According to a recent wide-ranging article on data security in Computer Weekly: “physical security is key to maintaining the resilience and effectiveness of data centers… businesses end up exposing themselves to a range of risks in this area of security is ignored.” A lack of investment in the physical security of servers undermines the cyber-security of data assets and vice versa. Appropriate physical security controls manage risk by minimizing unauthorized access to server...
Aiphone, an international manufacturer of intercom and security communication products, is announcing a touchless sensor that allows a way for visitors, vendors, and employees to initiate a contactless call with a simple gesture. Gesture activated calling Compatible with the IX Series door stations for easy installation, the sensor encourages users to “Wave Hello” to activate a call, reducing exposure to germs and the spread of bacteria in high-touch areas. This touchless solution...
Hikvision, a manufacturer and supplier of security products and solutions is launching a special, limited-time promotion on the company’s next generation of intelligent AcuSense PCI series cameras. Employing advanced deep learning algorithms, AcuSense cameras can accurately distinguish people and vehicles from other moving targets such as animals and shadows in real-time, vastly improving detection accuracy while reducing costly false alarms. Improve safety and security “Our next...
DigiCert, Inc., a provider of TLS/SSL, IoT, and other PKI solutions, announced the DigiCert Smart Seal, a new dynamic site seal that gives website visitors confidence that their information is secure on the web. Real-time security turn signals enabled through various micro-interactions alert visitors that the seal is actively present on the page, the site has been validated, and the site is protected by an active certificate from the world’s most trusted certificate authority. DigiCert v...
Check Point Software Technologies Ltd., a provider of cybersecurity solutions globally announced the launch of Check Point Cloud Academy in partnership with its Platinum Elite ATC Partners - Arrow Electronics, Red Education, and Westcon Security. Check Point Software is the first security solutions provider to address the knowledge gap in the industry by offering a dedicated certified education program specializing in cloud security globally. Opportunities for professionals Open to Check Poin...
Offering enhanced security and personalized access control, Nortek Control has launched its new Linear BT135-W Access Control Reader and Linear BT125-W Access Control Reader. The new readers integrate Bluetooth Low Energy (BLE) technologies, providing users intelligent, contactless and secure access control in a slim design, which fits seamlessly into any office or building environment. Furthermore, the new Linear readers provide dealers and end-users several options to customize access control...
With resistance to attack and extreme weather, wire-free installation, and battery-powered operation, the new SMARTair i-gate Electronic Padlock is built for use almost anywhere. This new device in the SMARTair wireless access control range enables facility managers to add real-time control to non-electrified gates, cupboards, cabinets, closets, crates, and more, wherever they are and whatever the climate. SMARTair i-gate Electronic Padlock For many organizations, security and access needs to not stop at the perimeter door. Yet, finding reliable locking devices that are easy to operate with an electronic access system can be difficult. Gates and outbuildings are hard to reach with cabling. Access devices may not have the resilience required for reliable operation outdoors. The i-gate is built to meet these challenges. “The new SMARTair i-gate Electronic Padlock helps our customers extend wire-free control to new access points,” said Félix Morán, SMARTair Product Manager at ASSA ABLOY Opening Solutions EMEA. Adaptable locking devices It can be instantly moved to wherever a resistant, adaptable locking device is needed" Félix Morán adds, “It can be instantly moved to wherever a resistant, adaptable locking device is needed. Site managers no longer need to worry about outbuildings, gates, cupboards and more, because they can monitor and control access to them electronically, remotely and in real time, when needed.” Upgrading an existing padlocked closure involves simply swapping the devices and integrating i-gate Padlock into an existing or new SMARTair wireless access control system. No drilling or wiring is required. The SMARTair i-gate Padlock is available in a contemporary black finish with stainless steel shackle. Remote control via SMARTair Web Manager Exterior and interior openings previously unsuited to electronic access control can now be controlled and monitored from a familiar software interface, including remotely from the SMARTair Web Manager. The SMARTair i-gate is compatible with any SMARTair system management option – Standalone, for basic access control functionality, Update on Card, Openow, for access management and unlocking via smartphone, and Pro Wireless Online, for real-time management of every door and system user. Compatible with standard proximity credential technologies The new SMARTair i-gate padlock is robust enough for almost any climate conditions. It has a watertight cover (IP68 rating) and an internal cylinder with Durability EN 15684 Class 6 Certification. It is battery-powered and works with all standard proximity credential technologies, including MIFARE, DESFire, and iCLASS, as well as Bluetooth Low Energy (BLE). When combined with Openow, the mobile solution for SMARTair, users no longer need to carry separate card or fob credentials. Instead, their phone stores secure virtual keys that can be issued, amended, or canceled at any time. Mobile access No one wastes time collecting or validating an access card, because they can unlock the new SMARTair i-gate Padlock with a smartphone. With Openow, if one is carrying a phone, they are already carrying their keys.
IMCO Group, a provider of complex solutions for air, land, and maritime defense applications, held a special two-day demonstration of its solutions and capabilities at its showroom in Rosh Ha'Ayn, Israel. One-Stop-Shop Solution Together with its subsidiaries and partners, IMCO Group offers One-Stop-Shopping for end-to-end Terrain Dominance Solutions which includes a range of hardware and software solutions offering scalable tactical superiority capability using UAVs, hovering platforms, UGVs, and manned vehicles equipped with sensors, modular multi-axial positioners, communications, proprietary command and control systems, and independent computing power on the battlefield. Visitors in attendance IMCO Group and partners' complete value chain also includes, among other things, in-house PCB design and assembly capabilities. Military attachés, ambassadors, and representatives from various countries across the globe visited the showroom during the two-day demonstration and witnessed the capabilities of IMCO, its subsidiaries, and partners. AI-enabled SAVS Nir-Or, which designs, develops, manufactures, and integrates innovative video systems and electronic solutions for various military platforms that maximize survivability and lethality at land, air, and sea, demonstrated its Situation Awareness Video System (SAVS). SAVS offers continuous 360° terrain and situational awareness for land and marine vehicles together with embedded AI Nir Or's SAVS offers continuous 360° terrain and situational awareness for land and marine vehicles together with embedded Artificial Intelligence (AI) that supports decision-making solutions on the battlefield. It reduces the cognitive load while maximizing the lethality and survivability of the crew. UAV for ISR missions Innocon Ltd., an innovative Israeli developer, and manufacturer of Tactical UAVs ranging from micro-UAVs to full-size light airplanes presented its MicroFalcon: a lightweight UAV for over-the-hill ISR missions. Its high survivability, fast redeployment time cycle, and cost-effective price tag make it an ideal UAV for the military, civilian, and HLS markets. Innocon's MicroFalcon is already operationally deployed by many customers worldwide, including NATO member countries, and has a NATO Stock Number. Robotics and video systems Ex-Sight, which specializes in research & development and provision of full turnkey solutions of robotic technologies for the public sector and security markets, presented its Ground and maritime Vehicles for border defense, 3DV Stereoscopic Day & Night Driver Vision Enhancement systems for Armored vehicles, and Mid-range Electro-optic payloads. Turning product ideas into reality, Ex-Sight has been selected by Israeli forces to develop cutting-edge tactical robotics and video systems that are integrated into several leading projects. Detection and positioning systems Capture systems, a manufacturer of Pan & Tilt positioners, presented its ATID Anti-Threat Intelligent Detector, Caracal pan & tilt unit based on a gunnery station, and Jaguar: a heavy-duty unit designed to be a true REAL-TIME long-range observation system, capable of supporting payloads up to 60 Kg without losing precision. The modular multi-axial positioners are ideal for air, land, and sea military uses and vision, and pointing systems Capture's advanced modular multi-axial positioners are ideal for air, land, and sea military uses, HLS, commercial/industrial, Satcom, communication antennas, measurement systems, vision, and pointing systems. 24/7 real-time surveillance Sky Sapience, a provider of tethered hovering platforms enabling 24/7 real-time ISR, demonstrated its HoverMast: a cellphone, operationally proven tethered hovering platform that provides top-level observation and surveillance capabilities at altitudes up to 150 meters. The HoverMast can host any payload, up to 11 kg., and operates autonomously, on the move, in harsh weather. Intuitive and easy to operate, the HoverMast enables immediate and continuous data transmission through a wideband link, setting up valuable communication between different teams. Enhancing situational awareness IMCO Industries CEO, Mr. Eitan Zait, "We were honored and excited to hold this special demonstration and present the complete capabilities of IMCO Group and partners to customers, Military attachés, ambassadors, and representatives from various countries.” “Turning ideas into reality, IMCO Group is a one-stop-shop for complete tailor-made turn-key terrain dominance solutions that enhances user's situational awareness and ensures high lethality and survivability."
Camden Door Controls is pleased to launch its CV-603 2 Door Bluetooth Access Control System. This app-based access control system is designed to provide ‘best-in-class’ security of doors and gates, with up to 2,000 users. The intuitive programming app is Apple and Android compatible, with easy-to-use system setup, user administration, downloadable audit trail and data backup. CV-603 two door controller The CV-603 two door controller includes inputs for readers, door position switch and REX device, and (2) outputs for electrified locking or alarm signal devices. A built-in 433Mhz. receiver supports two button wireless key fobs, providing an ideal solution for parking garage and gate control applications. The CV-603 two door controller is 26, 30 & 37 bit Wiegand reader compatible and features anti-pass back, schedules, first person-in delay, and operator security levels.
In the AIoT era, the world is getting smarter. Everything is going to have an online “ID” and then connected into a vast net of IoT devices, like a laptop computer, a cellphone phone, a connected thermostat, or a network security camera. Cybersecurity in the AIoT era According to a Markets and Markets report, IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, currently, there are no unified global technical standards for IoT, especially in terms of communications. This results in inefficient data management and reduced interoperability mechanism and ultimately may cause reduced security in the IoT network. The global Internet of Things (IoT) security market size is expected to grow from USD 12.5 billion in 2020 to USD 36.6 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 23.9%. Importance of cybersecurity Various vertical industries store unprecedented amounts of data on devices like IP cameras and NVRs Dahua Technology, a video-centric smart IoT solution and service provider, believes cybersecurity is of vital strategic importance in the age of AIoT. In various vertical industries, such as traffic, banking & finance, hospital, and critical infrastructure, organizations collect, process, and store unprecedented amounts of data on devices like IP cameras and NVRs. A significant portion of that data can be sensitive or private information, which can be prone to cyber-attacks and the situation, is getting worse because there are more devices than people. As a security solution provider, Dahua Technology continuously invests in cybersecurity and actively copes with network security issues. Continuous investment & active coping Committed to becoming a leader in cybersecurity and privacy protection in the global security industry, Dahua Technology has been developing and exploiting cybersecurity for nearly 10 years. The company keeps investing about 10% of its annual sales revenue in R&D every year, including cybersecurity. In addition, the company put together a professional team of nearly 100 personnel to focus on cybersecurity issues. With rich experience and sufficient resources, Dahua Technology promises to be positive, open, cooperative, and responsible when it comes to cybersecurity. Dahua Technology cybersecurity approach 1. Organizational structure In order to achieve better efficiency and effectiveness, Dahua Technology operates a comprehensive system to cope with all cybersecurity-related issues. The system, led by the cybersecurity committee, also contains a cybersecurity & data protection compliance group, cybersecurity institute, and product security incident response team (PSIRT). The cybersecurity committee, above all departments or teams, can call resources from the whole company, from the R&D center to the legal department, supply chain, overseas business department, etc. when necessary. Cybersecurity Institute is in charge of building the sSDLC process and implementing the process to all Dahua product series, making sure that all Dahua products are strong against cyberattacks. 2. Security development lifecycle Dahua adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security Dahua Technology adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security. During the security design phase, STRIDE + Attack Tree + PIA is adapted to improve threat modeling. During the security realisation phase, OWASP top 10 and over 150 CWEs are used to achieve static code analysis. During the security test phase, over 20 tools within 7 fields are applied to realize the multiple security testing. CompTIA PenTest+/Security+ are used to carry out professional penetration testing, while compliance ISO 30111&290147 and MITRE org CAN are followed during vulnerability management after the products are sold. 3. Emergency response system Cooperation with professionals from across the globe is a great way to improve vulnerability detection. Therefore, Dahua Cybersecurity Center (DHCC) is established to solve cybersecurity issues with security vulnerability reporting, announcement/notice, and cybersecurity knowledge sharing with our global customer base in order to provide them with more robust and secure products/solutions. Product Security Incident Response Team (PSIRT) is an integral part of DHCC. Composed of professionals ranging from marketing, supply chain, service, and legal representatives, PSIRT is responsible for receiving, processing, and disclosing Dahua product and solution-related security vulnerabilities. Team members are on duty 7 days a week and guarantee to respond to an emergency within 48 hours. End-user, partner, supplier, government agency, industry association, and independent researchers are encouraged to report potential risk or vulnerability to PSIRT by email. 4. Personal data & privacy protection Dahua Technology also attaches great importance to personal data & privacy protection. Complying with applicable laws and regulations such as EU’s General Data Protection Regulation, EDPB’s Guidelines on the concepts of controller and processor in the GDPR, ETSI EN 303645’s Cyber Security for Consumer Internet of Things: Baseline Requirements as well as US’s California Consumer Privacy Act, the company established the Personal Data & Privacy Protection Standard. The standard stipulates that privacy protection methods such as de-identification, data encryption, and systematic access control, privacy-friendly setting are fully adapted to the complete data life cycle all the way from the collection, transmitting, storage to sharing, copying, and deleting. In addition, working with world-renowned third-party institutions, Dahua Technology has received Protected Privacy IoT Product Certification and ETSI Certification from TÜV Rheinland, as well as ISO 27018 Certification and ISO 27701 Certification from BSI, which help demonstrating its capability in managing personal information and compliance with privacy regulations around the world. 5. Continuously iterating security baseline The security baseline built a security element layout of "AAA+CIA+P", a systematic protection framework Centered on the core principles of Security by Design and Security by Default, the Dahua security baseline initiative taps into product safety technology to provide users with adequate safety guarantees. Based on and practicing the security and privacy design principles, the security baseline builds a security element layout of "AAA+CIA+P", forming a systematic protection framework covering physical security, system security, application security, data security, network security, and privacy protection. 7 versions of baseline and 100+ principles have been developed to adapt Authentication, Authorization, Audit, Confidentiality, Integrity, Availability, and Privacy protection deeply into the product quality assurance system, making sure that all Dahua products enjoy the factory default security. 6. Product security center In order to help users clearly understand the security status and capabilities of the device, the product security center will assist users to conveniently and quickly set up the right security configuration to suit the scenarios. General security capabilities include privacy protection (face occlusion, information hiding, etc.), video encryption, security alarm, trusted protection, CA certification management, key management service, attack defense, and so on. 7. Cybersecurity ecosystem Adhering to openness and cooperation, Dahua Technology keeps cooperating with international authoritative security institutions to jointly build a secure ecosystem. By rich & in-depth communicating and cooperation with institutions like TÜV Rheinland, BSI, DNV·GL, Intertek EWA-Canada, and bright sight security lab, the company stays advanced its security capabilities and systems. In a widely networked world of IoT, cybersecurity challenges are pretty much a universal sore spot for companies globally. Dahua Technology, in the business of keeping people safe, takes cybersecurity seriously from head to toe. With a mindset that emphasizes cybersecurity and all the resources that it can allocate to establish, carry out and strengthen the cybersecurity approach, Dahua Technology plans to stay positive, open, responsible and improving for the matter of cybersecurity.
The new FLEXIDOME IP starlight 8000i X series cameras offer enhanced image quality for low-light scenes and fast-moving objects, thanks to two resolution offerings of 2- or 4-megapixels and next-level HDR X and starlight X technologies. HDR X and Starlight X technologies HDR X enables the cameras to optimize video capture in scenes with fast-moving objects with a dynamic range up to 144 dB, ensuring perfect exposure, while reducing motion-related artefacts and blur in the daytime. The new Starlight X technology helps to significantly improve image quality during the day and excels in near-dark scenes, ensuring color images down to 0.0061 lux due to its custom optics, Bosch advanced image processing algorithms, and noise suppression. The camera’s new 1/1.8 inch sensor further improves image quality across all light levels. Capitalizing on the significantly improved image quality of the X series, the camera’s built-in Artificial Intelligence (AI), which features Intelligent Video Analytics and Machine Learning (Camera Trainer), offers more relevant data-supporting predictive solutions in mission-critical applications. FLEXIDOME IP starlight 8000i X series The new X series extends the outdoor fixed camera portfolio of the FLEXIDOME IP starlight 8000i family The new X series extends the outdoor fixed camera portfolio of the FLEXIDOME IP starlight 8000i family, by delivering an ideal mix of resolution, light sensitivity, dynamic range, and frame rate all at once for mission-critical applications that demand the highest image quality combined with actionable insights, 24/7. In extreme low-light scenes, starlight X technology provides clear and relevant images with color filtering down to 0.0061 lux. Motion-optimized HDR X technology has a dynamic range of up to 144 dB, ensuring perfect exposure, while eliminating motion-related artefacts and blur in scenes with challenging lighting conditions and fast-moving objects or vehicles in tunnels and on roadways. Exceptional image quality and robust design The camera’s exceptional image quality is backed by a comprehensive, robust design that is water and dust resistant, with an IP66 and IP6K9k rating, and is vandal resistant with IK10+ housing. It withstands temperatures ranging from -50 to +60°C (-8 to +140°F). The high-quality, dual-layer coating of the camera also protects against corrosion (IEC 60068-2-52 1344h), making the X series ideal for challenging outdoor applications. Built-in AI supports predictive solutions All FLEXIDOME IP starlight 8000i cameras come with built-in AI featuring Intelligent Video Analytics and Camera Trainer to support predictive solutions. This built-in AI enables these cameras to understand what they see and attach a layer of metadata to video feeds to convert video data into actionable insights, helping users anticipate unforeseen events and prevent them from happening. Intelligent Video Analytics is highly resistant to false triggers caused by demanding weather conditions, such as snow, wind, rain, hail, and water reflections, and environments subject to vibration, such as on bridges. It provides automatic object detection over large distances, making it ideal for mission-critical applications such as perimeter protection of airports, parking lots, critical infrastructures, government buildings, border patrol, ship tracking, and traffic monitoring. Combined with Starlight X technology, this built-in AI provides more rich data, even in extreme low-light situations. Camera Trainer, based on machine learning, enables system integrators to tailor Intelligent Video Analytics to detect objects or situations that matter most to their customers. Remote device management Bosch remote device management is a combination of tools like Project Assistant and Configuration Manager Bosch remote device management is a combination of tools like Project Assistant and Configuration Manager, and services for secure, transparent, and cost-effective device management throughout a product’s life. The innovative remote wireless configuration and commissioning functionality of the FLEXIDOME IP starlight 8000i range enables installers to work smarter while onsite. When commissioning, installers typically must climb up and down ladders or hire lift equipment to reach cameras at high levels. With any FLEXIDOME IP starlight 8000i camera, commissioning can be done entirely wireless, no need for ladders or lifts. Bosch Project Assistant app Installers can use the Bosch Project Assistant app installed on a wireless tablet or smartphone to adjust the pan, tilt, roll, and zoom (PTRZ) and set the required field of view without touching the camera or lens. The new X series cameras, as with all Bosch cameras, connects securely to the Bosch Remote Portal, a cloud-based service offering device management with daily or advanced configuration and set up and continuous health monitoring from any offsite location. Bosch’s Green Way approach Any PTRZ adjustments required post installation for new store layouts or altered high-risk zones, for example, can be conducted remotely to save time, costs, and effort. System integrators can work remotely with customers to perform services, such as changing configuration settings or installing firmware updates, ensuring systems meet the highest reliability standards. The remote device management and wireless commissioning process minimizes the number of commutes, resulting in sustainable business practices that are economically viable, socially responsible, and environmentally friendly. This approach is called Bosch’s Green Way promise.
SKIDATA, the globally renowned company in parking access and revenue management, has announced a new technology integration partnership with Openpath, an international company in touchless and modern access control, and workplace safety automation. SKIDATA – Openpath partnership Through this partnership, Openpath’s ground-breaking touchless and mobile access control technology will be integrated into SKIDATA’s parking access and revenue control equipment, in order to permit drivers to enter and exit SKIDATA-equipped parking facilities, using their Openpath credentials. “We are excited to be partnering with Openpath,” said Darrell Smithson, President for North America region at SKIDATA, adding “SKIDATA already makes the world’s most reliable and user-friendly parking equipment. The addition of Openpath’s technology will improve the customer experience by providing seamless entry into parking facilities.” Touchless and mobile access control This partnership will help ensure that SKIDATA will continue to lead the way in providing smart city infrastructure" “SKIDATA has always led the way when it comes to introducing new technological capabilities to the parking industry,” continued Darrell Smithson, adding “This partnership will help ensure that SKIDATA will continue to lead the way in providing smart city infrastructure.” The addition of Openpath’s technology, which provides touchless and mobile access via Bluetooth, Wi-Fi, and LTE technologies, to SKIDATA equipment, will permit drivers to access SKIDATA-equipped parking facilities with their smartphones and other personal devices, as well as via license plate recognition (LPR), allowing drivers to enter and exit parking garages quickly and conveniently, without having to stop and swipe a card, or reach out of their vehicle to validate parking access. Mobile access for parking facilities When drivers approach the parking facility, they can gain access via the SKIDATA app on their personal devices. Bluetooth, Wi-Fi, and LTE connectivity access are most useful for managing permit parking and the technology is perfect for parking owners and organizations, which offer permit parking, including residential facilities, office complexes, universities, hospitals, airports, special events parking, and stand-alone parking garages. James Segil, President and Co-Founder of Openpath, “With this integration, we are excited to further demonstrate how Openpath’s seamless user experience extends beyond just the four walls of a building. Providing safety and simplicity for users throughout their day; from the moment their vehicle enters the parking garage, to the doors, elevators, and turnstiles they use in repetition. End-to-end security solution James Segil adds, “Openpath’s technology enables a completely touchless experience for tenants and guests, and eliminates the need for users to juggle multiple apps or credentials to get where they are going. Our mission is always to deliver end-to-end security, while reducing friction and this integration is another great example of that.”
Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an emergency and need to make sure everyone’s exited the building. Indoor positioning helps in all these situations, because it can locate items and guide you to where they are. The importance of “where” Knowing where an asset is located in real time is useful in many ways. In industrial settings, it improves item utilization rates and saves time spent searching for things. It opens the door for a new level of “just in time” efficiency on factory floors, and for inventory management in warehouses and retail environments. Safety is another benefit of accurate location, because knowing where people, automatic guided vehicles, and robots are in real time can help prevent accidents and keep people out of harm’s way. Accurate location in real time also enables contextual decision-making, so your smart house adjusts your stereo automatically as you move from to room or lets you control objects by simply pointing at them. Lets you control objects by simply pointing at them Security authorisations based on location is another possibility. Precise real-time location is something that can be hard to fake, so it can be used to restrict access to an area or used to add protections based on where an asset sits, where a piece of data resides, or the origination point of a communication. Getting the technology right Developing an effective technology for indoor positioning requires several things. To begin with, location readings needs to be very precise, with accuracy down to as small an area as possible. The technology has to be secure, because location often needs to be kept private. The technology has to be reliable, even in harsh environments, and easily scalable, too, so it can address the thousands of people and assets in large venues. It has to be low power and affordable, so it can be embedded in everything from high-end, complex devices like smartphones to low-end, simple devices like asset tags. And, of course, the technology has to have latency low enough that it can track movement in real time. Various wireless technologies, including Bluetooth and Wi-Fi, are already used for indoor positioning, but they don’t deliver on the full set of requirements, especially in terms of accuracy. A different kind of wireless, called Ultra-Wideband (UWB) checks all the boxes. It has the potential to change the way we do all kinds of everyday tasks. What is UWB? UWB is based on the IEEE standard 802.15.4a/z, which has been optimized for micro-location and secure communication. UWB is highly accurate. It can pinpoint people and things to within just a few centimeters, making it 100 times more accurate than the current implementations of Bluetooth Low Energy (BLE) and Wi-Fi. UWB is reliable because it has high immunity to various types of interference, including multipath, which is when a wave from a transmitter traveling to a receiver by two or more paths causes interference. UWB also offers very low latency, with update rates of up to 1000 times per second and readings that are as much as 50 times faster than satellite navigation. UWB is also implemented using mainstream technology, so it’s both affordable and optimized for low power. Lastly, UWB leverages distance-bounding techniques defined by the IEEE to provide a level of security that makes it extremely difficult to hack. Ultra-Wideband (UWB) checks all the boxes How is all this possible? Physics! UWB out-performs other location technology because, unlike Bluetooth and Wi-Fi, which transmit narrowband signals and use Received Signal Strength Indicator (RSSI) to determine location, UWB transmits wideband signals (500 MHz) and uses Time-of-Flight to determine location. Already in 40+ verticals UWB is already bringing value to products and services in more than forty verticals covering the consumer, automotive, industrial, and commercial market segments. For example, it brings operational visibility to manufacturing and logistics, helps businesses protect workers, and reduces safety-management costs. UWB also lets robots and drones self-navigate, and enables secure, hands-free access to cars, front doors, and other secure locations. It even helps with contact tracing and social distancing in the fight against COVID-19. Now in smartphones Recent adoption in smartphones means UWB is ready to grow quickly. Developers are using UWB as part of new services, with an eye toward making various everyday activities more convenient and safer. With UWB as part of smartphone apps, purchases will be more secure, accessing your car will be possible without a key fob, and misplaced items won’t stay hidden for long. Retail outlets will use location for targeted marketing, and finding things on store shelves will be easier than ever. Home automation will become seamless, and friends and family will be easy to find even if they’re in a crowd. The question of interoperability Having UWB in smartphones is an important first step Having UWB in smartphones is an important first step toward making UWB an everyday part of life, but interoperability is another key factor, since smartphones have to interact with a wide range of other devices and services. That’s where the FiRa Consortium comes in. Launched just over a year ago, the FiRa Consortium is a member-driven organization of market leaders from the consumer, mobile, industrial, enterprise, and semiconductor industries. FiRa members work collectively to define the future standards that will make interoperability across UWB products a reality. With FiRa making it possible for developers to use UWB in all kinds of new ways, the future of indoor location is really only limited by the developer’s imagination.
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organizations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-Life balance In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organizations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasizing both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-Based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
If one employee stands less than six feet away from another employee, a fob attached to a lanyard around his or her neck emits an auditory beep – an immediate reminder to observe social distancing. If an employee were to be diagnosed with COVID-19, a cloud-based database provides a record of who at the company the sick employee had contact with. These capabilities of HID Location Services ensure social distancing and provide contact tracing to enable companies to return to work safely. They have been deployed in a pilot program at HID Global’s Corporate Headquarters in Austin, Texas. Social distancing using a BLE beacon To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. The building area covered by each reader constitutes a “zone,” and the system records when two beacons are signaling from the same zone, which indicates contact between employees. In effect, the system records – historically and forensically – who was near whom (and for how long) using the zone-based approach. “In the workplace, we provide organizations with visibility into the location of their workforce,” says Mark Robinton, Vice President, IoT Services Business Unit at HID Global. Pilot program spans variety of environments By documenting where a sick individual moved in the building, the system also can guide any need to close off a certain area for deep cleaning. Instead of quarantining a whole building, a company could quarantine a small subset of employees who were likely exposed. Importantly, the system only reports data, while management makes the actual decisions about how to respond. The site of the pilot program is the 250,000-square-foot HID Global facility in Austin, which includes a variety of environments, including manufacturing areas, an executive suite, cubicles, a training area, a cafeteria, and lobbies. This spectrum of use cases enables the pilot program to evaluate how the system works in various scenarios. The building in Austin has two floors, plenty of natural lighting and emphasises sustainability in its design. HID Location Services ensure social distancing and provide contact tracing Pilot starts small and expands For the pilot program, 80 readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. The fobs emit an audible beep, which employees have overwhelmingly said they prefer. Observers overseeing the pilot program have documented employee reaction and comments. It emits a blinking LED light, which can be seen by the offending co-worker There were challenges in setting up the pilot program remotely to ensure fewer employees were on site during the pandemic. The equipment was provisioned in Florida and then shipped to the Austin location. Fine-tuning was required to adjust the signal strength of the BLE beacons. The badges were initially more powerful, but the strength was dialed back to be comparable to the fobs and within the six-foot social distancing range. Signal strength is also a variable in diverse environments – the 2.4 Ghz signal tends to reflect easily off metal, so adjustments in signal strength are needed in a factory setting, for example, versus a collection of cubicles. “This facility is large enough and diverse enough that it provides great test results and quality data to analyze,” says Dean Young, Physical Security Manager at HID Global. “Our employees are eager to be part of the pilot to demonstrate that we use the technologies we provide to our customers, and they want to help us stay in compliance with social distancing and contact tracing.” Ensuring privacy while protecting employees HID Global’s headquarters had approximately 425 employees before the coronavirus pandemic lowered the number drastically to include only essential workers. As more people return to work, additional fobs and badges are being issued to expand the scope of the pilot program. The program is also incorporating contact tracing of suppliers and others who visit the facility. Except when triggered by contact among employees, locations are not recorded. Each employee’s location is always available in real-time (e.g. in case of an emergency), but they are not “tracked.” Through BluFi placement and geofence capabilities, the system closes off private areas where location should not be monitored, such as a rest room. Geofencing also identifies when employees enter and/or exit the area covered by the pilot program. Although each beacon is associated with an employee, the employee’s identity is not part of the data stored in the cloud, so there are no privacy concerns. Data is completely anonymized, and no personally identifiable information (PII) is stored in Bluzone. Other computer systems in a company, such as a human resources (HR) program, can privately and securely store the identities associated with each beacon. Other applications for HID location services In addition to social distancing and contact tracing applications, HID Location Services offer other use cases ranging from asset tracking and employee safety/security to location analytics. For example, the system can analyze room usage for better building management and operational efficiency. It can also quickly find people in emergency situations. These use cases ensure continued value for a system even after concerns about social distancing and contact tracing have faded. The system can analyze room usage for better building management and operational efficiency Another big selling point is the ability of a company to be better prepared in case of a future pandemic, or a second wave of this one, says Robinton. The HID Location Services social distancing and contact tracing applications will be available at the end of Q3 and will be rolled out through HID Global’s existing integrator channel. Vertical markets likely to embrace the technology include healthcare, where hospitals need to track patients as they come in and to know which other patients or staff they may have been exposed to. The financial sector is another likely market, as is manufacturing, which is looking to avoid the prospect of shutting down an entire plant. It’s better to address the three or four people who were near a sick employee than to shut down the plant. In the hospitality industry, fobs can be used to signal duress by the housekeeping staff.
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
Adani Group is a multi-national conglomerate headquartered in Ahmedabad, Gujarat, India and has a diversified portfolio of businesses, including resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with Mundra being the country's largest commercial port. With multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders across 25+ business units. Managing staff attendance and diverse shifts Adani Group is widely engaged in multiple business units and ports with 50,000+ workers under 900+ contractors, employed at various locations. Maintaining and managing entire attendance, diverse shifts and leave policies for the various locations, and numerous workers at a central place was critical for them. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management. To provide approved and appropriate induction of each worker at a defined level, monitor the progress status of each work order and its segregation based on reports were quite challenging. Report generation to eliminate the fraudulent and erroneous payment of wages at contractors' end had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. COSEC Contract Workers Management COSEC Contract Workers Management offers centralized attendance management solution for various branches After comprehensive discussion regarding problems and requirements, Matrix offered COSEC Contract Workers Management solution for their 50,000+ workers, who have been employed under 900+ contractors, spread across four locations in India. COSEC Contract Workers Management offers centralized attendance management solution for various branches, spread across multiple locations, which automates all processes, right from recording entries and exits up to processing salaries. Enrolment of the worker credentials COSEC Contract Workers Management facilitates enrolment of the worker credentials, along with a photograph, documents, and induction details. It helps contractors to manage workers efficiently, using contractors' self-service portal. The solution provides multiple connectivity possibilities via Ethernet, Wi-Fi and mobile broadband. It eases the tracking of work order progress. It offers seamless integration with SAP using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations via email and SMS. Results: Enhanced security with effective worker's enrollment process abiding by various induction levels. Increase in productivity of admin by 20%. Easy decision making due to the generation of customized reports. Smooth and effective monitoring of work orders. Improved security with centralized control and monitoring - Reduced time spent by the security department. Error-free man hours' computation for quick & effective wages' calculation. Minimized manual interventions. Matrix products and solutions Offered: COSEC CENTRA LE - Application Software Platform expandable up to one million users. COSEC LE CWM - Contract Workers Management Module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF Card-based Door Controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare Card and NFC-based Door Controller. COSEC VEGA FAX - Fingerprint and RF Card-based Premium Door Controller with Touch Sense LCD, IP65, Wi-Fi, PoE. COSEC DOOR FOP - Fingerprint and RF Card-based Premium Door Controller with LCD and Keypad.
The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential, for both internal and external users. The museums needed a system that will be able to cope easily with changes, site extensions and two-site operation, and a solution that would remove the need to change all cylinders, when an employee loses a key. eCLIQ locking cylinders installed Now, the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders, across the two sites. ASSA ABLOY’s eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights, and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Designed for museum security Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact, and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers, along with their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. eCLIQ locking system Fitting eCLIQ locking system was a simple and wire-free task, and the museum staff, performed the installation themselves. One training session, with the admin software, was sufficient, to put them at ease with their new system. Looking after eCLIQ components is also easy, an integrated lubricant reservoir ensures cylinders, don’t require maintenance for up to 200,000 cycles. AES encryption, rapid processing, and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. Easy and effective access control “I am very happy with the eCLIQ solution,” said M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums, adding “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council, to show the effectiveness and simplicity of the eCLIQ solution.” Guyot adds, “Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
GMB has struck a deal with Securitas to become the first security provider to sign up for the union’s ground-breaking disability passport. The passport- developed by GMB and the TUC - is a straightforward, worker-owned process, that removes the stress and uncertainty many disabled workers face around reasonable adjustments. Securitas employs 355,000 people in 48 markets including more than 9,000 UK Employees. The move will mean all staff will be covered by the policy - which agrees the adjustments for employees with disabilities need to stay in work. Disability passport Securitas first security employer to sign up to life-changing reasonable adjustments disability passport Nell Andrew, GMB National Equality and Inclusion Officer said, “GMB commends Securitas for making this potentially life-changing commitment for their disabled staff. We believe this passport will promote dignity and highlights the value of disabled workers' work." "Disabled workers want the opportunity to thrive in the workplace - not just survive and we believe this short policy, will go a long way in achieving this.” Supporting disable workers Sarah Hayes, HR Director, Securitas Security Services UK, said, “We are delighted to be working in partnership with the GMB to support any employee with a disability and who may need help to thrive in their work." "The disability passport will help us make sure we make any reasonable adjustments an employee may need in the workplace environment, whether it be removing physical barriers or providing additional support. This fantastic initiative is one of a number of tools we are using to help us be a more inclusive employer and develop the expertise and diversity of our people.”
82% of schools and colleges in both the US and Northern Europe see a potential role for CCTV/video monitoring systems in supporting a safe return to face-to-face teaching in school buildings and across further education college campuses, following the pandemic. Many schools and colleges have already adapted their video monitoring systems. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 12 months. Video monitoring systems The AVA Security Education Sector Security Survey provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 12 months. Safe-specific video analytics Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the next year. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels in retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 12 months. Contactless access control The education sector is a deployer of facial recognition analytics in existing cameras Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 12 months. However, the education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22 percent of schools and colleges have deployed facial recognition to date, although this is set to more than double as 29% over the next 12 months. Reduced VMS costs The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely in 2021. Cybersecurity has become a key IT priority As IT, Operations, and Security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few weeks, the University of Hertfordshire experienced a major cyberattack which led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely’ that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. Smarter, easier to use video systems There was some disquiet about the quality of existing video systems’ core capabilities, the Ava Security research found. For example, 29% thought it was a ‘High Priority’ to improve the speed of finding and retrieving video evidence after a security or safety incident. A further 40% saw it as ‘Somewhat a Priority’ to improve the systems’ retrieval capabilities to find ‘required footage of incidents easier and quicker. It currently takes too long.’ Further, 22% saw the need for ‘better integration between video monitoring camera systems and other security-related systems, such as access control or alarm systems’ as a ‘High Priority’, while over half (57%) saw wider security systems integration as ‘Somewhat a Priority’ now. Nearly two-thirds (66%) of video monitoring system decision-makers in the education sector were keen to make their video monitoring systems ‘more intelligent, using video analytics to support better post-event decision-making’ – placing this improvement as either a ‘High Priority’ or ‘Somewhat a Priority’. Cloud on the horizon 73% of the education sector is experiencing accelerated cloud migration Others were more focused on Cloud Migration of more IT Systems. Over half (51%) confirmed that their cloud migration plans had been accelerated in 2020/21 and a further 32% confirmed that a new budget had already been allocated for moving more services into the cloud in the financial year 2020/21. That means that altogether (net) 73% of the education sector is experiencing accelerated cloud migration. Linked to this, the same study uncovered that 58% found ‘adoption of Video Surveillance as a Service (VSaaS) i.e., moving their video monitoring system into the cloud’, as a ‘net priority’ for improving and optimizing their video monitoring systems looking forward. VSaaS selection criteria For the 82% of all education respondents actively considering VSaaS options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS right now, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people’. Third-party cameras While 24% of education sector decision-makers considering VSaaS, said it was critical that the provider was not headquartered in mainland China. A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment.' A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Latest analytic capabilities An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and color searching’. Balance of power The Ava study also explored whether the events of the last year had prompted changes in terms of who looks after the management of video monitoring systems. There was some evidence in the education sector that as CCTV has increasingly been migrated onto the network, IT departmental control is increasing. According to the study, nearly a third (31%) of schools and colleges’ video systems passed more control of their video monitoring systems to their IT department – taking the total percentage of video systems run by IT in the education sector to 39%. However, security and/or facilities management still holds the balance of power in the running of these systems with 50%, with 24% gaining responsibility for video monitoring during the pandemic. Only 4% of systems confirmed they had fully outsourced video system management and 7% confirmed that more of the management, upgrading, and running of their systems had been outsourced over the last year. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimizing the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection There is a strong determination to adapt existing school surveillance systems to new COVID-safe requirements" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Cloud Connector Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
HID Global, a pioneer in trusted identity solutions announced that qiiosk Ltd. uses its HID NFC Tags to meet skyrocketing demand from restaurants and diners for its product Menu Tile, to give a completely contact-free dining experience. HID NFC Tags With HID NFC Tags, qiiosk was able to respond quickly to the demand for solutions capable of addressing the “new normal” of contactless dining, takeout, and delivery. The company’s enhanced solutions enable restaurant-goers to securely access current menus, place orders, and submit payment simply by scanning a QR code or tapping an embedded NFC tag with an NFC-enabled smartphone or tablet. End-user experience High-quality HID NFC Tags facilitate end-user interactions with qiiosk’s products, providing restaurants and other hospitality venues with robust hardware and best-in-class software for touch-free ordering and payment. High-quality HID NFC Tags facilitate robust hardware and best-in-class software for touch-free ordering and payment “HID NFC Tags now solidly underpin our Menu Tile product and others in development,” said Justin Clark, Director at qiiosk. “We chose the solution due to our experience and confidence in the tags after significant and fierce field trials. We are confident in HID products and use them not only within our organization, but also in organizations we support.” “Fire-and-forget” solution Of particular importance to the Menu, Tile product was the adhesive quality, read rate, and ruggedness of HID NFC Tags, which allowed the company to equip its customers with a “fire-and-forget” solution to address rapidly evolving regulations in the hospitality sector due to the COVID-19 pandemic and increased attention on food allergen issues. Cost-effective With HID NFC Tags, qiiosk was able to quickly upgrade their physical product and produce enough tiles to supply customers. This positioned the company to maintain its high growth by delivering a high-quality product capable of enduring the harsh conditions of bars and restaurants—leading to cost savings and reliability. Touch-free opportunities “We are pleased that qiiosk has leveraged the power of HID NFC Tags to deliver an improved product that provides exceptional results during a time of high demand and great uncertainty,” said Jean Miguel Robadey, Vice President of Industrial Smart Components, Identification Technologies with HID Global. “By integrating HID NFC Tags into its solutions, qiiosk was able to deliver to its customers more touch-free opportunities and the ability to immediately communicate menu changes and even possible COVID-19 exposures to protect their staff and diners.”
ClanTect and ePm have signed a partnership agreement for the sale and servicing of ClanTect’s next generation Motion Detection systems (also referred to as ‘heartbeat’ detection systems) for the United Arab Emirates (UAE). Detecting humans in vehicles ClanTect’s systems are used to detect the hidden presence of people inside vehicles and are deployed within a wide range of organizations in the Border Security, Prisons and Critical Infrastructure markets. Customers include globally renowned organizations, such as the UK Border Force and Frontex, the European Border and Coast Guard Agency and Her Majesty’s Prison Service in the United Kingdom. Tens of thousands of clandestine operatives and fugitives are detected by ClanTect each year, with hundreds of lives being saved. Ultra-sensitive sensors Its ultra-sensitive sensors can detect even the faintest of movements, from anywhere within a vehicle ClanTect’s systems are based on sound and vibration technology. Its ultra-sensitive sensors can detect even the faintest of movements, from anywhere within a vehicle. The system is extremely fast (approx. 60 seconds for a vehicle search), it is very easy to use, the search process is fully automated, and, unlike X-Ray and some other technologies, it is completely safe for both the operator and for the stowaway. ClanTect’s system is extremely accurate. It utilizes a unique ‘blocking’ capability, which eliminates any nearby surrounding noise from outside of the vehicle. Compact 2nd generation systems With the launch of their 2nd generation systems, ClanTect provides smaller and more compact devices, which are now fully wireless, thereby making them easy to deploy in ad-hoc outdoor roadside locations, even in windy weather conditions. Professor Steve Daley, Managing Director of ClanTect commented, “Our systems can enable the UAE authorities to meet some of today’s most pressing security challenges, such as human trafficking, the protection of critical infrastructure and the security of custodial facilities.” Protection of critical infrastructure Steve Daley adds, “We have also ensured that our systems have been thoroughly tested to meet the challenging environmental conditions faced in the UAE.” Hadi R Omer, Director of Sales & Marketing (Systems & Solutions) at ePm said, “Here at ePm, we have been serving the needs of government and commercial customers since the 1980’s, including the Ministry of Interior, Abu Dhabi Police, Dubai Police, UAE Armed Forces, Dubai Customs, and ADNOC. We feel that ClanTect’s technology perfectly complements our existing portfolio of security products and offers tremendous operational capabilities for public and private sector organizations across the UAE.”
Round table discussion
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Automatic Vehicle IdentificationDownload
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload