asia’s condos are crying out for an upgrade to IP, but the infrastructure just doesn’t support it" The resident’s story is typical of millions of residents across Asia, where high rise living is the norm. In Singapore, the first condominiums were built back in the 1960s, to tackle the challenge of high population density and soaring land costs. Today, high-rise living in Singapore is not only necessary but highly desirable, with many condominiums offering swimming pools, spas, sky-gardens and a host of other deluxe facilities at exclusive locations across the island. Nevertheless, even the most luxurious apartment blocks are wrangling with aging access control systems. Many systems only work intermittently, while all but the newest builds feature intercoms that use out-dated two-wire analog cabling. “The intercoms in Asia’s condos are crying out for an upgrade to IP, but the infrastructure just doesn’t support it,” says Daniel Han, Engineering Director at Serron Technology. Hikvision IP security systems Making the move to IP intercom systems is a logical step, as it would offer a host of benefits to Asia’s high rise residents. First of all, IP systems are video-based and can work with HD cameras, giving homeowners crystal clear images of who is at the door potentially dozens of floors below. What’s more, they also typically link to an app, so residents can see and interact with the person at the door – even when they’re not in the apartment. “Video IP systems are much more functional, more future-proof, and incredibly reliable,” adds Daniel. The problem is, most of today’s IP intercom systems typically need to replace wire for an internet connection – and that means an upgrade to the building itself. “To upgrade to an IP system across a whole condominium is a massive job,” Daniel confirms, adding “Chasing out walls and replacing wiring is disruptive, messy and a time-consuming task. In addition, the task is also expensive, and management companies would have no choice but to pass this cost on to the residents." Two Wire IP Video Intercom System Although it may seem like an impossible problem, one company – Hikvision – has provided an excellent solution. As its product name suggests, the company’s Two Wire IP Video Intercom System is purpose-built to work over existing two-wire cabling, so that two wires supply power and transmit voice, video and control signals at the same time. At the heart of the Hikvision two-wire system is the Two-Wire Video/Audio Distributor (DS-KAD706). It’s this intelligent box that makes the two-wire solution possible by consolidating power and internet connectivity, enabling it to be distributed out to the external door video stations and the indoor video units. Hikvision two-wire solution Each of the 545 apartments within RiverGate has a Hikvision Intercom Indoor station with a video screen At Singapore’s luxurious RiverGate Condominium complex, the management team was so impressed with the potential of the Hikvision two-wire solution that they have already installed it into the condominium. Each of the 545 apartments within RiverGate has a Hikvision Intercom Indoor station (DS-KH6320-WTE2) featuring a video screen, while each of the entrances to the building has a Video Intercom Door Station (DS-KD8102-V) featuring an HD camera. If someone calls an apartment via a door station downstairs, it rings the appropriate indoor screen. The resident can see the visitor and have a conversation with them, before letting them in with a simple tap of the screen. Hikvision Video Intercom Master Station (DS-KM8301) The RiverGate central management offices also have the Hikvision Video Intercom Master Station (DS-KM8301), to monitor the building perimeter and control entry. Plus the complex has installed a number of Hikvision’s Waterproof and Vandal-proof Card Readers (DS-K1104M), to ensure that only authorized individuals can move around the building. What’s more, by downloading the HikConnect app, residents can be alerted to a visitor when they’re away from the video unit, or when they’re out of the premises entirely. The app offers the same functionality as the video screen – allowing residents to see visitors, speak to them, and even choose to let them into the building. Reliable and innovative IP-based solution The benefits of the new Hikvision system are far-reaching. From a building management perspective, the ability to use the existing two-wire system has kept installation costs to a minimum. The ability to use the existing two-wire system has kept installation costs to a minimum “Hikvision’s Two Wire Video Intercom System is a state-of-the-art product, and ideal for retrofitting and modernizing large residential and office building projects. Across Asia, there are thousands of high rise buildings whose access control systems desperately need upgrading. This sleek system provides a cost-effective and elegant IP-based solution – one that’s ideal for high end residential or commercial environments – for minimal cost and disruption.” said Jacky Xie, the Project Manager at Hikvision, who is very optimistic about the potential of the company’s two-wire IP solution. High-performance video and access control system And of course, it’s had a huge impact on RiverGate’s residents. One of the residents’ of the Condominium said, “The new intercom does more than the old system. I particularly like the functionality of mobile app – I can use my phone to let visitors come in even when I don’t have access to the indoor device, like when I’m not at home or using the bathroom. It’s also such a relief to have an access control system that works reliably. I love it; it’s more convenient, it’s really easy to use, and I feel safer.”
The State of Illinois has enacted a ‘stay at home’ order effective as of Saturday, March 21, at 5pm to curb the spread of the COVID-19 coronavirus. This means all residents are mandated to ‘remain at home’ and only essential businesses may remain open to provide critical services. Everybody fully supports this measure as it will hopefully slow the spread of the virus. Securing critical infrastructure Under the order, Illinois Gov. J.B. Pritzker has mandated that all Illinoisans stay in their homes except as needed to maintain continuity of business critical operations. This coincides with Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience that advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. BCD plays an important role in the information technology sector. The sector's complex and dynamic environment makes identifying threats and assessing security vulnerabilities difficult and requires that these tasks be addressed in a collaborative and creative fashion, especially as it directly affects both the public and security infrastructure.BCD plays an important role in the information technology sector Working with security integrators and OEMS In addition, it is imperative to maintain the supply chain in this unprecedented time of need. They work hand-in-hand with a number of security integrators and OEMs that work directly with the Federal Government. Most importantly, they supply life safety equipment that is used by first responders to help and keep them safe. Therefore, BCD Illinois build centers will remain open and operational, as the support technicians and engineers will remain available to continue to support all customers to fulfill the critical technology needs of the nation’s federal, state and local governments, healthcare facilities, and education, industrial and financial services sectors. It has also been notified that all shipments to US States currently in "stay at home" status may be delayed by the freight carriers; this includes the State of Illinois. BCD build centers Jeff Burgess, Chief Executive Officer (CEO) at BCD said, “We continue to implement strict precautionary measures in all our logistics and integration centers, in accordance with government and public health requirements, to reduce risk for colleagues who are performing their duties. Our Illinois-based technical operations will continue as long as we can confidently protect the health and well-being of these dedicated two dozen team members. All other BCD staff will continue working from home until further notice.”
AI technology solutions firm, Athena Security is rolling out a line of artificial intelligent thermal cameras, which will be critical in the coming weeks. Containing Covid-19 spread With voters congregating at the primary polls in three US states, exponential spread of the Coronavirus (Covid-19) is inevitable. The infected voters, many of whom will be ignorant that they have the contracted the virus, will spread it to countless others. In the coming weeks, those infected with the virus will need full awareness of their state of health to prevent further spread of the infection. High-tech AI thermal cameras AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus Taking into consideration that high temperature is one of the first symptoms of Coronavirus (Covid-19) infection, these high-tech AI thermal cameras can be life-saving by giving instant warning to the person that they could have the virus and encouraging that person to take serious steps to self-quarantine immediately. Although many voters are bound to contract Coronavirus (Covid-19) when casting votes, steps taken in the coming weeks could prevent those infected from spreading it to loved ones and strangers alike. Some details surrounding the AI thermal cameras include: The cameras capture video accurately within 1/2 a degree They detect 12 different points on the body These cameras are perfect for mass congregation locations, such as airports, grocery stores, hospitals and voting locations The AI thermal cameras are ‘Ethical’ and feature no facial recognition or personal tracking Athena Security is the first A.I. technology company to accurately detect guns to mitigate mass shootings back in 2018 The first deployment of the AI thermal cameras is in Austin, Texas, USA
Link11, renowned European firm in the field of cyber-resilience and cyber security, is offering its DDoS protection solutions free of charge to public sector health, government and public education organizations during the highly contagious phase of COVID-19. Public sector organizations are particularly vulnerable to cyber-attacks, and the availability of critical public infrastructures is more important than ever as people look for genuine sources of information related to the virus outbreak. Remote working policies Governments all over the world have taken necessary actions to lower COVID-19’s spreading curve, including implementing remote working policies, resulting in significant growth in internet traffic, leading to an increased risk of social engineering, business email compromise, ransomware and DDoS attacks. According to Link11’s research, during the three-week period Monday 17 February to Monday 9 March, Link11’s Security Operation Center (LSOC) defended 20,349 minutes of attacks (over 2,860 hours), which is more than 30% up compared to the 15,612 minutes of attacks mitigated during the same period in 2019. Link11 Cloud Protection Platform Marc Wilczek, Chief Operations Officer (COO) of Link11 said, “It takes only a small effort these days to overload servers and online services, and organizations need to protect their infrastructures. To help them deal with the evolving threat landscape, Link11 is offering government, public health and education organizations a solution that proactively identifies, blocks, and mitigates DDoS attacks within the Link11 Cloud Protection Platform, free of charge until September 2020.” Link11’s integrated Cloud Security Platform ensures cyber-resilience of the entire IT infrastructure On Sunday 15 March, the U.S. Department of Health and Human Services (HHS) suffered a cyber-attack, designed to slow the agency’s services amid the government’s rollout of a response to coronavirus, with the aim of overloading HHS servers. Officials assume a hostile foreign actor was behind this campaign. Cloud-based DDoS protection Traditional on-premise DDoS defenses, which are still widely used, and load-balancing products, are not able to protect individual websites, APIs or cloud applications against Layer-7 attacks, as these malicious data tsunamis can create big damage with little total bandwidth, bringing everything to a standstill instantly. Cloud-based DDoS protection, such as Link11’s integrated Cloud Security Platform, uses artificial intelligence, machine learning, strict automation and real-time analytics to ensure cyber-resilience of the entire IT infrastructure and application landscape supporting hybrid as well as cloud-native deployments.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals