Public sector security
Pepperl+Fuchs is Expanding its Product Portfolio for Ultrasonic Sensors in the Area of Factory Automation with the Safe USi-safety Ultrasonic Sensor System. A safe ultrasonic sensor system The innovative USi-safety ultrasonic sensor system is a modern and certified sensor technology that is used to safeguard hazard areas on cellphone machines such as robots, industrial trucks, machines, and plants according to EN ISO 13849-1 category 3 PL d. The USi-safety system protects people and obje...
ANSecurity, an advanced network, and data security company, has become a Palo Alto Networks Managed Security Services Partner (MSSP). ANSecurity has delivered Palo Alto Networks security solutions for over 10 years, and as David Hood, CEO, explains, “We already work with many of our clients using Palo Alto Networks technology as part of our own co-driver managed services methodology, and this certification is a formalization of a long-standing relationship that validates that our security...
The Croatian defender and UEFA Cup winner Darijo Srna will become the brand ambassador of the Ukrainian security systems manufacturer Ajax Systems in Croatia. The slogan of the campaign is “Ajax. My defense tactics.” “Darijo is a world soccer legend and a real superstar in Croatia. His brand ambassador status will bring further momentum to the Ajax promotion in the Adriatic market,” Ajax Systems CMO, Valentyn Hrytsenko. “I have a smart Ajax security system at home...
The National Security Inspectorate (NSI) is once again supporting the BSIA’s British Security Awards, taking place at the London Marriott Grosvenor Square on 30th June 2021. The British Security Awards recognize key achievements from within the private security industry and for the third consecutive year, NSI is sponsoring the ‘Apprentice of the Year' Award. Dedicated to the next generation of engineers within the industry, this category will award an apprentice for their outs...
SAFR from RealNetworks, Inc. announced that its SAFR facial recognition system for live video is now integrated with the Geutebrück G-Core VMS (Video Management System). SAFR for Geutebrück is an AI layer that runs on top of the G-Core VMS which provides advanced video analytics that saves time and increases the efficiency of surveillance operations. The best-in-class integration features live video overlays that display event details, streamlined enrollment of individuals appearing o...
ATG Access has unveiled the next generation of shallow foundation technology, having revolutionized the bollard market in 2007 with the release of the first shallow foundation bollard system. The SP400 SM 48 is the latest addition to ATG’s extensive shallow foundation bollard portfolio. Successfully impact-tested to both the BSI PAS 68 and IWA 14-1 standard, it can arrest a 7,500kg vehicle traveling at 48kph and is ideal for securing critical national infrastructure (CNI) and crowded plac...
Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd., a pioneering provider of cyber security solutions globally, has published its latest Global Threat Index for March 2021. Researchers report that the IcedID banking trojan has entered the Index for the first time, taking second place, while the established Dridex trojan was the most prevalent malware during March, up from seventh in February. First seen in 2017, IcedID has been spreading rapidly in March via several spam campaigns, affecting 11% of organizations globally. One widespread campaign used a COVID-19 theme to entice new victims into opening malicious email attachments; the majority of these attachments are Microsoft Word documents with a malicious macro used to insert an installer for IcedID. Once installed, the trojan then attempts to steal account details, payment credentials, and other sensitive information from users’ PCs. IcedID also uses other malware to proliferate and has been used as the initial infection stage in ransomware operations. Evasive trojan “IcedID has been around for a few years now but has recently been used widely, showing that cyber-criminals are continuing to adapt their techniques to exploit organizations, using the pandemic as a guise,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. “IcedID is a particularly evasive trojan that uses a range of techniques to steal financial data, so organizations must ensure they have robust security systems in place to prevent their networks being compromised and minimize risks. Comprehensive training for all employees is crucial, so they are equipped with the skills needed to identify the types of malicious emails that spread IcedID and other malware.” CPR also warns that “HTTP Headers Remote Code Execution (CVE-2020-13756)” is the most commonly exploited vulnerability, impacting 45% of organizations globally, followed by “MVPower DVR Remote Code Execution” which impact 44% of organizations worldwide. “Dasan GPON Router Authentication Bypass (CVE-2018-10561)” is on third place in the top exploited vulnerabilities list, with a global impact of 44%. Top malware families *The arrows relate to the change in rank compared to the previous month. Recently, Dridex is the most popular malware with a global impact of 16% of organizations, followed by IcedID and Lokibot affecting 11% and 9% of organizations worldwide respectively. ↑ Dridex - Dridex is a Trojan that targets the Windows platform and is reportedly downloaded via a spam email attachment. Dridex contacts a remote server and sends information about the infected system. It can also download and execute arbitrary modules received from the remote server. ↑ IcedID - IcedID is a banking Trojan spread by email spam campaigns and uses evasive techniques such as process injection and steganography to steal user financial data. ↑ Lokibot - Lokibot is an Info Stealer distributed mainly by phishing emails and is used to steal various data such as email credentials, as well as passwords to CryptoCoin wallets and FTP servers. Top exploited vulnerabilities Currently, “HTTP Headers Remote Code Execution (CVE-2020-13756)” is the most commonly exploited vulnerability, impacting 45% of organizations globally, followed by “MVPower DVR Remote Code Execution” which impacts 44% of organizations worldwide. “Dasan GPON Router Authentication Bypass (CVE-2018-10561)” is in third place with a global impact of 44%. ↑ HTTP Headers Remote Code Execution (CVE-2020-13756) - HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine. ↑ MVPower DVR Remote Code Execution - remote code execution vulnerability exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request. ↑ Dasan GPON Router Authentication Bypass (CVE-2018-10561) - authentication bypass vulnerability exists in Dasan GPON routers. Successful exploitation of this vulnerability would allow remote attackers to obtain sensitive information and gain unauthorized access into the affected system. Top mobile malwares Hiddad took first place in the most prevalent mobile malware index, followed by xHelper and FurBall. Hiddad - Hiddad is an Android malware, which repackages legitimate apps and then releases them to a third-party store. Its main function is to display ads, but it can also gain access to key security details built into the OS. xHelper - A malicious application seen in the wild since March 2019, used for downloading other malicious apps and display ads. The application is capable of hiding itself from the user, and can even reinstall itself after being uninstalled. FurBall - FurBall is an Android MRAT (Mobile Remote Access Trojan) which is deployed by APT-C-50, an Iranian APT group connected to the Iranian government. This malware was used in multiple campaigns dating back to 2017 and is still active today. Among FurBall’s capabilities are; stealing SMS messages and mobile call logs, recording calls and surroundings, collecting media files, tracking locations, and more. Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 3 billion websites and 600 million files daily and identifies more than 250 million malware activities every day.
Hikvision, an IoT solution provider with video as its core competency announced Foxstream has joined the Hikvision Embedded Open Platform (HEOP) program for the FoxIntruder edge-based intrusion detection solution – which is available for Hikvision’s range of DS-2TD2137/VP thermal cameras. Perimeter security With this integration, FoxIntruder can now be embedded directly into Hikvision’s thermal cameras at the edge to provide an extremely reliable and easily deployable end-to-end solution for high-security perimeter protection. This solution also features less bandwidth and lower latency than server-based solutions. Users simply need to add a camera’s IP address into the browser to access the HEOP application, which provides the following: Real-time visualization based on alarm triggers and video event playback Minimal false alarm rates Integration with industry-leading VMS platforms and Central Station Receivers Quick and simple configuration and intuitive operation An API for integration with other platforms Edge-based perimeter protection "Foxstream has an excellent reputation for optimal perimeter detection algorithms and extremely low rates of false alarms. Now, validated by Hikvision for their HEOP program, we can provide this as an embedded solution for edge-based perimeter protection. FoxIntruder for HEOP uses the same tried and trusted algorithms that we use in our FoxVigi and FoxBox solutions, with even simpler configuration settings.” “In combination with Hikvision thermal cameras, this product combination provides reliable and optimal perimeter protection against intruders to secure large sites!," says Franck Depierre, Product Manager at Foxstream. Long-term implications “We are happy to see that more and more technology partners, like Foxstream, are joining our HEOP program. This is part of our long-term strategy to build the best possible market offerings for customers alongside technology partner solutions that fit inside our HEOP cameras." "Through the HEOP program, technology partners can showcase their technologies to a wider audience as well as deliver solid value propositions to the market,” says Myler Zhong, Vertical Director at Hikvision Europe. Hikvision’s HEOP program provides a platform for third-party technology partners to develop their own applications and install them directly into Hikvision cameras, which brings a greater variety of intelligent functionality directly to customers.
With a solid COVID-19 continuity plan, a strong focus on people retention, and new ways of collaborating with partners, Milestone Systems achieved a net revenue of DKK 1 billion in 2020. Milestone’s net revenue amounted to DKK 1 billion in 2020, a decrease of 1% compared with 2019. The operating income (EBIT) was DKK 112 million, a decrease of 9%, reflecting the pandemic’s impact on sales, an increase in development capacity, and investments in new headcounts to fuel future growth. New ways to collaborate “Given the challenging situation of the pandemic, our annual result is a successful outcome, made possible by our people, without whom long-term sustainable growth would not be possible." "We quickly turned around how we manage the company and found new ways of supporting our network of partners. This resilience combined with the adaptability of our people and partners prepared us to face the new challenges,” says Chief Executive Officer Thomas Jensen, Milestone Systems. People First In 2020, Milestone’s People First approach was tested to its core. It was crucial for Milestone to avoid restructuring while supporting its people — keeping them motivated and feeling included as part of the team. To support this, Milestone launched the Grow Together program that focuses on mental and physical health and knowledge-sharing about exercise, food, and sleep. In addition, despite the COVID-19 pandemic, Milestone lived up to the ambition to invest in people and growth, increasing the number of employees by 69 to a total of 934 at the end of 2020. Increased support of partners The wide network of channel and technology partners is the core of Milestone’s open video technology platform. When the pandemic hit, Milestone optimized its support to help partners keep selling Milestone solutions. Product training went online with webinars attracting thousands of partners and, with the Milestone Care™ campaign, Milestone helped its partners to continue their business without having to be onsite with their customers. Future growth opportunities Looking ahead, Thomas Jensen expects challenges but also looks forward to Milestone’s continued growth journey. He concludes, “COVID-19 created a lot of uncertainty and unpredictability in 2020." "The pandemic is not behind us yet, and therefore we see challenges as well as opportunities ahead. But with our strong COVID-19 continuity plan, we are confident that 2021 will become another growth year for Milestone.”
The Security Industry Association (SIA) has announced the agenda and speaker lineup for Part 1 of the 2021 SIA GovSummit, its annual public policy and government security technology conference. SIA GovSummit 2021 will be held as a three-part virtual conference, with sessions held on April 28, June 9 and Sept 21, 2021. SIA GovSummit 2021 Each year, SIA GovSummit brings together government security leaders with private industry technologists for top-quality information sharing and education on security topics affecting federal, state and local agencies. The 2021 virtual conference will examine emerging policy trends, the government’s technology needs and changes in the risk environment that shape the development of products and advanced systems integration. Government use of security technology SIA GovSummit delivers high-quality insights and information on how government uses security technology" “SIA GovSummit delivers high-quality insights and information on how government uses security technology to meet evolving challenges and succeed across a wide spectrum of missions,” said Jake Parker, Senior Director of Government Relations at SIA. Jake adds, “With this new three-part virtual format in 2021, we look forward to offering the program to a wide spectrum of interested attendees and delving even deeper into the most important issues for federal, state and local government security practitioners.” Full-day virtual conference program Part 1 of the 2021 virtual conference will be held as a full-day program on Wednesday, April 28, kicking off at 10 a.m. EDT, with a keynote presentation from U.S. Rep. John Katko (R-N.Y.), ranking member of the House Committee on Homeland Security. Katko will share insights on security challenges and how we can address them as a nation. Additional session topics will include: The American Rescue Plan’s impact on deployment of safety and security technologies What the DOD Cyber security Maturity Model Certification means for contractors and security suppliers The role of the SAFETY Act under the Biden administration Protecting public buildings against violent civil unrest Lessons learned from the Christmas Day bombing in Nashville, Tennessee Facility safety, COVID-19 and identity and facility management technologies Audio security technology’s use in government facility applications Speakers for the virtual event include: William Braniff, Director, National Consortium for the Study of Terrorism and Responses to Terrorism Daryle Hernandez, Chief, Interagency Security Committee, Cyber security and Infrastructure Security Agency, U.S. Department of Homeland Security David Kelly, Deputy Director, Security Management Group, Centers for Medicare and Medicaid Anna Mansueti, Director of Diversity and Gender Equity, Platinum East Gabriel Russell, Regional Director, Federal Protective Service Free event for all government staff This event is free for all government employees, including U.S. and international federal, state, county and municipal-level staff, plus all military, law enforcement and public safety personnel. SIA GovSummit is considered a ‘widely attended gathering’ and complies with all relevant event guidelines. Each industry attendee can choose to register for the April 28 session only or purchase an All Access Pass to unlock all three GovSummit events for a discounted rate.
HID Global, a trusted identity Solutions Company announced that Mail.Ru has chosen its HID Mobile Access solution for secure and convenient access control using smartphones and other cellphone devices. Need for access control Mail.Ru reaches over 91% of all Russian internet users via its mail platform and social networks. The company has more than 7,000 employees and a high volume of visitors to its Moscow offices, necessitating an access control solution that provides best-in-class security and a seamless user experience. Mail.Ru was seeking a cellphone solution that would easily integrate into its own smartphone app to allow employees and visitors to easily switch from using physical access cards to cellphone IDs stored on their smartphones. cellphone solution “We considered several solutions and decided in favor of HID Global. Their reputation for reliable and secure solutions greatly contributed to our decision,” said Andrey Evtyushin, Mobile Development Team Leader Business Process Management Department, Mobile Development Group, Mail.Ru Group. “It was also important that HID Global provided the most convenient software development kit (SDK) for iOS and Android platforms to integrate into our cellphone application, compared to other competitor solutions.” Robust ID security HID Global worked closely with local integrator partner AAM Systems to install 300 HID readers and issue 3,200 HID cellphone IDs to enable employees to use their smartphones for access control. Easy-to-use HID Mobile Access solution makes it possible for Mail.Ru to easily manage off-hours access and configure individual users’ security rights The HID Mobile Access solution makes it possible for Mail.Ru to easily manage off-hours access and configure individual users’ security rights, as well as enable easy movement of people within the building while maintaining security. Seos credential technology, which powers HID’s solution, also enables robust cellphone ID security. Access to Mail.Ru’s global network of offices is centrally managed through HID’s cloud-based portal, and provisioning is done over the air to deliver cellphone IDs to users’ phones via a cellphone app. This makes it easy to add, remove or change access rights as required. Tailored customer experience “HID Mobile Access provides an ideal mix of security, convenience, and flexibility; our SDK means customers can tailor the user experience so it is unique to them and on-brand,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. Mail.Ru used the HID Mobile Access SDK to integrate the cellphone solution into its own company application to offer a consistent user experience across different cellphone devices and operating systems, including iOS and Android™. The solution enables Mail.Ru to also provide visitors with building access so contractors, vendors, and event attendees can use cellphone IDs on their personal devices as part of Mail.Ru’s holistic approach to maintaining high levels of security.
VMware, Inc. unveiled expanded cloud workload protection capabilities to deliver security for containers and Kubernetes. The new solution will help increase visibility, enable compliance and enhance security for containerized applications from build to production in the public cloud and on-premises environments. Comprehensive cloud platform “Containers and Kubernetes are enabling organizations to develop and modernize applications faster than ever, but the innovation is also expanding the attack surface,” said Patrick Morley, senior vice president, and general manager, Security Business Unit, VMware. “Our solution extends security to containers and Kubernetes to deliver one of the industry’s most comprehensive cloud workload protection platforms. With security built into the development and deployment of applications, we are bridging the gap between the SOC and DevOps teams to help our customers reduce the risks that come with running containers across clouds.” Addressing threats For many organizations, migrating to the cloud has had to happen quickly and at a large scale to ensure business continuity amid the global pandemic. Development teams are looking to containers and Kubernetes for speed and the ability to scale application delivery. According to Gartner, “by 2025 more than 85 percent of global organizations will be running containerized applications in production, which is a significant increase from fewer than 35 percent in 2019.” Organizations need security for modern workloads to address a new set of threats and build resilient digital infrastructure. Better Security VMware Carbon Black Cloud Container builds security to analyze and control application risks Security is especially complex in multi-cloud infrastructures. VMware Carbon Black Cloud Container builds security into the continuous integration and delivery (CI/CD) pipeline to analyze and control application risks before they are deployed into production. Expanding the VMware Carbon Black Cloud Workload offering, the new capabilities will enable organizations to better secure containerized applications in Kubernetes environments. The solution shifts security left to protect the entire lifecycle of Kubernetes applications. InfoSec teams can now scan containers and Kubernetes configuration files early in the development cycle to address vulnerabilities with unparalleled visibility. The solution provides continuous cloud-native security and compliance to better secure applications and data wherever they live. Enable Collaboration for InfoSec and DevOps Teams Containers and Kubernetes offer development teams flexibility with an infrastructure-as-code approach. However, security is often a roadblock to faster production deployments and later bolted on as an afterthought. The VMware container security module will empower InfoSec and DevOps teams to better collaborate and identify risks earlier in the development cycle with built-in security. The expanded offering will provide a new vantage point to allow cross-functional teams to detect and fix vulnerabilities to achieve simple, more secure multi-cloud Kubernetes environments. Comprehensive solution for InfoSec VMware’s expanded cloud workload protection capabilities will deliver a comprehensive solution for InfoSec teams including: Security Posture Dashboard: Provides a combined view of vulnerabilities and misconfigurations to enable complete visibility into security posture across Kubernetes workload inventory. InfoSec and DevOps teams can gain deep visibility into workload security posture and governance to enable compliance, with the ability to freely explore Kubernetes workload configuration via customized queries. Container Image Scanning and Hardening: InfoSec and DevOps teams can scan all container images to identify vulnerabilities and restrict the registries and repositories that are allowed in production. Teams can set minimum standards for security and compliance, generate compliance reports and follow CIS benchmarks and Kubernetes best practices. Prioritized Risk Assessment: Vulnerability assessments allow InfoSec and DevOps teams to review images running in production and only approved images are deployed. Security teams can use the prioritized risk assessment to detect and prevent vulnerabilities by scanning Kubernetes manifests and clusters. Compliance Policy Automation: Infosec teams can shift left into the development cycle, streamline compliance reporting, and automate policy creation against industry standards such as NIST, as well as the customer’s organizational requirements. This enables the integrity of Kubernetes configurations through control and visibility of workloads that are deployed to an organization’s clusters. Customizable policies help enforce configuration by blocking or alerting on exceptions. The Future of Intrinsic Security with VMware Carbon Black and Tanzu The container security module complements the VMware Tanzu portfolio. Select Tanzu editions include a global control plane for centralized management of all aspects of cluster lifecycle, including policies for access, data protection, and more. Customers can now add powerful security for containers and Kubernetes applications while simplifying operations for InfoSec and DevOps teams. Customer Quote DoubleVerify ensures viewable, fraud-free, brand-safe ads. DoubleVerify powers the new standard of digital marketing performance, ensuring viewable, fraud-free, brand-safe ads. “It’s important that we have full visibility into the risk of our entire Kubernetes workload environment, as well as the ability to detect and prevent vulnerabilities before containers are deployed,” said Roy Berko, Senior Director of DevOps, DoubleVerify. “With VMware’s container security offering, we now have instant visibility to help reduce risk of our containerized applications all from a single dashboard.” Analyst Quote IDC is the premier global market intelligence firm, examining consumer markets by devices, applications, networks, and services “Kubernetes has become the de-facto best-practice standard for developing cloud-native applications, yet developers are still leveraging siloed and inefficient tools with limited cross-organization visibility,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “VMware’s container security offering provides an opportunity for security and DevOps teams to work more closely together to leverage the power of Kubernetes and better secure the unique lifecycle development processes of container-based applications.” Product Availability VMware container image scanning and CI/CD integration capabilities are expected to be available in April 2021. Runtime security for detection and response will be available later this year.
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.
Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to containing the pandemic. Michael Seiter: Overall, we managed the past year well despite the challenges and have been growing again since the third quarter compared to 2019. We see good opportunities for further growth in 2021. Q: Has the Corona crisis again accelerated the development of smart technologies in the security technology market, and does the security market in contrast to most industries benefit from the crisis more than it suffers? Michael Seiter: The Corona crisis has definitely demonstrated that the future lies in data-driven solutions. Thanks to our product development strategy already being based on this, we at Bosch were very quickly able to develop new products for the ‘New Normal’ and to expand existing products accordingly. To give one or two examples: in cooperation with Philips, we very quickly developed a people counting solution for retail operations – smart Philips displays in conjunction with smart cameras from Bosch that provide protection for staff and customers. The In-Store Analytics software solution was also implemented with additional features. Shop owners can now make decisions based on customer movement data such as “Where do we position products to avoid queues or crowds?” HTD involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature The latest highlight is the Bosch Human Skin Temperature Detection solution, in short HTD. This involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature at control points in offices, factory floors, or airports. The benefits of previously existing solutions on the market are sometimes called into question. Competitors are often unable to deliver what they promise because, for example, the measured temperature of the skin does not correspond to the core temperature of the person, or fluctuates, due to environmental influences. Therefore, we developed a software-based solution that, in compliance with GDPR, first allows people with potentially elevated body temperatures to be filtered out, and in a second step, allows medical personnel to perform a more targeted fever measurement. Q: You see a lot of potential for the video security industry in new technologies such as Artificial Intelligence and the Internet of Things. What specific opportunities do you mean, and how are you leveraging these technologies at Bosch Building Technologies? Michael Seiter: Bosch has committed itself fully to an “AIoT” – AI meets IoT – strategy. The development of AI algorithms and software, in general, is at Bosch significantly driven in the security space. By AIoT, we specifically mean the networking of physical products and the deployment of artificial intelligence. With AI we aim to enable clients to understand events at an ever-deeper level and predict them in the future – the keyword being predictive – so that they can act proactively. This is particularly important for health and safety. An example is the Intelligent Insights solution where the user can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area. Q: From your point of view do you have an advantage over other suppliers when it comes to AI-based products in the video arena? Michael Seiter: The analysis and utilization of video data have long been front and center with us. Since 2016 we’ve been following the strategy of offering AI applications in the form of integrated intelligent video analytics as a standard in our network cameras. Data such as color, object size, object speed, and direction are all measured. Simply put, you can say this is seeing and understanding – which is the principle behind smart security cameras. Today it’s much more a question of intelligent, data-based solutions than collecting high-quality pictures and storing them for the record. Bosch has been investing heavily in AI for years, from which we can benefit greatly in our area. In the first quarter, for example, we will launch a vehicle detector based on deep learning that is already running on our cameras. This will create significant added value for our customers in the area of intelligent traffic control. Q: Mr. Ekerot, what advantages do customers have in AI-based video security from Bosch? Magnus Ekerot: A key advantage is strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms A key advantage is our strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms. Take the example of Camera Trainer, a machine learning software that can be directly uploaded to Bosch network cameras. The camera is thus trained up on recognizing objects and situations – tailored to the specific needs of our customers. If the camera detects the defined scenario, it performs a predefined action in real-time – for example, a count or an alarm. The latest example is our new camera platform Inteox. As a completely open camera platform, Inteox combines Bosch's intelligent video analytics with an open operating system. This allows programmers to develop specific software applications - or apps - for various application purposes. These can then be loaded onto cameras – the same principle as an app store for smartphones. To sum up, Bosch AI applications support customer-specific needs related to data analysis while enabling totally new applications within and beyond the video security market. Q: Can you name a specific current project where Bosch has deployed an AI-based solution? Magnus Ekerot: A current ground-breaking project using our smart cameras is being implemented as a pilot in the USA. Smart Ohio enables users to configure more intelligent traffic flows and thus ensure mobility, safety, and the efficient use of roads today and tomorrow. The new vehicle detector mentioned by Mr. Seiter also plays a central role here. Our overall goal is to provide connected smart sensor solutions for public and private transportation agencies to enable them to operate their roads safely and efficiently. The Intelligent Insights can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area Q: Mr. Seiter, you have been involved with the topic of mobility for some time. What experience from your previous job in the automotive business of Bosch might help you when it comes to further develop the video portfolio of Bosch Building Technologies? Michael Seiter: There's a lot to tell. First of all, the development of core algorithms for video-based solutions, whether for autonomous driving, for vehicle interior monitoring, or for our Bosch Building Technologies video systems, all come together at Bosch's Hildesheim location. This gives us considerable synergies and allows us to bring R&D results to market faster and more flexibly. Essentially, assisted driving systems use AI algorithms that process ever-increasing volumes of video data. Attempts are being made to imitate the human being and enable the vehicle to understand better the surrounding environment with its ‘eyes’. This predictive capability is especially critical with autonomous driving. For example, key questions include: “How should the car respond and what could potentially happen next?” “What kind of environment does it find itself in?” etc. There are many activities in this area at Bosch that in my new role in security we can also strongly benefit from. I am now bringing a lot of this experience and existing R&D achievements to Bosch Video Systems & Solutions, which also results in further synergies with our mobility division: At Stuttgart Airport, autonomous driving is already being implemented together with Mercedes-Benz and the parking garage operator Apcoa as part of the "Automated Valet Parking" project, or AVP for short, in which intelligent video systems from Bosch Building Technologies are making a significant contribution. Mr. Ekerot, you have a lot of experience in the video security area. Where do you position Bosch Building Technologies now in this market and what specific goals are you pursuing? Magnus Ekerot: Our clients are looking for reliable partners and products. We are a strong brand; you can rely on Bosch products. Bosch is a thought leader in video and a pioneer in AI applications in this field since 2016. Data security is everything to us: Our products conform to the EU’s GDPR regulations. Beyond that, we have an extensive camera portfolio that complies with the US National Defense Authorization Act (NDAA) for video security devices. This enables our portfolio to be deployed for example within US government buildings. We are planning to conclude more software maintenance agreements with our clients in 2021. These deliver investment and future security for our customers and include for example a ‘patch guarantee’ along with regular updates with new functionalities. This is the first step in a comprehensive plan to access new revenue channels for us and our partners delivering the best technology and excellent service to the end-user! Overall, many new products will be launched this year and this trend will intensify. Our goal is to establish new product families that follow a simple principle: “The development and delivery of disruptive, predictive video solutions that every user can trust because of the underlying sustainable forward-thinking mindset.” It’s been much discussed of late that Bosch is one of the very first companies globally that operates on a CO2-neutral basis. How does sustainability impact your business? Magnus Ekerot: IoT solutions are actually sustainable and contribute to environmental protection Our IoT solutions are actually sustainable and contribute to environmental protection. For example, our cameras are sustainable in that they remain up-to-date through software updates and needn’t be constantly exchanged for new ones. Our systems demonstrate sustainability also operationally as they can be managed remotely. System integrators don’t need to be physically present, thus avoiding unnecessary travel with its accompanying emissions. All in all, Bosch Building Technologies develops ways to accompany and support our clients in reaching their climate goals via new technologies. This can be done, for example, through improved energy efficiency, the total cost of ownership models, organizing and simplifying the supply chain, and helping our customers meet their social responsibilities. The Power of Bosch helps us here to leverage company-wide research to be two steps ahead, a shade faster, when it comes to new technologies and initiatives that our and future generations will benefit from. I should also say that I am personally very proud to work for a company that set an ambitious climate goal for itself and achieved it! Can you already share a preview of your technology innovations in 2021? Michael Seiter: We see great market potential for our cameras that use artificial intelligence and can be updated flexibly throughout their lifecycles. I have already mentioned the deep learning-based vehicle detector in our cameras. More such solutions – also for other applications where object and person recognition are important – will follow in the course of the year. And the best part is: with AI, the more data we collect and the more intelligently we use it, the better the solutions become and the more added value they bring to the customer. This will revolutionize our industry! Another example is our cloud-based solutions, for example for alarm monitoring. Here, we can now also integrate third-party cameras and, building on this, offer and jointly develop our intelligent software-based solutions. This gives our customers more opportunities to take advantage of the opportunities created by AI. The trend towards integration of the various security technologies seems to be driven mostly by the rapid progress in software development. Does this affect full-range suppliers such as Bosch and what specific plans for fully integrated security solutions do you have for the future? Michael Seiter: Naturally, this suits us as a full-scope supplier. Bosch solutions are deployed in many cross-domain client projects. We have experts for the different domains under one roof and a strong brand with the same quality promise for all areas. Nevertheless, it is always also about specific domain excellence. Only when you master all different areas and have profound and proven expertise in each of them you can succeed in integrated cross-domain projects. The respective business units craft their future strategies and innovation roadmaps with this in mind – as we do in the field of Video Systems & Solutions. Our business unit offers fully integrated Bosch video solutions that can be extended and operated on open systems. This is why we drive open platforms such as Inteox, to offer customers from a wide range of industries the right solutions. Our Bosch Integration Partner Program that we launched in 2012 is also heading in this direction – every product can be integrated into multiple other systems and VMS solutions. In summary: At Bosch, we are both a one-stop-shop, but also an open-system, meaning we offer customers maximum flexibility in their choice of products and services.
With pupils in the UK set to go back to school on 8 March, there are a number of safety measures schools need to implement to ensure the health and wellness of the staff, students, and school communities. The first lockdown and closure of schools brought on by the coronavirus pandemic fired a “warning shot” for education facilities managers, forcing head-teachers to re-examine school safety standards. Now that a third lockdown is here and schools have been shut down for a second time, anyone behind the curve with the benefits of smart technology should get on board now before children return to the school environment. And with the ever-changing variants of the COVID-19 virus, schools can’t afford to be “late to class” when it comes to health and safety. Preventing the spread of disease Some schools in the US have been using smart technologies for a while to measure utility consumption and efficiency, streamline maintenance and enhance general school safety. These technologies are playing a significant role in keeping school buildings healthy and preventing the spread of disease. Let’s take a look at how smart technology can help schools to become safer, as well as more energy-efficient and cost-effective. Thermal detection cameras Smart cameras placed at entry points of a school can remove the manual task of temperature testing Smart cameras placed at entry points of a school can remove the manual task of temperature testing. These cameras provide medically-accurate, real-time temperatures of individuals in real-time. If a high temperature is detected, the software sends an instant alert to the relevant party. It can also be set to deny access to those with high temperatures or to people not wearing masks. Safer water As the coronavirus continues to sweep through the world’s population, healthcare providers should also be on heightened alert for Legionnaires’ disease, another potential cause of pneumonia with similar symptoms. Legionella is a potentially deadly bacteria that can infect a school’s water supply and cause an outbreak of Legionnaire’s disease. It’s a school's duty of care to prevent Legionella infection by monitoring the risk of the bacteria proliferating. Particularly as schools reopen and previously stagnant plumbing and cooling systems return to use, additional Legionella cases could rear their ugly head to emergency departments in the coming months. Traces of Legionella were recently found at a Worcestershire school. The school was forced to remain shut while treatment and testing took place. Automated flushing and temperature testing Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters The Health and Safety Executive advises, “If your building was closed or has reduced occupancy during the coronavirus (COVID-19) outbreak, water system stagnation can occur due to lack of use, increasing the risks of Legionnaires’ disease… If the water system is still used regularly, maintain the appropriate measures to prevent legionella growth.” Typically, managing the risk of Legionella includes running all outlets for two minutes, taking and recording the temperature of the water to ensure that it’s not conducive to Legionella growth. This is a time-consuming process, which is why schools are looking for automated water temperature monitoring systems. This smart system with automated flushing and temperature testing reports and records water temperature data in real-time. Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters. Cleaner air Advisers say that improving air filtration and ventilation in schools can help mitigate the potential airborne transmission of COVID-19. Strategies include: Increasing outdoor air ventilation Filtering indoor air Using portable air cleaners with HEPA filters Smart building technologies such as advanced HVAC controls can help facilities managers promote cleaner air with less hassle. For example, smart HVAC systems use sensors to remotely monitor and control variables such as: Humidity Temperature Indoor air quality The level of carbon dioxide and other pollutants The technology is also energy-efficient and cost-effective. While these solutions may be key to the reopening of schools in the era of COVID-19, they also bring long-term benefits. Although COVID-19 may have accelerated the adoption of smart technology, many of these solutions are focused on health, wellness, and security in general; which have been needed in school systems for a long time.
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of police and corrections officers. Private security applications for the technology include healthcare, education, banking, public venues, retail, logistics, transportation and places of worship. The new body-worn camera system was designed with Axis partners and ecosystem in mind, says Martin Gren, Founder and Director of New Projects at Axis. “We try to make it fit with existing customers.” Deploying and using the system The new body-worn camera system was designed with Axis partners and ecosystem in mind Gren says the system is easy to deploy and use. The Axis W100 camera provides 1080p images, wide dynamic range (WDR) and has dual microphones, operating 12 hours on a single charge. GPS/GNSS global satellite navigation provides location, and a six-axis gyroscope and accelerometer offer additional data beyond the video image. For example, sensors might be triggered in some situations to initiate recording. One-bay (Axis W700) or eight-bay (Axis W701) docking stations enable high-speed supervised data offloading and battery charging, and a system controller (Axis W800) provides a central point for integration and management. Use of Zipstream compression technology saves on bandwidth and storage. Video cannot be accessed in the field, but only when a camera has been docked. There are many layers of security, and encryption protects all data used in the system from being accessed by outside agents. The USB interface cannot be connected to an ordinary computer but only to the docking station. Open standards Open standards ensure easy integration with video management systems and/or evidence management systems, whether on-premises or in the cloud. At the time of release, the Axis body-worn camera system is already integrated with Milestone XProtect, Genetec Security Center, and Axis Camera Station VMSs. It is also integrated with the Genetec Clearance cloud-based evidence management system. An application programming interface (API) will facilitate additional integrations over time. The body-worn cameras will be sold through the current Axis channels The body-worn cameras will be sold through the current Axis channels of distributors, systems integrators and resellers. The camera is part of the Axis “ecosystem,” which includes the company’s familiar network cameras as well as recent additions such as access control, network audio systems (including loud speakers), intercom door stations, a radar detector and other Internet of Things (IoT) devices. “The more things you integrate, the more value you add to customers,” said Gren. The new body-worn camera systems are core products for Axis; they are not made by another original equipment manufacturer (OEM) and merely sold under the Axis label. “When we decided to do body-worn cameras, OEMing was not an option,” said Gren. “Instead we took some experienced Axis engineers and a bunch of new ones to develop this product line to ensure the same Axis quality and compatibility.” Introducing the new product The body-worn camera system was unveiled remotely in a press conference webinar; the original plan was to introduce the new product at ISC West, which was canceled to minimize spread of the novel coronavirus. In addition to announcing the new product, the Axis executives provided commentary and insight into the ongoing coronavirus crisis. “The security industry is a close-knit community that is connected in more ways than one,” said Fredrik Nilsson, Axis Vice President of the Americas. “We are all in this together. The industry has always exemplified resiliency, ingenuity and vision to address such challenges.” We are all in this together. The industry has always exemplified resiliency, ingenuity and vision" “There is some disruption in the Axis supply chain, but we have a broad partner-based supply chain when it comes to our sub-suppliers, our seven global CLCs (Configuration and Logistics Centers) and the distributors who keep inventory for integrators,” said Nilsson in the March 18th press call. “There is some stress on some components, but things are working relatively well under the circumstances. We are monitoring it on a day-to-day basis, but so far we have been able to hold things up very well.” Gren offered a comment on the possible use of thermal cameras (which Axis makes) to measure body temperature during the COVID-19 crisis: “When we designed our thermal cameras, that was a common question,” he said. “But in general, it is difficult to use a thermal camera to get an accurate reading. We have one model – the Q2901 – that is a temperature-accurate thermal camera, and if you look straight into the camera, it is accurate to around 1° F. However, there are more efficient ways to [measure temperature]. In general, it’s not a business application I would recommend.”
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Suprema, a global company in biometrics and access control solutions, announced that it supplied BioSign 4.0, its under-display fingerprint recognition algorithm to the Samsung Galaxy S21 smartphones with support from Qualcomm Technologies, Inc. BioSign, Suprema’s smartphone fingerprint recognition technology, has gained global recognition since its installation on Samsung Galaxy J5 models in 2017. Since then, Suprema has been supplying BioSign solutions to other Samsung smartphone models including Samsung Galaxy S10, Galaxy Note10, Galaxy 20, and Galaxy Note 20 series. Fingerprint recognition speed BioSign 4.0, installed in the Galaxy S21, has been receiving great reviews for its fingerprint recognition speed. BioSign 4.0 delivered enhanced speed and accuracy compared to its predecessor, BioSign 3.0, significantly upgrading user convenience with 50 percent faster and more than twice as accurate recognition performance. BioSign 4.0 employs deep-learning mechanisms to optimize fingerprint analysis to efficiently recognize rich fingerprint information obtained from the larger sensing area of the second-generation Qualcomm® 3D Sonic Sensor Gen 2 installed in the Galaxy S21 series. Qualcomm 3D Sonic Sensor Gen 2 Qualcomm Technologies unveiled the high-performance ultrasonic sensor, the Qualcomm 3D Sonic Sensor Gen 2 that was supplied to Samsung Galaxy S21 series, in January at CES 2021. With a 77%-larger fingerprint sensing area than the previous generation, the Qualcomm 3D Sonic Sensor Gen 2, was able to significantly improve fingerprint recognition performance. The ultrasonic sensor has ultra-thin form factors and is optically isolated from the display panel allowing for sleek smartphone designs. Performance and user convenience “Suprema's fingerprint recognition technology has been continuously selected for the Samsung Galaxy S series, proving to the world the technological superiority of our solution,” said Brian Song, the president of Suprema Inc. “With the excellent reviews BioSign 4.0 has been receiving for its overpowering performance and user convenience, we expect to be able to grow sales and market share. Suprema will continue to advance our fingerprint and face recognition technologies using AI and deep learning, leading the biometrics market into the future,” Song remarked.
ComplyAdvantage, a global data technology company transforming financial crime detection announced that Gemini, a crypto exchange and custodian selected ComplyAdvantage’s hyperscale platform for anti-money laundering risk management. Compliance teams around the world need access to intelligent technologies that can uncover risk in real-time and decrease operational costs so their companies can transact with trust and grow with confidence. With the accelerated adoption of cryptocurrency and digital assets, Gemini wanted a solution that could continue to scale with its rapid growth. Customizable solution “We selected ComplyAdvantage because of the company’s agile approach to financial crime risk management,” said Elena Hughes, Chief Compliance Officer at Gemini. “ComplyAdvantage’s hyper-scalable model, customizable screening solution, and collaborative approach to Gemini’s model were critical to meeting our compliance needs.” Risk monitoring and real-time analysis Leveraging its proprietary data asset and advanced machine learning, ComplyAdvantage helps to detect sanctions and adverse events while uncovering hidden risks during customer onboarding and throughout the client lifecycle, automating AML risk monitoring to help companies like Gemini maintain the highest level of compliance oversight and integrity. "Gemini is a great example of a market leader implementing the best in compliance practices to support the company’s customer on-boarding,” said Charles Delingpole, founder and CEO ComplyAdvantage. “Now, Gemini can scale with our real-time, high-quality sanctions, PEPs, and adverse media solutions, allowing them to make more informed decisions on their customers relative to their risk-based approach.” Prevents financial crimes Already the preferred choice of some of the world’s largest banks, enterprises, and high-growth fintech, ComplyAdvantage uses machine learning to help regulated organizations manage their risk obligations and prevent financial crime. The company’s proprietary database is derived from millions of data points that provide dynamic, real-time insights across sanctions, watchlists, politically exposed persons, and negative news. This reduces dependence on manual review processes and legacy databases by up to 80% and improves how companies screen and monitor clients and transactions.
With a mission to recognize the faces of the people entering/exiting premises of the Government Institution in Indonesia, and analyze their attributes in real-time, the authority needed an extremely robust and ‘highly secured’ facial recognition system. Due to heavy footfall at the premise, it was difficult for staff to manually record information of visiting people and verify their identity on a daily basis. Sometimes, they faced challenge in verifying them due to changes in appearance or features of the visitors. Videonetics MeraFace Videonetics MeraFace, the advanced facial recognition software was selected after a thorough technical evaluation Videonetics MeraFace, the advanced facial recognition software was selected after a thorough technical evaluation by the partner, as well as government decision-makers. The software was selected for its highest accuracy in recognizing and detecting faces in varied lighting conditions, thereby providing additional attributes of gender, age, and emotions, and comprehensive statistical reporting. Operating 24x7 for 365 days, on one of the busiest premises, with a heavy footfall of VIPs, citizens, media, and government officials, Videonetics MeraFace was deployed at strategic locations with high human traffic flows, including entry and exit points, and lift lobby area of the institution. Key features of Videonetics MeraFace include: Video streams from IP cameras are processed at MeraFace to detect faces in real-time and operators find a probable match with the registered faces. In case, any face that is not registered but has been captured and stored in the system can also be found anytime. Operators have been keeping records of registered faces and attributes of the person’s face for future search and investigation. Powered by AI & Deep Learning framework, MeraFace analyzes and delivers more information, such as gender, age, emotion, eventually helpful for officials to make accurate visitors’ analysis. Now, operators can identify and classify VIP, suspected, blacklisted people in real-time with easy clicks and send the instant notification to the staff, for any swift action. At the time of any suspicious activity, operators can quickly investigate a person’s face in the given videos or collection of face images. Moreover, this feature has been phenomenally successful as an investigation tool, for conducting post-incident analysis. Scalable facial recognition system Videonetics MeraFace has proven to be a reliable and scalable system for the government authority, by delivering fast and highly accurate results. With the system, the security staff can recognize and detect faces in real-time. Furthermore, MeraFace has helped in appointing a smaller number of security guards around the entrance or exit of the premise, thanks to an automated facial recognition system of identifying and validating information. The risk of human errors in face matching has also been eliminated. “Videonetics has not only delivered a perfect facial recognition solution, but also delivered on its reputation of providing outstanding training and support, to us and customer. Our customer has invested in the future-proof technology that has the ability to grow with their needs,” stated Alfred Bisuk, Technical Manager, Lamjaya Inovasi Komputindo.
Check Point Research (CPR) discovered new malware on Google’s Play Store that spreads via WhatsApp messages. The malware is designed to automatically respond to incoming WhatsApp messages on the victim’s device, using content that the malware downloads from a remote server. Hidden in fake Netflix app CPR found the malware hidden in a fake Netflix application on the Play Store called FlixOnline, which promised unlimited entertainment from anywhere in the world. If successful, the malware enables its threat actors to perform a range of malicious activities, such as spreading additional malware via malicious links, stealing credentials and data from users' WhatsApp accounts, and spreading fake or malicious messages to users. WhatsApp contacts and groups, for example, work-related groups. Malware spreading through link The malware was designed to be wormable, meaning it can spread from one Android device to another after a user clicks on the malicious link in the message and downloads the malware. It works like this: Victim installs the fake FlixOnline app from Google’s Play Store which contains the malware The malware changes permissions on the user’s device to enable automatic responses to new notifications on WhatsApp The malware responds to every WhatsApp message the victim receives with an automatic reply crafted by the threat actors In this campaign, the response was a fake Netflix site that phished for users credentials and credit card information Automated response The malware sent the following automatic response to its victims incoming WhatsApp messages, attempting to lure others with the offer of a free Netflix service: 2 Months of Netflix Premium Free at no cost For REASON OF QUARANTINE (CORONA VIRUS)* Get 2 Months of Netflix Premium Free anywhere in the world for 60 days. Fake service within the application CPR found the malware hidden within an application on Google Play called FlixOnline CPR found the malware hidden within an application on Google Play called FlixOnline. The app turned out to be a fake service that claimed to allow users to view Netflix content from around the world on their mobiles. However, instead of allowing the mobile user to view Netflix content, the application is actually designed to monitor a user’s WhatsApp notifications, sending automatic replies to a user’s incoming messages using content that it receives from a remote server. Innovative hijack technique Aviran Hazum, Manager of Mobile Intelligence at Check Point Software said, “The malware’s technique is new and innovative, aiming to hijack users. Whatsapp account by capturing notifications, along with the ability to take predefined actions, like dismiss or reply via the Notification Manager.” “The fact that the malware was able to be disguised so easily and ultimately bypass Play Store’s protections raises some serious red flags. Although we stopped one campaign using this malware, the malware may return hidden in a different app.” Mobile security solution Users should be wary of download links or attachments that they receive via WhatsApp or other messaging apps The Play Store’s protections can only go so far, so mobile users need a mobile security solution. Luckily, we detected the malware early, and we quickly disclosed it to Google who also acted quickly. Users should be wary of download links or attachments that they receive via WhatsApp or other messaging apps, even when they appear to come from trusted contacts or messaging groups. If you think you’re a victim, we recommend immediately removing the application from devices and changing all passwords. App taken down by Google CPR responsibly disclosed its findings to Google. The malicious application was subsequently taken down by Google. Over the course of two months, the FlixOnline app was downloaded approximately 500 times. CPR has shared its research findings with WhatsApp, though there is no vulnerability on WhatsApp’s end. Security Tips for Android Users Install a security solution on your device Download applications only from official markets Keep your device and apps up to date
Strong price pressure combined with high-quality requirements - the beverage and bottle industry faces the classic dilemma of many industries. This is also the case in the quality control department of a French manufacturer of plastic caps. Reliably detecting cracks and micro-cracks on plastic caps in 40 different colors and shades running at high speed on a production line is a real challenge. APREX Solutions from Nancy, France has successfully achieved this goal with the help of image processing technology and artificial intelligence. The basic images are provided by a USB 3 industrial camera from IDS Imaging Development Systems GmbH. System inspection SOLOCAP is a subsidiary of La Maison Mélan Moutet, "flavor conditioner since 1880" and manufactures all types of plastic caps for the food sector at its industrial site in Contrexéville. Among them, a top-class screw cap suitable for any glass or PET bottle. The presence of a clampable lamella ring arranged around the bottle collar enables a simple, fast, absolutely tight, and secure seal. However, the slats must be reliably and extremely carefully checked for cracks, tears, and twists during production. This is the only way to guarantee absolute tightness. The previous inspection system could not meet these high requirements. APREX Solutions realized the new solution with artificial intelligence individually on the basis of in-house software algorithms. The necessary specifications were developed in advance in cooperation with the customer. This also included several inspection stages, one of which, for example, was the reject control to avoid false reports. Implementing of AI solution Four control levels with several test points guarantee a reliability rate of over 99.99% The introduction took place in two phases: First, the specific "SOLOCAP application" was trained with the help of the intelligent APREX Track AI solution. The software includes various object detectors, classifiers, and standard methods that operate at different levels. Networked accordingly, they ultimately deliver the desired result tailored to the customer. Four control levels with several test points guarantee a reliability rate of over 99.99%. In the second step, this application was implemented in the production line right after the first assembly run with APREX Track C&M. The latter was specially developed for the diverse image processing requirements in the industrial sector. This includes, among other things, the control and safeguarding of a production line up to the measurement, identification, and classification of defects in the production environment. The software suite delivers the desired results quickly and efficiently, without time-consuming development processes. Ready to use After a short training of the AI methods, the complete system is ready for use at the customer. In the case of SOLOCAP, it combines an IDS UI-3280CP-C-HQ industrial camera, powerful ring illumination, and a programmable logic controller (PLC) to provide comprehensive control over all inspection processes. At the same time, it records all workflows in real-time and ensures complete traceability. Only one camera is needed for this. However, APREX TRACK C&M could handle up to 5 cameras. High-resolution images “The difficulty of this project consisted mainly in the very subtle expression of the defects we were looking for and in the multitude of colors. With our software suite, it was possible to quickly set up an image processing application. Despite the complexity," explains Romain Baude - founder of APREX Solutions. The image from the camera provides the basis for the evaluations. It captures every single cap directly in the production line at high speed and makes the smallest details visible to the software. Easy integration of camera The USB 3 industrial camera provides excellent image quality with extraordinarily low noise performance The UI-3280CP-C-HQ industrial camera integrated into the system with the 5 MP IMX264 CMOS sensor from Sony sets new standards in terms of light sensitivity, dynamic range, and color reproduction. The USB 3 industrial camera provides excellent image quality with extraordinarily low-noise performance - at frame rates up to 36 fps. CP stands for "Compact Power". This is because the tiny powerhouse for industrial applications of all kinds is fast, reliable, and enables a high data rate of 420 MByte/s with low CPU load. Users can choose from a large number of modern CMOS sensors from manufacturers such as Sony, CMOSIS, e2v, and ON Semiconductor with a wide range of resolutions. Plug and play Its innovative, patented housing design with dimensions of only 29 x 29 x 29 millimeters makes it suitable for tasks in the fields of automation, automotive, medical technology and life sciences, agriculture, logistics as well as traffic and transport, among others. Screwable cables ensure a reliable electrical connection. Due to the IDS-characteristic plug & play principle, the cameras are automatically recognized by the system and are immediately ready for use, as Romain Baude confirms, "The excellent color reproduction of the UI-3280CP-C-HQ and its high resolution of 5 MP were decisive factors for us in choosing the camera. At the same time, the model enabled a quick, uncomplicated integration into our system." Outlook Anthony Vastel - Head of Technology and Industry at SOLOCAP - sees a lot of potential in the new inspection system, "APREX's AI-based approach has opened new doors for our 100% vision-based quality control. Our requirements for product safety, but also for reject control, especially in the case of false reports, were quickly met. We are convinced that we can go one step further by continuing to increase the efficiency of the system at SOLOCAP and transferring it to other production lines." AI offers quality assurance, but also all other industries in which image processing technology is used, new, undreamed-of fields of application. It makes it possible to solve tasks in which classic, rule-based image processing reaches its limits. Thus, high-quality results can be achieved with comparatively little effort - quickly, creatively, and efficiently. APREX Solutions and IDS have recognized this and offer solutions with intelligent products that make it easier for customers to enter this new world.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, today shared the results of its ‘Physical Security in EMEA 2021’ report, based on insights from over 1,500 physical security professionals. The report takes a closer look at how physical security teams across Europe, Middle East, and Africa (EMEA) are leveraging technology to manage both short-term needs and long-term priorities. The findings offer useful insights for those responsible for developing their organization’s own infrastructure and security strategies. 2020 has refocused priorities The realities of COVID-19, and the subsequent shift to work at home, have emphasized the value of technology that can provide greater insight and control. As a result, video analytics, access control, and identity management were all identified as strategic technologies for 2021. “Last year we saw a seismic shift in the way companies approach security. The access control boom within facilities showed that the physical security industry is capable of streamlining innovative solutions—particularly when there’s a demand for enhanced safety. As we enter a new chapter, the industry must continue to adapt to changing requirements and invest in the latest enabling solutions to help make our workplaces safer, healthier, and more secure,” said Cyrille Becker, Managing Director of Europe at Genetec. Cybersecurity is a strategic priority Cybercrime is primed to reach record heights in 2021, with the rise of work-from-home and the growing adoption of IoT Cybercrime is primed to reach record heights in 2021, with the rise of work-from-home and the growing adoption of IoT. Against this backdrop, 67% of respondents are planning to prioritize the improvement of their cybersecurity strategy in 2021. “The rise of cybercrime has highlighted cyber and physical security measures can no longer be treated as separate conversations. Physical security professionals must partner with their counterparts in IT to understand the true limits of the security perimeter and mitigate against risk. This requires solidifying a resilient cyber-physical security framework, to ensure trusted devices are integrated into the network and subsequently configured, updated, and managed throughout their operational life,” said Christian Morin, Vice President of Cloud Services and CSO at Genetec, Inc. Accelerating adoption of cloud and hybrid cloud Physical security departments have traditionally been slower to adopt the cloud; however, the survey results indicate the situation is rapidly changing. Almost two-thirds of respondents reporting the pandemic has somewhat (51%) or greatly (12.5%) accelerated their cloud strategy in relation to physical security. “The unprecedented shift to remote work and the resulting need for supporting technology, has highlighted the importance of cloud computing and, if business leaders had not been convinced of its benefits before, they are likely to be now,” added Morin. Survey methodology In January 2021, Genetec EMEA surveyed physical security professionals based in Europe, Middle East, and Africa. Following a review of submissions and data cleansing, 1,550 respondents were included in the sample for analysis.
Round table discussion
Security technology has been a vibrant and successful market for decades now, but sometimes the public is not aware of those successes. Awareness in some cases is limited because security technologies work ‘behind the scenes’ to keep everyone safe. In other cases, the industry may be seen in a negative light, based on misinformation about topics such as surveillance and privacy. How can we get the word out about our industry’s successes? We asked this week’s Expert Panel Roundtable: How can the security industry market and promote itself better?
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?