Network / IP security
A user’s ability to meet customers’ security needs relies heavily on the manufacturer that the user chooses. There are many new privacy laws going into effect — is the user’s control panel manufacturer able to keep up with the changes? California’s Senate Bill 327 became a statewide law on Jan. 1 as did Oregon's House Bill 2395. To address cybersecurity laws like these, DMP has released new firmware updates for its family of control panels. Added security feature...
The automatic or semi-automatic analysis of data plays an increasingly important role in video security technology. Here, the image quality is decisive for the result of the analysis. At the GPEC 2020 trade fair, Messe Frankfurt, Europe's closed specialized exhibition for police and security authorities, from 18 to 20 February 2020, Hall 11, Booth E068, the German manufacturer of video information technology Dallmeier will show visitors how they can implement future-proof video analysis applicat...
Element AI, a global developer of AI-powered services and software that helps enterprises operationalize AI, announced the general availability of its Access Governor product, the addition to the company’s growing portfolio of AI software solutions. Drawing on the end-user’s historical data, Access Governor analyzes, recommends and manages the most appropriate information and location access rights for large groups of employees, so they can efficiently complete their jobs. The produc...
VIZpin, designer and manufacturer of the VIZpin smartphone-based, Bluetooth enabled access entry system, has recently announced the addition of Rui Manuel Barreira to its executive leadership team. Barreira joined the Lancaster, PA-based company in the role of vice president of technology. Barreira will be responsible for managing VIZpin’s global engineering and product teams, execute VIZpin’s product strategy and expand VIZpin’s patent portfolio. He will also develop and mana...
In a world increasingly exposed to technology-based cyber security threats, the global insurance industry is well-positioned to play a greater role in rewarding those organizations that take cyber security seriously and have standard solutions in place to counter them. This is the call from globally renowned cyber analytics company, CyberCube in a report timed for release to coincide with the World Economic Forum annual meeting in Davos, where its chief executive is participating. Cyber securit...
RS2 Technologies, a provider of advanced access control solutions, will host its 2020 Annual Conference on Feb. 11-14, aimed at strengthening its relationships with existing partners and introducing the company’s latest technological advancements. The conference theme, “Set Sail for Sales”, encompasses the event’s goal of setting up RS2 partners with the tools, resources and information they need to be successful now and in the future. For more than 10 years, RS2 Technolo...
Optronics expert, HGH Infrared Systems announces the launch of its new tagline, Enlighten the Unseen as the company grows and harmonizes its global brand. The new positioning reinforces HGH’s one-stop company model for wide area surveillance, industrial thermography and infrared - visible test and measurement applications. Global branding harmonization US subsidiary Electro Optical Industries updated its logo to reflect its HGH Group association The HGH Group began worldwide brand harmonization efforts in March 2019 in order to strengthen the company’s identity, while expanding its high electro-optics market position with innovative high-tech products and services. Asia Infrared Systems, HGH’s subsidiary in Singapore, has been a marketed HGH brand for nearly a year. In alignment with this current brand harmonization promotion, US subsidiary Electro Optical Industries updated its logo to reflect its HGH Group association. “As part of our global branding harmonization, HGH’s new brand signature is a result of an internal survey in which employees made suggestions to express HGH’s vision. It was important to strengthen employee engagement in the building of the HGH Group,” said Thierry Campos, HGH Group CEO. High performance electro-optical devices Jeffrey Anderson, Electro Optical Industries Inc. General Manager explains, “Enlighten the Unseen demonstrates our unique position, not only as the optronic expert of optical scenes, but also in how we do business, with passion and innovation.” HGH Infrared Systems’ innovative culture and desire to provide unique market solutions drive an increased product research and development investment. “Enlighten the Unseen reinforces the Group’s commitment to deliver innovative, high performance and reliable electro-optical devices, to better serve our customers today and in the future,” added Vincent Leboucher, HGH Deputy General Manager. HGH Infrared Systems will impart Enlighten the Unseen across all its markets in 2020.
After extensive cooperative research and development between the two companies, Point Blank Enterprises and First Tactical are pleased to announce the launch of the public safety industry’s first-ever fully integrated apparel and armor line, the V2 Pro Performance System. This innovative solution allows law enforcement agencies to purchase a fully-integrated system featuring the V2 Pro-Performance armor carrier with NIJ compliant ballistics, shirt and pants. The innovative V2 Pro-Performance material is lightweight, breathable and engineered for on-the-job comfort with fabrics that are stain resistant and maintain a professional look no matter the conditions. When it comes to safety, performance and professional functionality – nothing else compares. Body armor systems Point Blank and First Tactical will introduce a line of integrated products desperately needed by public safety professionals First Tactical opened in late 2015 and has been steadily growing in the industry since. Founded by Dan Costa, a proven industry pioneer, First Tactical strives to meet the needs of public safety professionals with new, innovative ideas in apparel, footwear and accessories. Point Blank Enterprises is currently the premier source of body armor systems in the world, with 45 years of experience providing innovative personal protection products to the public safety community and military. Together, Point Blank and First Tactical will introduce a line of holistically integrated products desperately needed by public safety professionals. These products shall be designed with Officer Safety as the priority along with the quality and image of the personnel being in the forefront in today’s demanding environment. Ballistic options will include over thirty NIJ certified solutions, including Alpha Elite armor which is worn by more Officers today than any other package in America. Personal protection equipment Michael Foreman, Executive Vice President at Point Blank Enterprises said, “As the leader in personal protection equipment we continue to lead the way in providing public safety personnel the latest design and highest level of protection at the lowest possible weight. The creation of the V2 Pro-Performance System will provide for the next generation integrated system that will maximize protection, optimize wearing comfort, and promote the image of public safety personnel today and into the future.”
The rise of DIY home security is driving traditional vendors to pursue new growth strategies. Recent activity at ADT exemplifies how firms that have historically focused their business on professional monitoring are expanding to offer their own branded security equipment that users can monitor themselves without having to sign a long-term contract – a key to competing with firms like Amazon, Nest, and SimpliSafe. Freedonia’s newly published Safety & Security Alarms explores the impact of these and other trends on the $4.5 billion US market for safety and security alarms. Carbon monoxide alarms ADT has invested significantly in recent years to adapt to the evolving home security market. In 2017, for example, the company introduced ADT Canopy – which could equip any number of DIY devices with ADT monitoring services for a monthly fee – then partnered with Samsung and other innovators in the smart home space to integrate ADT systems with various IoT platforms. Now the company is expanding its brand to encompass DIY security equipment as well as professional monitoring: By introducing its own brand of DIY security equipment – Blue by ADT – ADT can continue to leverage its strong reputation in monitoring services while attracting new customers – such as price-sensitive millennials and baby boomers – with lower cost, entry-level DIY products. The inaugural equipment includes a video doorbell, an indoor camera (which can also detect sounded smoke/carbon monoxide alarms), and an outdoor camera – a similar lineup to ADT’s competitors in smart home security. Life safety alarm systems Safety & Security Alarms analyses the US market for life safety alarm systems (smoke, fire, and carbon monoxide detectors), intrusion alarm systems, and personal emergency response systems (PERS) by application (local, central station, and direct connect) and market. Historical demand is presented for 2008, 2013, and 2018, with forecasts for 2023. The study also includes insights gleaned from Freedonia’s proprietary consumer surveys, as well as comprehensive analyses of crime rates and perceived crime risk, regulatory environment, new technologies impacting the market, and corporate activity, including the effect of new market entrants on the activities of established players.
GlobalPlatform, the standard for secure digital services and devices, alongside prime sponsor Oracle and supporting sponsors STMicroelectronics and Able Device, is hosting a free technical workshop in Nuremberg on Thursday February 27, 2020. The full day workshop will educate delegates on the value of Secure Elements (SEs) to secure and enrich the deployment of Internet of Things (IoT) devices. Workshop on Secure Elements (SE) The workshop offers project managers, security experts, product suppliers, technical consultants, developers and systems integrators an opportunity to gain insight into why SEs can add value to IoT devices and how they can be quickly and cost effectively integrated to offer Root of Trust services. Beginning with an overview of the SE itself and the latest SE technologies for IoT, the workshop will be focused on use cases and demonstrations which expose key IoT security and implementation challenges and how the SE can be used to solve them. Integration of connected devices into our everyday lives emphasizes the need for standardized security platforms" “The increasing integration of connected devices into our everyday lives emphasizes the need for standardized security platforms on which innovation can thrive,” comments GlobalPlatform Executive Director Kevin Gillick. “The free technical workshop is an unparalleled opportunity for anyone involved in the deployment and management of IoT devices. Delegates will gain first-hand insight into the technologies themselves and be exposed to real use cases for how the SE can solve IoT security implementation challenges for any device.” SE technology and use in IoT devices The workshop will be presented by GlobalPlatform Technical Director, Gil Bernabeu, alongside Oracle’s Senior Director of Java card, Calinel Pasteanu. The opening two sessions will include an introduction to SE technology and its uses in IoT. Oracle will offer an in-depth overview of how Java Card technology, as an open and standards-based application engine, delivers security and connectivity services to suppliers of IoT devices and solutions. The final session will focus on use cases for multi-cloud authentication and secure communication using Java Card, onboarding technologies, attestation and chip to cloud data protection. For many of these cases, a demonstration and / or source code explanation will be shared. The workshop is scheduled at a time and location that will be convenient for those attending Embedded World.
TE Connectivity Ltd., a globally renowned provider of connectivity solutions and sensors, has been named to FORTUNE magazine's List of the World's Most Admired Companies for the third year in a row. The annual survey, conducted by FORTUNE and Korn Ferry, is given to top executives, directors and financial analysts to identify the companies that enjoy the strongest reputations among their peers and across industries. TE Connectivity was ranked fifth in the electronics industry. TE Connectivity TE's teams globally innovate products that are integral in making all of our lives safer and more sustainable" "TE's teams around the world innovate products that are integral in making all of our lives safer and more sustainable, as well as more productive and connected," said CEO Terrence Curtin. "I am proud that we have once again been recognized by business leaders across industries and geographies and I am appreciative of the work of our global teams for their continued dedication to our customers and our purpose." TE Connectivity helps customers in approximately 150 countries create the technology of tomorrow in industries including transportation, aerospace, industrial applications, medical technology, energy, data communications and home appliances. Separately, FORTUNE honored TE Connectivity last year by ranking the company fourth on its 2019 Change the World list for its technological contributions to medical devices used for minimally invasive procedures. World's Most Admired Companies list The World's Most Admired Companies list is the definitive report card on corporate reputation. To compile the rankings, corporate reputation and performance are measured against nine key attributes: innovation, people management, use of corporate assets, social responsibility, quality of management, financial soundness, long-term investment, quality of products and services, and global competitiveness. TE Connectivity is a global industrial technology solutions firm, involved in creating a safer, sustainable, productive, and connected future. Their broad range of connectivity and sensor solutions, are proven in the harshest environments, enabling advancements in transportation, industrial applications, medical technology, energy, data communications, and the home.
Matrix Comsec has confirmed its participation in the 28th Convergence 2020, to be held in the Pragati Maidan, New Delhi from 19th - 21st February 2020. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and new portfolio of IP Communication endpoints. Matrix is well-known for its indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attendance. Software-based communication solution Each of the company’s solutions is specifically designed for large, multi-location enterprises, SME and SMB organizations. Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Telecom solutions at the 28th Convergence 2019 Meet. Matrix is all set to showcase its latest Telecom and Security solutions at Convergence this year" Matrix is going to unveil ANANT UCS at the event. ANANT is an enterprise-grade high capacity, high durability, high scalability and high efficacy software-based communication solution. It connects all the employees on a single platform. It offers a range of enterprise grade calling features that improves employees’ productivity and speeds up the decision-making process. With an in-call redundant system, ANANT UCS boasts of providing the best customer engagement. Know more about this hardware independent solution at Convergence 2020. Network Video Recorders Products and Solutions at Convergence 2020 - Matrix range of Media Gateways - Based on SIP (Session Initiation Protocol), these Gateways allow easy integration with most of IP-PBX, TDM PBX, Soft switch and Hosted solutions. Award winning series of Matrix Gateways are perfect for enterprise and carrier-class solutions. Starting from a single port VoIP adaptor to high density VoIP-GSM-PRI-FXO/FXS Gateways, Matrix has one stop solution for every business needs. Matrix NETRA series of 5MP, 3MP and 2MP IP Cameras – offer superior image quality along with True WDR, Intelligent Video Analytics and Edge Recording. Matrix PARAM series of NVR – Network Video Recorders offer High Resolution Recording, Live View of Multiple Streams, Centralized Monitoring without a server, Powerful Investigator and Instant Notifications. User identification algorithm Matrix Face recognition - Matrix has revolutionized authentication technology by introducing Face Recognition which provides a great and effortless user experience. Matrix COSEC Face Recognition is based on innovative and deep learning technology with a powerful user identification algorithm that identifies users accurately within no time, even in challenging environmental conditions. “Convergence India is a major technology event bringing ICT professionals on a common platform. Matrix is all set to showcase its latest Telecom and Security solutions at Convergence this year. We look forward to meeting key decision makers and service providers and give them first-hand experience of our Telecom solutions that are redefining business communications and providing a competitive advantage to our customers worldwide.” said Vihar Soni, Marketing Manager, Matrix Comsec.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorized personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognizing the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorized person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorized users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandalism to SMB is around $3,370 per incident (US Small Business Administration), including a staggering 692 vehicle vandalism claims per day. Likewise, the average cost of theft to SMB is about $300 per shoplifting incident and $1,500 per employee theft incident, which accounts for 38% and 34.5% of all theft instances, respectively (National Retail Security Survey). High-performance artificial intelligent systems can automate the monitoring tasks Vandalism and theft have proven time and time again to be inconvenient and deconstructively harmful towards SMB. However, these financial burdens can be prevented with the use of the right security system. AI-based security systems with Deep Learning contain many features that many SMB owners find advantageous in their pursuit to stop unwarranted and unwanted money loss. Intrusion and loitering detection The first of many features that can help with vandalism and theft prevention is Intrusion Detection. High-performance artificial intelligent systems can automate the monitoring tasks for high-risk sites to provide a high level of security and security personnel monitoring efficiency. Traditional intrusion detection systems detect objects based on size and location, but they do not recognize the type of objects. Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreases the false-positive intrusion rate. The more advanced AI-based systems, like those we offered at IronYun, enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Advanced loitering detection software as such can detect and trigger real-time alerts for both people loitering and/or vehicles that are illegally parked in certain areas of interest. A benefit, which only certain advanced systems contain, is the ability to send trigger actions to 3rd-party systems in reaction to receiving an alert of loitering and/or intrusion detection. These trigger actions can be set to contact authorities immediately and/or trigger a scare tactic alarm or announcement to intruder/loiterer. Certain Face Recognition and License Plate Recognition software can record individual people/vehicles Face and license plate recognition In addition to the activity detection solutions, certain Face Recognition and License Plate Recognition software can record individual people/vehicles and use pre-configured lists to identify particular faces or plates that may be of interest, such as those in watchlists. These systems can also enable the users to upload images of faces not in the lists and search for them in the camera recording. For instance, if a person is detected several times loitering outside a store, one may save one of the detection photos into the watchlist, and set up an alert when said face is recognized again outside the building in the future. The alerts will help to deter and prevent vandalism or theft, and notify the authorities to the scene before the troublemaker completes the act. The main attributes of high-performance Face Recognition systems which maximize assistance with vandalism and theft management include: Face match rate > 90% with good camera angles and lighting. Processing multiple streams and multiple faces per image. Live face extraction and matching to databases of thousands of faces within 3 seconds. State-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras If the watchlist individual is wearing a mask or their face is not in view of the camera, their license plate may be a good indicator. If a particular car is detected several times loitering in the parking lot or street outside a store, the user can set the alerts for such car to get notified in the future. With an AI solution like this, common street cameras should be equipped with LPR capabilities. So, state-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras. high-performance alert mechanisms A high-performance AI solution, in addition to having high accuracy, should be able to: Easily integrate with 3rd-party systems Work well with all ONVIF IP cameras including infrared and thermal ones (for Intrusion detection) Analyzes video streams in real time and trigger alerts within a few seconds Send alerts to multiple VMSs, connect with signaling devices such as loud speakers or flashing lights Send email notifications to security staff and police departments Send notification on mobile device using AI NVR mobile app Maintains a record of all alerts to provide evidence of intrusion and loitering instances for police and insurance agencies. To assist in theft and vandalism prevention, AI-based security systems with deep learning will do all of the tedious work for you. Their low cost and high performance also make them the most accessible security solutions in the market with large return on investment. Stopping crimes is a difficult, ongoing challenge, but with the right AI software, business vendors and police departments can do so with more ease.
It seems that only a few days pass between cyber security stories of concern to the public such as personal data leaks and DIY home camera hacks. With this in mind and the need for increased connectivity, the industry is in need for guidance in cyber security. 2020 is set to be a year of change for the physical security industry. Here are the top four predictions to stay head of market trends in the year ahead. 1. There will be more clarity for installers about industry-standard for cyber security The professional security industry will next year see the launch of a new set of cybersecurity guidelines Through the work being conducted by the BSIA Cyber Security Product Assurance Group (CySPAG), the professional security industry will next year see the launch of a new set of cybersecurity guidelines. This will provide the industry with the guidance and clarity that is currently missing. A key area of clarification is the chain of responsibility. It is not just the responsibility of the manufacturer to keep everything secure from a cyber-perspective. The whole supply chain is responsible - once a product leaves the lab where they’re manufactured, conditions change. Those who maintain, install and operate the product have a shared responsibility to ensure that a product or system remains cyber secure. As the sector develops and more cyber-enabled products become available to the market, this cyber security approach will become more important, and a key differentiator to the DIY market, which can only be a good thing. 2. Cloud and 4G connectivity are giving end-customers better physical security The percentage of panels connected to cloud services is now increasing every year Manufactures have been producing cloud-ready products for several years. Initially, not all installers had been taking advantage of benefits of cloud-connected panels, however the percentage of panels connected to cloud services is now increasing every year. Trust and education have improved, meaning that installers and end-users have realised that connectivity is positive, enabling consumers to check on their properties remotely and allow installer to remotely support their customers. However, one area of constraint has been the dependency on customers networks which may, or may not, offer the level of performance that a robust and resilient security system demands. With the introduction of mobile data connectivity to connected products over the past few years, and as connectivity becomes more widespread across physical security products there will also be a greater shift toward mobile technologies such as 4G, either as a back up to a router connection or for complete network independence. 3. Connectivity is changing the way installers work Installers are a vital part of the chain of when a new alarm system is fitted into a property Installers are a vital part of the chain of when a new alarm system is fitted into a property, providing both installation and maintenance services. Traditionally maintenance activities have always been delivered on-site. With the increased ease of connectivity for security systems and the advancements in how these systems are used, installers are provided further opportunity to enhance customer service around the delivery of maintenance. It is no longer a requirement to have a customer wait until an engineer can attend a property to remedy a fault, as many can now be addressed within minutes from any location in the world. This ability allows installation businesses to focus their engineers on more critical tasks while delivering an overall higher level of customer service. Indeed, some installation businesses are moving to a model of having dedicated remote support engineers in addition to the road-based team. 4. Manufacturers are ready for IP-only alarms, ahead of the 2025 analog switch off The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 as part of the move to Next Generation Networks, ending the use of analog phone lines and moves communications technology into an all IP-only space. Although some service providers have indicated that there may be some type of initial PSTN simulation, those providers that are doing this are also making it clear that this is only a temporary solution. The switch off will be a huge change for the security industry. Where heritage, analog alarm systems are in use, installers will need to plan to reconfigure existing systems to use the temporary PSTN simulation functions (where available) or upgrade systems to an all IP solution. Although 2025 feels a long way off, installers and end-users need to start planning now and taking the necessary action. In our sector, manufacturers are ready for IP-only alarms through the provision of cloud-based solutions and the use of techniques such as SIA IP for ARC monitoring.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialized than in most other areas of business and commerce. Data capture form to appear here! The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organizations that can offer expert advice, gained through their knowledge of design and manufacturing security products. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The special requirements of the banking sector These supplier organizations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. Typically, these venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the image plane of the surveillance camera. Dramatic differences between light and dark areas complicate the ability of video cameras to view someone standing in the shadows. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Data capture form to appear here! A new network architecture When upgrading a bank’s digital security system, a new network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Servers, networking and workstations provide enterprise-quality performance for all financial projects Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations is now possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A new software platform helps banks and credit unions simplify, modernize, and automate security, surveillance and fraud investigations across their enterprise. The platform eases the daily challenges security investigators face. It simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyze data. But these solutions are typically complex to use and manage. Investigators must turn to innovative security tools to be able to swiftly locate and analyze data Changing work environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customizable system that enables staff to carry just one card on site. Read part one and part three of our banking security mini series.
The prestigious Jewel complex at Singapore’s Changi Airport is receiving the highest standards of perimeter protection, thanks to the manufacturer of road blockers, bollards and vehicle barriers, ATG Access. Singapore's Changi Airport, which has scooped the title of the world's best airport for seven years running, has strengthened its position with the launch of Jewel – a mixed-use, lifestyle hub for visitors. Taking more than four years and $1.25 billion to build, Jewel covers 1.46 million square feet and includes sky gardens, the world’s largest indoor waterfall, aviation lounges, restaurants and over 300 shops. The extension to Changi Airport aims to position the facility as a leading, competitive, and safe international airport for its millions of visitors. As such, it needed the very best in perimeter security. Tested lift-out bollards In order to meet client specification, ATG worked with its local partner in Singapore to test and certify the lift-out product As the main airport site is fully operational 24/7; the security measures placed around the terminal needed to be installed quickly and effectively. With this in mind, ATG Access utilized its reputable shallow mount technology, which delivers maximum security with minimum disruption. More than 1,000 impact-tested Shallow Mount Bollards and Shallow Mount Lift-out Bollards, requiring a foundation depth of just 112 mm, were deployed around the airport. To ensure the security products complemented the aesthetics of the terminal and surrounding areas, they were coated in varying shades of silver to suit. In order to meet client specification, ATG worked with its local partner in Singapore to test and certify the lift-out product, meaning it was one of the first impact tested lift-out bollards in the industry. Critical national infrastructure Following this, all of the products were developed at ATG’s manufacturing facility in Singapore. Gavin Hepburn, Managing Director at ATG Access, said: “With over 66 million passengers traveling through the airport each year; the new and iconic Jewel project required outstanding perimeter security measures to protect the asset and its passengers. Changi airport has taken its security very seriously over the last eight years, ensuring all terminals are protected from potential terrorist attacks or security breaches - after airports have been identified by security services as critical national infrastructure. This project has been our third biggest perimeter project to date, after Hamad International Airport Project (Doha) and Jubail Industrial Project, KSA, and we are proud to have been selected as their security provider.”
Allot Ltd., globally renowned provider of innovative network intelligence and security-as-a-service solutions for communication service providers and enterprises, has announced that Altice Portugal’s MEO, the country’s largest fixed broadband and mobile service provider, has chosen Allot Secure, a unified Security-as-a-Service (SECaaS) solution to protect the company’s mobile users against a broad range of cyber threats and to provide parental control both on and off-network. Allot NetworkSecure security platform Allot Secure solution is a first-of-its-kind multi-layered platform that integrates network-based and endpoint security The Allot Secure solution is a first-of-its-kind multi-layered platform that integrates network-based and endpoint security. The Allot Secure solution to be implemented by MEO includes the Allot NetworkSecure mass-market network security platform, coupled with endpoint security provided by Allot EndpointSecure. The combined solution enables rapid mass-market user onboarding for cyber security that will protect MEO users anytime and on any network. Subscribers to the Allot cyber security solution will pay a monthly fee which is shared between Altice MEO and Allot. Protection against cyber security threats Enabled by the unified Allot Secure solution, Altice MEO will offer its customers a security service to protect them against emerging cyber security threats, including malware, phishing, ransomware and crypto-mining. Traditional security add-on solutions offered by operators never gained much traction because they rely on customers to install the protection themselves. Allot unified network-based and endpoint cyber security delivers effortless, device-independent end-user security, making it easy for operators like Altice MEO to deliver these security services directly to customers. Allot has reported that other telecom customers have achieved double-digit penetration rates with Allot Secure. Network and data security NetworkSecure, part of the Allot Secure solution suite, is a globally renowned company in the growing network-based, mass-market cyber security category, protecting more than 23M subscribers globally. Coupled with Allot consumer marketing services, the NetworkSecure solution has been proven to achieve penetration rates up to 50%. “Our millions of mobile users are in need of a proven and hassle-free security solution,” said Tiago Silva Lopes, Director Consumer Products at Altice Portugal/MEO. “With this in mind, we selected Allot to offer a mobile service that cannot be bypassed and removes the burden from our customers by protecting them wherever they are. This solution also enables parents to be worry-free about how their children are using their devices.” Unified Allot Secure solution “Altice MEO required a mature, unified solution that combined network and endpoint cyber security for their customers,” said Hagay Katz, VP Strategic Accounts, Cyber Security at Allot. “Our unified Allot Secure solution is a perfect fit. With our revenue sharing partnership, MEO can maximize their ARPU while strengthening their brand and increasing loyalty.”
When Swinkels Family Brewers wanted to unify its access control internationally, it chose AEOS, which enabled this producer of world-famous Bavaria beer to design a system around the people using it. The facts & figures : 6 breweries 27 brands 130 countries 1,800+ employees Swinkels Family Brewers had grown quickly and needed to review its security and apply more stringent measures. It was using two access control systems and wanted to unite everything on one platform. Most importantly, Swinkels Family Brewers wanted a system that would match its people-first approach, and provide the flexibility to adapt and scale in the future. New security policy Initially, Swinkels Family Brewers established a cross-department project group, which developed a new security policy. With that in place, the project group identified AEOS as the system to meet its long and growing list of requirements. During the planning stages, they consulted department managers on their needs. And before AEOS was implemented they ensured their people knew what to expect and why the change was happening. Key benefits: The system is designed around the people using it. Security is stronger but there’s a welcoming sense of warmth and openness. One unified system fulfills all access control needs. Several systems are linked to AEOS and updates transfer automatically. Flexibility to easily add new functionality, such as video monitoring, or scale the system. Impressed with the stability of AEOS Stefan Fehlhaber, Facility Manager at Swinkels says: “We’re very impressed with the scalability, stability and robustness of AEOS. It’s very practical to use in daily life and is easy for our security people to operate. It’s also very convenient for our employees to be able to use one badge at different locations.”
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
Videonetics has supported Nagpur in achieving the Smart City status, under the Smart City Mission of Government of India, by securing its roads with an AI & DL powered Intelligent Traffic Management Solution. The solution has helped the city to solve its traffic enforcement problems such as red light jumping, crosswalk/ stop line violations, over speeding violations, tracking of suspect/ stolen vehicle, and generating e- challan/ e ticket for violators as per the Motor Vehicles Act. It includes applications like Automatic Number Plate Recognition (ANPR), Red Light Violation Detection (RLVD), Integrated eChallan Management Software. With the successful implementation of the solution, Nagpur has witnessed greater traffic discipline and substantial decrease in traffic violations. More efficient traffic management has helped the city achieve its Smart City objectives. Intelligent Traffic Management System Nagpur has witnessed a rapid rise in the number of vehicles, and also in traffic violations and road accidents Over the last few years, Nagpur has witnessed a rapid rise in the number of vehicles, and also in traffic violations and road accidents. The city administration recognized the need to enhance road safety, and the traffic police department sought a solution that would act as a true decision support system to regulate and analyze vehicle movement on roads. In addition, the police expected the solution to assist them in maintaining law and order, to identify frequent offenders as well as stolen/ suspect vehicles, as and when they enter the city. With the city needing to enhance its road safety even as it was expanding, Videonetics designed a solution based on its Intelligent Traffic Management System that provides continuous monitoring of the traffic situation, records traffic violations at intersections, and triggers necessary penal action against violators. Manage real-time alerts 24x7 real-time monitoring: Today, the city has ANPR and RLVD systems spread across 120 traffic junctions, to track and record license plate of any type of vehicle, as well as detect red light or stop line violation at intersections. Nearly 1,300 IP cameras have been deployed, to monitor vehicle movement and detect suspect vehicles simultaneously. Violation prosecution: Videonetics’s Integrated e-Challan/e-Ticket Management Software has been assimilated with Regional Transport Office database, to fetch the details of a vehicle and its owner. Once a violation is detected, an e-challan is issued to the offender. The e-challan also maintains a record of all payments, both received and pending. A centralized security view: The solution provides the police a bird’s eye view of the traffic junctions and city’s roads, from the Command & Contro Center. From the unified interface, security operators can view, manage real-time alerts and respond them swiftly. City surveillance system Prior to the installation of Videonetics’s Smart City solution, Nagpur city relied on on-site traffic monitors/ police to catch offending vehicles. However, the recent implementation of the solution has eliminated the need for physical deployment of traffic police at each junction. Videonetics’s solution helps maintain the security on city’s roads by detecting and recording traffic violations with accuracy, resulting in irrefutable evidence for local authorities. In addition, citizens have started obeying traffic rules, resulting in an over 50% reduction in traffic violations. The open architecture of the solution not only allows the city to continue adding more applications to make its traffic management more robust, but also integrate with the city surveillance system in a single unified interface, to address security concerns with a holistic approach.
Round table discussion
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: Which security markets are likely to embrace the cloud?