ATM Security
IDEMIA Secure Transactions (IST) revolutionises the world of digital payments by demonstrating the first ever offline central bank digital currency (CBDC) payments incorporating enhanced security against quantum threats. This major innovation promises to transform financial transactions and pave the way for an era of post-quantum security with IST positioning itself as the leader in this transformation. With quantum computers soon to enter all areas of business and finance, it is vital that com...
IDEMIA Secure Transactions (IST), a division of IDEMIA Group, is a major provider of payment and connectivity solutions for financial institutions, mobile network operators and automotive manufacturers. IDEMIA Secure Transactions (IST) is pleased to announce its latest partnership with arab national bank (anb), one of the largest banks in the Middle East. IDEMIA and anb launch payment card On February 5th, anb and IST launched a payment card in the Kingdom of Saudi Arabia On February 5th, an...
From 10 to 13 October, the global airport community will gather for the 24th edition of inter airport Europe at the Munich Trade Fair Centre in Germany. The event returns with an impressive line-up of well over 400 airport suppliers from 37 countries, including seven national pavilions and more than 100 new exhibitors. Live exhibits Visitors can look forward to plenty of live exhibits in the halls and Outdoor Area and a new 600 square metre GSE Experience Area. An exciting event programme in...
ISS (Intelligent Security Systems), a global provider of video intelligence and data awareness solutions, announced that industry veterans Dennis Connor and Jason Lloyd have joined the company as its new Director of Program Management NA and Regional Business Manager for the Midwest respectively. Dennis Connor's responsibilities Connor, who most recently served as Program/Project Manager for CX (customer experience) Initiatives at ADT, will spearhead the development of new end-user and p...
The Security Industry Association (SIA) has launched a new learning management system (LMS) – SIAcademy as part of its efforts to advance industry professionalism through premier education and training. SIAcademy SIAcademy is a living library of on-demand training and professional development programmes designed to enhance security professionals’ industry knowledge, technical skills, and overall job performance. The new LMS offers a modern, simple, and centralised p...
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming...
News
Dahua's latest DSS Pro V8.3 enhancement equips security personnel with advanced tools, enabling them to rapidly identify and monitor suspicious individuals' movements in just seconds. It is a cutting-edge Video Management Software (VMS) security solution designed for efficiency and scalability. It leverages users' video security systems to help them make informed decisions quickly and serves as the backbone of the operation. AcuPick Technology The key upgrades primarily focus on integrating Dahua's advanced algorithm, AcuPick Technology, which helps investigators save time in searching for and identifying people of interest. The feature also supports multiple user logins with specific permissions for up to 200 individuals simultaneously. Remote-control capability The company predicts that this upgrade will foster digital transformation across various sectors Another feature is the remote-control capability, which enables security staff to monitor and track events from anywhere, whether they are on the move or at home. The company predicts that this upgrade will foster digital transformation across various sectors and empower stakeholders from retail, residential, and other sectors to become more digital and efficient. Integrated Search Algorithm Traditional security methods demand frame-by-frame analysis of hours of video footage. With AcuPick, all searchable targets can be scanned instantly. The search algorithm breaks up people and vehicle objects into feature values that are sent to the DSS platform for processing. DSS saves these feature values to its database and finds the target object by comparing the feature values. Streamlines the user experience Even without clear details, security staff can find and track a person or vehicle of interest using a single reference image. Upon selecting a person, individuals will instantly see a history of each appearance on all AcuPick-enabled cameras throughout the premises. DSS Pro 8.3 streamlines the user experience, eliminating the need for lengthy training sessions. The process is as simple as installing AcuPick, selecting the target, viewing the desired thumbnails, and receiving video feedback instantly. Enhanced Workflow This allows users to easily see personal assignments for each door and personnel situation DSS Pro V8.3 also introduces a clearer assignment system, simplifying the entire workflow. The workflow is divided into three groups – staff assignment, safeguarding doors, and the routes connecting the two. This allows users to easily see personal assignments for each door and personnel situation. Visualised and intuitive dashboard The company has improved its user interface to offer a more visualised and intuitive dashboard. This upgraded feature provides a comprehensive overview of peak times, equipment status, and other vital information, making it easier for stakeholders to manage their security systems. Existing stakeholders enjoy these updates free of charge. While clients are required to purchase their servers for data storage, data transfer during a DSS Pro upgrade is an additional cost.
Intelligent Security Systems (ISS), a global provider of video intelligence and data awareness solutions, announced that its Managing Director for North America, Matt Powell, has been selected to speak at next month’s Securing New Ground (SNG) conference in New York City. Scheduled to take place from October 17-18 at the InterContinental Times Square, SNG conference brings together executives and entrepreneurs from across the security industry to network and share information on different technology and business trends that are affecting the market. Impact of artificial intelligence Matt’s session entitled, “What AI Means for your Business,” will examine the impact of AI Matt’s session entitled, “What AI Means for your Business,” will examine the impact of artificial intelligence on security applications and how these effects will be felt by firms throughout the industry within the next two to three years. Joining Matt on the panel will be Hamish Dobson, CVP, Product–Enterprise Physical Security Solutions, Motorola Solutions; Jumbi Edulbehram, Global Business Development, Smart Cities and Spaces, NVIDIA; and, Kurt Takahashi, CEO, Netwatch Group. AI adoption at an exponential rate “The customers that our industry serves are adopting AI at an exponential rate for all aspects of their businesses. Answering the question of how to utilise AI in a business, or how to become part of the value chain that is AI, is fast becoming the dominant conversation across every market sector,” explained Matt Powell. He adds, “Our panel draws from a cross-section of the industry, bringing incredible insights based on experience to this important topic. If I were attending and wanting to understand the most important aspects of artificial intelligence and augmented intelligence in our industry, this is a panel I would not want to miss.” ISS analytics With over three million devices running ISS analytics in 56 countries around the world Matt has over two decades of experience in security and transportation technologies and brings a lessons-learned approach to AI and advanced technology deployments. Matt joined ISS in 2022, combining his manufacturing knowledge with his integration experience to help bring the expertise of the company to the North American market. With over three million devices running ISS analytics in 56 countries around the world, ISS is the largest video analytics provider. Prior roles of Matt Matt formerly served as Principal–Transportation Markets and Principal-Infrastructure Markets at systems integrator Convergint where he set the strategy for business development and professional services that led the company from a handful of airports to 60-plus aviation deployments, including some of the world’s largest airports and airlines. He has overseen technology deployments including video management, access control, analytics and AI, as well as developed methodologies for deployment used for complex systems, such as identity management and single pane of glass solutions. Prior to Convergint, Matt was the developer of transportation market strategies for Moog and Videolarm.
Allegion U.S., a provider of security products and solutions, unveiled the results of a new multifamily living trends survey that provides insight into the preferences and expectations of the current renters. New technologies, amenities The report, “2023 Multifamily Living Trends: A Study on What Multifamily Renters Desire, Expect and Will Pay More For in Their Residences,” analyses input from over 1,000 survey respondents who currently rent or own multifamily residences or plan to in the next two years. Beyond the value of safety, residents’ peace of mind, and the rise of mobile access control, the survey shows how COVID-19 and the influx in Proptech have accelerated the adoption of new technologies and amenities designed to enhance the lifestyles of current renters. The changing multifamily landscape Increased adoption of smart home technology, re-prioritisation of amenities, and new preferences In 2019, Allegion conducted a similar study, providing a benchmark for living trends among millennial renters. Over the last four years, the multifamily landscape has changed in significant ways both for renters and property owners, alike: the increased adoption of smart home technology, re-prioritisation of amenities, and new preferences in leasing and communication are evident. Impact of Proptech adoption, lifestyle changes “Multifamily has always been a dynamic market as a result of changing lifestyle behaviours and introduction of new property technologies,” said Connie Alexander, senior manager for primary research & insights at Allegion. “Our research reveals that we are witnessing the impact of Proptech adoption and lifestyle changes following the pandemic. Property owners need to take note of these shifts to best allocate short- and long-term investments in their properties that will help attract and retain quality residents.” Key trends and challenges The key trends and challenges examined in the report are outlined below: 1) Impact of Proptech on Multifamily Residences - In 2021, $24.3B was invested into Proptech companies globally, with a focus on the multifamily market. Proptech can help attract responsible, high-quality residents and provide enhanced and safer cross-property amenities, lower operating costs and increase revenue. 61% of survey respondents said they are comfortable using Proptech. Smart locks, resident portals, and cameras were included in these preferences. According to the survey results, 51% of renters who make more than $100,000 per year view smart home technology as a need-to-have amenity and 48% of those same renters view Proptech as a must-have. More than one in two respondents would be willing to pay one to 10% more for property technology and nearly three in 10 would pay at least 11% more. 2) The Rise of Mobile Access Control - With most of the population having access to smartphones the rise of mobile access control provides renters with a convenient and secure way to access different parts of their multifamily property. Over 59% of respondents would likely select a future place of residence if it had mobile access control offered as an amenity. Compared to the 2019 study, there was an 82% increase (to 34% from 19%) in the number of respondents who would be willing to pay more for mobile access control that would allow them to remotely monitor entry of their home and give access to guests and others. 3) Amenities That Attract Based on New Behaviours - COVID-19 had a profound and lasting effect on consumer behaviour and lifestyles. Multifamily residents are no different. According to Pew Research, 70% of individuals will continue with the at-home habits they adopted during the pandemic. When asked about considerations for a future place of residence, respondents ranked free Wi-Fi as the most important amenity, behind affordability and proximity to work and school. Among those working remotely (15% remote, 20% hybrid work lifestyles among respondents), fast and reliable Wi-Fi is the most important factor when looking for a place of residence. Home security systems, smart home technologies, and upgraded building materials ranked more important overall than fitness centres and pools. 4) Value of Safety and Resident Peace of Mind - According to the 2021 World Risk Poll by the LP Foundation, 37% of people in the U.S. feel less safe than they did just three years ago. Fewer than one in three respondents feel secure in all areas of their home, and about one in five do not feel secure in the basement, living room, and/or patio. Up to 140% from 2019, 22% of respondents currently use electronic door locks that are connected to the internet. And up 91% from 2019, 23% of respondents currently use electronic door locks that are not connected to the internet. More than one in three respondents would be willing to pay more for smart doorbells with video, outdoor cameras, and mobile access control. Six in 10 would pay between one and 10% more per month for these added security features. Only 19% of respondents are comfortable giving their family and friends access codes or keys to their unit. However, 47% are comfortable hiding keys to their apartment around the exterior of their home in the event they get locked out. 5) Leasing Preferences That Convert - A survey released from the National Apartment Association’s Apartmentalise 2022 conference found over 60% of property managers cite creating efficient day-to-day operations as one of their top three challenges. Efficient communication with prospective and current residents can enable a positive ROI and a differentiating experience for renters that results in increased attraction and retention. 16% of respondents noted inattentive property management as a top three dealbreaker when considering a future place of residence. More than three in four respondents are at least somewhat comfortable with all four self-guided tour scenarios below, and less than 10% are either somewhat or very uncomfortable with them. Take a self-guided tour that allows users to freely explore a community. Take a self-guided tour with detailed instructions on what users can explore. Living in a community that allows potential tenants to explore the area on a self-guided tour. Taking a self-guided tour and having the ability to immediately sign a lease before leaving. According to the survey, residents with incomes of over $100,000 per year are statistically more comfortable navigating self-guided tours and signing a lease directly following. When asked how valuable different amenities were in a future residence, a streamlined resident portal app was ranked number one with 39% of respondents saying it was a must-have and 50% a nice-to-have.
Teledyne FLIR, part of Teledyne Technologies Incorporated announced the release of its new FLIR FC-Series AI, the latest model in its signature fixed camera (FC) series. The FC-Series AI is a thermal security camera with onboard AI analytics that accurately classifies humans and vehicles for early intrusion detection for perimeter protection and remote site monitoring. FC-Series AI With video analytics that combine deep neural network (DNN)- and motion-based analytics, the FC-Series AI offers industry-pioneering intrusion detection, enabling users to expand situational awareness and make better-informed decisions that increase safety and improve coordination and efficiency. Featuring a premium thermal sensor with 640 × 512 full resolution, the FC-Series AI camera creates images based on the heat emitted by humans and objects, rather than relying solely on visible light. Thermal security camera features FC-Series AI enables security operators to see and detect intruders, even in complete darkness, rain, fog, and smoke The thermal imager supports an industry-pioneering thermal sensitivity of <25 milliKelvin (mK), one of the best Noise Equivalent Temperature Difference (NETD) values on the market, enabling the sensor to outperform other thermal cameras whose visibility and detection rates decrease in adverse conditions. Offering eight, high-performance lenses ranging from an 8.6° × 6.6° to a 90° × 69° field of view, the FC-Series AI enables security operators to see and detect intruders, even in complete darkness, rain, fog, and smoke. DNN- and motion-based video analytics The FC-Series AI also combines DNN- and motion-based video analytics for reliable detection, empowering security managers to differentiate between true threats and nuisance alarms. Using FLIR’s curated library of thousands of thermal images, FLIR DNN analytics are trained to classify objects in real-world situations where humans or vehicles may be slightly obscured or challenging to identify or if an intruder attempts to deceive the system. The FC-Series AI also offers target geolocation capabilities and precise handoff to a pan-tilt-zoom device for streamlined target tracking. Perimeter protection, cybersecure solution FC-Series AI camera offers security professionals a high-performing, dependable, and cybersecure solution" “Our new FC-Series AI cameras elevate the possibilities for customers to tighten their perimeter protection strategy,” said Seetha Sasikala, Global Product Solutions Manager at Teledyne FLIR. “Combining DNN- and motion detection-based analytics, industry-pioneering thermal sensitivity, and the widest range of high-performance lenses on the market, the FC-Series AI camera offers security professionals a high-performing, dependable and cybersecure solution for intrusion detection.” NDAA-compliant, IK-10 rated device Designed to maximise the performance of new and existing multilayered physical security systems, the FC-Series AI camera tightly integrates with FLIR UVMS, as well as other third-party video management systems, and is supported by FLIR Nexus software. As an NDAA-compliant device, the FC-Series AI camera offers security professionals extensive cyber protection and peace of mind. With rugged, weatherproof IP66 and IP67 and vandal-proof IK10 ratings, the FC-Series AI provides durable housing.
Integrated Access Control and Security manufacturer TDSi announces it will be showcasing its GARDiS Platform and talking about its new GARDiSVU VMS solution on Stand 2-B28 at Intersec Saudi Arabia 2023, which takes place from 3rd-5th October at the Riyadh International Convention & Exhibition Center. Integrated security systems Managing Director John Davies commented, “We are delighted to announce our forthcoming appearance at Intersec Saudi Arabia at the beginning of October. This will be our first appearance at the show since the pandemic but follows up on several connections and conversations that we started back in June when we held our Security Technology Showcases in both Riyadh and Dammam." "TDSi has been selling products in Saudi Arabia since the 1990s and customers have benefitted from our integrated security systems on many different projects, but this event is the perfect opportunity to see our latest GARDiS products and to learn more about the exciting possibilities they offer.” Vision 2030 projects Vision 2030 projects is an initiative in the Kingdom that is implementing reforms in the public sector A key focus for TDSi at Intersec Saudi Arabia will also be how it can help customers with its Vision 2030 projects, an initiative in the Kingdom that is implementing unprecedented reforms in the public sector, the economy, and society as a whole. In early 2023, TDSi’s International Business Development Director Phil Tennent attended a UK Department of International Trade event focusing on Security Technology and had the opportunity to talk to many companies in Saudi Arabia regarding their Vision 2030 projects. GARDiS and GARDiSVU TDSi’s GARDiS ecosystem of access control software and hardware systems delivers a highly scalable cloud-based solution that utilises wireless technology for ease of installation and use. It is perfect for any secure access control application, including Access Control as a Service. (ACaaS). The recently launched GARDiSVU video management solution, TDSi’s first hybrid-cloud-based CCTV offering, synchronises directly with and complements the GARDiS range, providing customers with a complete solution. Vision 2030 projects John added, “The GARDiS range is the ideal solution for the exciting Vision 2030 projects that are driving the Saudi Arabia security market." "Intersec Saudi Arabia is a great opportunity to see the GARDiS range in person and to meet our expert team who will be available to discuss specific projects as well as broader security requirements. If you are attending the event, be sure to visit TDSi on Stand 2-B28.”
Yet another significant milestone for Ajax Systems. Since August 31, the following Ajax devices are officially Grade 3 certified: Hub Hybrid (2G) MultiTransmitter Fibra StreetSiren Fibra StreetSiren DoubleDeck Fibra HomeSiren Fibra KeyPad Fibra Grade 3 systems Grade 3 systems are used in large enterprises and high-risk facilities where enhanced security is demanded. Ajax systems can cover jewellery and arms stores, banks and financial institutions, ATMs, and other facilities requiring a Grade 3 security level. All devices are already available to order. Stock-keeping units (SKU) Ajax is set to introduce more Grade 3 devices at the Ajax Special Event online on October 20 The stock-keeping units (SKU) remain the same for all devices that receive a Grade 3 certificate. To avoid misunderstanding, packages, and stickers will have a Grade 3 mark to distinguish certified devices. And that’s not all. Several more Ajax devices are in the process of certification. Ajax is set to introduce more Grade 3 devices at the Ajax Special Event online on October 20. Secure a spot and register to hear a thorny yet exciting journey to Grade 3. It’s all about new opportunities Opportunities mean entering new markets and giving the partners a great way to scale. The installers and security companies can cover new objects and build cutting-edge, comprehensive Grade 3 security systems based on the available Ajax devices plus third-party new wired equipment or devices already installed at the facility. MultiTransmitter Fibra The module supports NC, NO, EOL, 2EOL, and 3EOL connections, which makes updating the security system more flexible MultiTransmitter Fibra can integrate any wired dry contact detector into the system. The module supports NC, NO, EOL, 2EOL, and 3EOL connections, which makes updating the security system more flexible. With EOL’s resistance measuring, a unique tool for wired security systems, all values can be assigned automatically to make installation quicker and more comfortable. Saving time and costs A professional set of tools will help save time and costs on installation and make setup and maintenance an easy remote task: Automatic line scanning: The feature finds physically connected Fibra devices not yet assigned to the hub and allows adding them to the system in a few taps. Thus, an installer could scan 100 machines in 10 minutes. Power consumption stress test: It helps to ensure that the system has enough power in any situation. In PRO apps, an installer launches the simulation of maximum power consumption to check the system’s response. Automatic sync with CMS: After the installation and setup, all system settings are automatically downloaded from the cloud server to PRO Desktop. The CMS engineer does not waste time transferring the devices manually. Fibra power supply calculator Professionals have access to free training at Ajax Academy and a dedicated Technical Support team which is available Moreover, professionals have access to various tools and information resources created by Ajax. Use the Fibra power supply calculator to check the security system project. Also, professionals have access to free training at Ajax Academy and a dedicated Technical Support team which is available round the clock, 365 days a year. Intuitive Ajax apps Owners of outdated wired alarm systems receive all signature Ajax technologies to experience a truly smart and reliable way of security. Intuitive Ajax apps provide remote control and all detector information in real-time from anywhere the Internet is available, on a smartphone or PC. With instant notifications, there is no chance of missing an alarm, and automation scenarios enhance security and comfort to the fullest. Availability All announced devices are already available to order. More Grade 3 devices will be disclosed soon at the Ajax Special Event on October 20.
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Security beat
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimise losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years? Contactless technology Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure. Not having to insert a card into the ATM removes the opportunity to trap cards Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed. The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show. ATMs and crime A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. The protection of ATMs ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorised to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. ATM jackpotting ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware.
We live in an age when private customer data is constantly under attack from hackers. Cyber-threats have taken a front seat in the line-up of primary risks facing banks and financial institutions. The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, there is also an increased risk to dangerous threats. The impact of cyber heists According to Cybersecurity Ventures, the amount of money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion overall for 2015, and this substantial amount is expected to double by 2021. In today’s environment, banks, credit unions, and financial organisations of all types are primary targets for hackers. But it’s not just the monetary loss that these businesses need to be concerned about — there is also a threat to the brand, customer trust, and employee safety. Banking surveys Banking choices are influenced by how secure consumers feel when conducting transactions, either in their local branch, at an ATM or online. In one survey, a vast majority of consumers (98%) felt most secure when conducting transactions at their local banking branch, compared with 92% when conducting transactions online and 85% using a mobile phone app. Further, 90% of consumers said they feel safer when they can see video surveillance cameras in their bank or credit union and would choose a financial institution with surveillance over one without, all other things being equal. Here are some other key findings from the survey: Half of consumers have walked away from an ATM without conducting their intended transaction because someone was loitering in the vestibule 60% of consumers noticed a fraudulent transaction before their financial institution, leaving plenty of opportunity for banks and credit unions to be more proactive when it comes to identifying and notifying customers about potential fraud “Banks and credit unions recognise that today’s consumers want a mix of in-person and online banking service options and have very high expectations when it comes to security and customer service,” said Peter Strom, President and CEO, March Networks, which provides security systems for banks. To increase security, biometric solutions are replacing PINs at physical ATMs To increase security, biometric solutions are replacing PINs at physical ATMs and providing a more fool-proof form of identification for banking security. Ways to increase banking security Popular use cases include a) PIN replacement at physical ATMs; b) proof-of-presence (such as pension benefit distribution) that requires liveness detection; c) more easily authenticating multiple transactions during a single ATM session; d) incorporating biometric information directly into a smart device; and e) the ability to leverage investments in biometric enrolment databases across multiple applications. An example of the latter is when fingerprint authentication on mobile devices used for payments and secure mobile banking is also used in conjunction with enrolled information for authentication at an ATM. The availability of interoperable authentication devices would permit cross-bank usage and pave the way for many new applications in the future. By enrolling a citizen’s fingerprints and then creating an ecosystem in which these transactions are strongly tied to that individual’s biometrics, the potential for fraud and identity theft approaches zero, and the process is simple and convenient for users.
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
Case studies
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Residents at Chapel View can receive and answer door entry requests via mobile while granting temporary access using QR codes, due to Comelit-PAC’s dedicated mobile app and use of the latest security technology. Chapel View Set in the quaint village of Gildersome in Leeds, Chapel View is an exclusive housing development, presenting seven residential homes in a discreet cul-de-sac, all secured with a communal gate. The community featured a legacy door entry system that required an upgrade to ensure the security of residents. Comelit-PAC worked with local installation specialists AC Secure from the initial design process, through the works programme to project completion. Door entry Each house has its licence and users can use the feature-rich Comelit app to control the gate Door entry, via Comelit-PAC’s VIP system, was specified, utilising its stylish Ultra door entry solution, to enable control of the gate to the housing estate. Each house has its licence and users can use the feature-rich Comelit app to control the gate while also creating QR codes to allow temporary access for visitors. Says David of the resident’s association of Chapel View, “With high expectations for our residents to deliver ultimate security, every element of the new door entry system also had to be considered from a convenience perspective, to enable them to answer door entry requests remotely, from their smartphone." Additional benefits “AC Secure worked with us right from the specification process and took the time to understand these requirements, before recommending Comelit-PAC as an ideal solution." "The additional benefits of utilising app technology to present door entry and QR codes for temporary access to visitors immediately appealed. And the system was installed with minimal disruption and a great benefit to our community." Smart home security systems Adam Cousens, Managing Director at AC Secure added, “Chapel View has the look and feel of a quaint village community where security and door entry is a high priority. All the smart home security systems had to be stylish and futureproof to suit the requirements of the community, whilst also ensuring ease of installation and simple use." “Comelit-PAC’s Ultra system with VIP technology, coordinating with its dedicated app was the natural choice for door entry." Ultra digital entrance panel The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app "Residents love the sleek design and the VIP technology is easy to use and allows them the convenience to receive calls and see visitors from anywhere. The combination has truly elevated the door entry experience.” The entrance to Chapel View has been enhanced with Comelit-PAC’s stylish, flush-mounted Ultra digital entrance panel. The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app. Mobile-first solution Stephen Wragg, Business Development Manager for Comelit-PAC concluded, "What our work with AC Secure at Chapel View demonstrates is how Comelit-PAC is ‘with you always.” There is no project too big or too small for us to work with our installers and partners to provide smart, yet stylish door entry solutions for residents to benefit from the latest in smart access control." "Ultra, together with VIP presents a powerful mobile-first solution that can ensure the ultimate security for this residential community.”
More than 2,000 innovative Safetyflex anti-terrorist bollards have now been installed in the heart of Melbourne, Australia, as part of a local government scheme launched in response to a fatal vehicle attack. Coventry-based Safetyflex Barriers has installed its spring steel bollard system across the Melbourne Central Business District (CBD) with the help of its Australian distributer, Ezi Security Systems. Most prominent pedestrian The city was rocked by a vehicle attack in January 2017 when a car was deliberately driven into pedestrians along Bourke Street, killing six people and leaving 27 seriously injured. In the aftermath, a AUS$52.5 million security upgrade at Melbourne's busiest and most prominent pedestrian sites was commissioned by The City of Melbourne, with hostile vehicle mitigation predominantly featuring Safetyflex’s advanced spring steel bollards. More than 2,000 of the slimline bollards have now been installed across key sites within the CBD, in addition to further sites in Australia, helping to keep high-risk crowded places safe from the threat of vehicle attacks. Anti-terrorist bollard system The unique thing about our bollards is they only require shallow foundations around 200mm deep" Marcus Gerrard, Director at Safetyflex Barriers, said: “Our patented anti-terrorist bollard system has been game-changing, providing unprecedented crash test certified performance in an attractive, slimline design. We are the only company in the world to use this type of technology in anti-terrorist bollards and crash rated street furniture.” He adds, “The unique thing about our bollards is they only require shallow foundations around 200mm deep, which is key in helping cities such as Melbourne navigate around in-ground obstructions, whilst still providing high-level security systems. The installation of the 2,000th spring steel bollard is of great satisfaction and pride, and reflects our strong experience and expertise in securing busy cities and centres worldwide. Our bollards will help ensure the safety of residents and visitors to Melbourne and Australia for years to come.” Stopping vehicle attacks The spring steel technology means the bollards can be installed in fixed, removable or retractable versions, while the elegant stainless-streel shrouds are also fitted with reflective bands to provide night-time visibility. The bollards have already proved their worth in stopping vehicle attacks, when in 2021 a stolen car fleeing police in Melbourne CBD was halted in its tracks by a Safetyflex bollard before the drivers could inflict any damage. Pedestrians were able to retreat to the protection offered by the line of Safetyflex bollards, ensuring nobody was hurt. Safetyflex has now become one of the biggest suppliers of anti-terrorist bollards in Australia, protecting high-profile locations in Brisbane, Melbourne and Sydney from the threat of vehicle attacks.
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announced that the Carrollton-Farmers Branch Independent School District (CFBISD) in Texas has implemented a unified school security solution with Genetec™ Security Center for video surveillance and access control and Bosch Security Systems for intrusion detection. CFBISD CFBISD provides schooling for 25,000 pre-kindergarten through twelfth grade in the Dallas suburbs. The district comprises 24 elementary schools, six middle schools, five high schools, and three specialty programme centres. The overhaul was the result of a three-year bond project to refurbish older buildings and update all security systems to increase video coverage and door monitoring while implementing a standardised modern intrusion system. Need for a unified security solution There was very little standardisation across our schools and facilities" “There was very little standardisation across our schools and facilities,” Daniel Robertson, Senior Security Systems Engineer at CFBISD. He adds, “We needed a more streamlined approach to security. The upgrade wasn’t only about investing in a new unified security solution. It was a complete change of mindset in how we secured our district.” Genetec-Bosch solution Currently, the Genetec-Bosch solution has been deployed across 42 CFBISD sites, including most schools, administrative buildings, sports stadiums, transportation depots, service centres, and other facilities. At all locations, the team is using Genetec Security Center to manage nearly 2000 cameras, 50 door readers, and 600 Bosch intrusion sensors with Bosch G series intrusion panels. Video intercom setup CFBISD help facilitate responses and keep all parties on the same page in the event of an emergency They also have a video intercom setup at main entrances and are using Security Center to manage more than 7,000 cardholders, streamlining activation/deactivation. CFBISD has even given authorised School Resources Officers and district Police Chief administrative accounts, to help facilitate responses and keep all parties on the same page in the event of an emergency. Security Centre Daniel Robertson adds, “Security Center allows us to quickly investigate any situation across our facilities. All our doors and intrusion points are linked to video, so we can easily retrieve everything from one platform." "And if there’s an alarm triggered, we can click on that event and immediately know what’s going on. All this can be done quickly, so we see what’s happening and address it right away,” said Robertson.
Wilson Bank & Trust, member FDIC, is an independent, community-based bank that began operating in Tennessee, USA in 1987. They have mortgage offices, operations centres, ATMs and branches located in and around Middle Tennessee that serve the city and surrounding rural areas. In total, they have operations and security at approximately 40 locations. One of the keys to their on-going success is their continuous search to improve their offerings. This drive extends to their physical security as well. Starting in 2016, the Bank began to look at upgrading their physical security system with a particular focus on replacing their analog cameras. Upgrading Wilson Bank & Trust’s physical security system The bank had cameras from multiple manufacturers on multiple systems" According to Elvis Huff, the Assistant Vice-President and Director of Security at Wilson Bank & Trust, “The bank had cameras from multiple manufacturers on multiple systems. Most of them were already 8-10 years old, when we began the process.” He adds, “This meant that the image quality was low and we could not get the video retention rates we wanted. In addition, many of the cameras had licensing agreements, so we were paying fees for products that were not meeting our needs.” IT-based, PoE (Powered over Ethernet) cameras Elvis Huff, whose experience prior to joining the Bank includes 12-years in law enforcement, established clear selection criteria at the beginning of the process. The Bank wanted IT-based, PoE (Powered over Ethernet) cameras that could produce high-quality video and did not require licenses. They also wanted DVRs or NVRs that would give them longer-term retention rates, 90-days at a minimum. After investigating their options, Wilson Bank & Trust determined that working with Hanwha Techwin cameras and systems would be the best fit for their requirements. Cyber security as a key consideration During the decision-making process, one of the deciding factors was that Hanwha cameras and systems are manufactured in-house end-to-end. In their view, this was particularly important for mitigating cyber security risks. According to Elvis Huff, “At the time, cyber security and network security issues were frequently reported, as cameras were being compromised for use in Distributed Denial of Service (DDoS) attacks. The ability to work with a company that does everything from manufacturing the chipset and camera to developing the software was a game-changer for us. We knew it would give us tremendous peace of mind.” Multi-sensor panoramic and network IR dome cameras They have taken a multi-year approach to satisfy budget and personnel constraints The bank began with a preliminary test at a single location. According to Elvis Huff, “We tested it for about a month and we loved it. The system was easy to deploy and easy to navigate.” Following this, they began upgrading their physical security systems at several branches, ATMs and other locations each year. They have taken a multi-year approach to satisfy budget and personnel constraints. Till date, they have installed new NVRs and more than 600 cameras. Installation and maintenance cost savings By switching to industry standard PoE, IP-based cameras, the bank has realised significant savings with regards to installation and maintenance costs. “We have reduced our installation costs because we do not have to run extra wire. And, we have reduced maintenance costs because the system is less complex and is less likely to breakdown,” explained Elvis Huff. Upgrading the branches has included the installation of several panoramic cameras and network IR dome cameras. PNM-9020V multi-sensor 180-degree panoramic camera The PNM-9020V multi-sensor 180-degree panoramic camera provides up to 30fps at full resolution. These cameras are a favourite of Huff’s for their ability to capture good quality images of a large area. Elvis Huff adds, “I like that I can put them on the side of a building and capture what is going on in an entire parking lot.” Huff has also installed cameras to record parking lot entrances and exists. Recently, this strategy helped as the security team was able to identify a vehicle associated with a fraud case, by using an image of its licence plate captured, as it was leaving the facility. Dome cameras installed For branch and building interiors, they installed a variety of dome cameras, including the QND – 6010R Network IR For branch and building interiors, they installed a variety of dome cameras, including the QND – 6010R Network IR. This indoor camera provides 2MP maximum resolution, 30fps at all resolutions, motion detection, as well as tampering and defocus detection. According to Elvis Huff, “When it comes to capturing images of vehicles, licence plates and transactions, the directional dome cameras cannot be beat.” Capturing high-quality images with hidden cameras The bank has also made use of the XNB-H6241A Network ATM Camera Kit with 8m cable. Elvis Huff has used the kits to install hidden 2MP HD cameras. The fact that the cameras do not disrupt a branch’s aesthetics is important for maintaining a positive customer experience. At the same time, these kits have allowed the bank to capture images that are not possible with a traditional top-down view. Waist-up images, which include a person’s face, can be vital, when it comes to investigating or prosecuting theft and fraud. Having access to images from this angle is already proving to be invaluable. In a recent case of fraud involving identity theft, an individual presented fictitious and forged documents at one of the bank’s branches. “Thanks to the Hanwha high resolution camera, we had a clear image that we were able to use to identify the individual,” said Elvis Huff. Meeting required retention rates with XRN 2011 NVR Each location has a similar setup with cameras connected to a dedicated NVR Each location has a similar setup with cameras connected to a dedicated NVR (network video recorder). At this point in the process, the majority of the NVRs are XRN 2011s. The XRN 2011 NVR supports up to 32 channels and has a maximum internal storage capacity of 48 terabytes. According to Elvis Huff, the ability to store such a large amount of data was an important factor in selecting the XRN 2011 NVR. He said, “It is not uncommon for us to have a 40 to 50 terabyte NVR as this allows us to meet our 90-day retention requirements.” Video used for investigative purposes Elvis Huff also appreciates the fact that the new NVRs send security personnel notifications, when a camera goes down or if storage issues arise. The video captured is used mostly for investigative purposes. Because their NVRs notify them in the event of an error or potential concern, the team can rest assured that they are continuously capturing the information they need to keep the bank secure. According to Elvis Huff, the relationship with Hanwha Techwin has been a positive one. The bank is happy with the upgraded technology, and Huff continues to be impressed with the equipment, stating “We really like our cameras. We have already seen good returns on the money we have invested. They are proving very beneficial in helping us serve our customers and prevent loss at Wilson Bank & Trust.”
IDEMIA has been awarded a new contract that includes identity and travel documents, the identification system, and related services by Chile’s Civil Registry and Identification Service for 10 years. The new generation of ID documents will incorporate multibiometrics: fingerprints, face, and iris. The ID documents will meet a higher level of security standards, making the Chilean passport one of the securest travel documents in the world. Digital ID The contract will also include a Digital ID that will enable local citizens to securely access online services. The new contract includes an upgrade of ID documents and the provision of a digital ID for all Chilean citizens. The ID documents also comply with the highest security standards on the market, including cryptographic technologies. For the first time, Chilean identity documents will include iris biometrics in addition to face and fingerprint biometrics. Private and public access IDEMIA’s solution allows visually impaired people to use their ID card and passport through an app to reproduce data The digital ID (in compliance with ISO and ICAO standards) allows secure access to online public and private sector facilities, for example, telemedicine and transport booking services. Additionally, Chilean citizens will be able to securely share ID attributes online for remote ID verification. An average of 320,000 passports will be produced per year, in addition to 4.8 million ID cards. IDEMIA’s solution allows visually impaired people to use their ID card and passport through an app that uses voice assistance to reproduce the data. IDEMIA also proposes identity cards and passports that contain the initials of the citizen in braille. Identification solutions “We are proud to continue our long-term partnership with Chile by providing one of the most robust and globally recognised identification solutions on the market.” “With this new generation of secure ID documents based on multibiometrics and cryptography, we are providing an end-to-end solution that meets the stringent requirements of the Chilean authorities, enabling the country’s digital transformation,” said Matthew Cole, EVP of Public Security & Identity at IDEMIA. Increasing passport ranking IDEMIA has been present in Chile since 2012 and has issued over 3.37 million passports and 29 million ID cards IDEMIA has been present in Chile since 2012 and has issued over 3.37 million passports and 29 million ID cards, with delivery times averaging less than 24 hours. IDEMIA’s longstanding collaboration with the Civil Registry and Identification Service has resulted in Chile’s passport ranking 16th in the world, allowing visa-free entry to 174 countries and an exclusive visa waiver for the United States. Additional information on ID documents Special attention was paid to the design of the passport and ID card to reflect the unique character of the world’s longest country (north to south). The development of the solution for Chile’s ID program is based on the latest developments of IDEMIA’s innovative automated biometric identification system, IDEMIA’s Biometric Recognition System (IBRS) that ensures each citizen is provided with a strong and unique legal ID that is valid throughout their lifetime. It also includes specific components (MBIS) for interconnection with National Security Organisms.
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
Videos
ATM Security: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download