Human area network
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when pa...
adCAPTCHA, a new specialist security verification platform, has launched with £1m funding to tackle the ‘bots epidemic’ and protect organisations against cyber fraud. The London-based company, founded by industry veteran and entrepreneur Alfie Scarborough, equips organisations with the capability to identify and block bots through its sophisticated in-house developed patent-pending human verification technology. Layered security solution adCAPTCHA’s layered...
Cohesity, a pioneer in AI-powered data security and management introduced a patent-pending visual data exploration capability to Cohesity Gaia, its first-to-market AI-powered search assistant launched earlier in 2024. By providing customers with a visual categorisation of the themes across documents and files within a data set, the visual data explorer brings new context to the data and suggests queries that help users gain insights faster. Challenges with the traditional approach With...
Canon Europe announces its recognition as an Industry pioneer in Quocirca’s prestigious 2024 Print Security Landscape report. This distinction highlights Canon’s commitment to providing globally consistent and innovative security solutions & services for secured print and document management that outpace competitors. The report specifically highlights Canon’s flagship print management platform, uniFLOW Online, as one of the key elements of its security offering,...
Data is the new currency in the digital economy. However, organisations face unprecedented challenges with exponential data growth, including performance bottlenecks, a lack of practical data visibility, and increasing cyber threats. Rubrik, Inc., the Zero Trust Data Security company, and Pure Storage, the IT pioneer that delivers the world’s most advanced data storage technologies and services, bring together primary storage, data security, and long-term retention with Rubrik Security Cl...
Bugcrowd, the pioneer in crowdsourced security, has named managed cybersecurity services and solutions provider Cyber Vigilance as a value-added channel partner for the UK. Cyber Vigilance specialises in large-scale, complex cybersecurity projects for tier one banks and telecommunications customers covering endpoints, email, people, web, network, cloud and data security. Cybersecurity resources Toby Butler, Chief Revenue Officer, Cyber Vigilance, said the alliance with Bugcrowd would help cus...
News
Hanwha Vision, the global vision solution provider, has released the XRN-426S-1T recorder - a compact NVR with a built-in 1TB solid-state drive (SSD). The 4-channel recorder supports AI search, when integrated with Hanwha Vision AI cameras, as well as resolutions of up to 4K. With a solid-state drive instead of a traditional hard drive, this recorder offers a silent and reliable solution. Highly compact and versatile The recorder’s compact size of just 20cm by 14cm means it is highly flexible and versatile in its applications. The XRN-426S-1T is particularly well suited to more confined spaces, in which a compact recorder is an advantage, for example, hallways, lobbies, information desks, residential areas, and smaller retail sites. The recorder is up to 50% smaller than comparative 4-channel models, offering competitive features such as AI search, video playback and export, and event rule management. Quiet and discreet A separate bracket is supplied for tabletop or wall installation, to ensure maximum flexibility The discreet recorder is silent owing to its smart design, which means a fan is not needed to circulate air to cool the unit. Furthermore, the recorder is complemented with a wide range of installation options, including a supplied Vesa bracket for mounting on the back of a monitor. A separate bracket is supplied for tabletop or wall installation, to ensure maximum flexibility. AI search for improved efficiency AI metadata search makes it easy for operators to find and view event footage to manage events as they unfold and for post-event investigations. For example, operators can check the times that a vehicle entered or exited a car park, or when out-of-hours staff, such as maintenance or cleaning personnel, came on-site. The recorder supports intelligent video analytics such as virtual line-crossing or loitering detection. When this, and other events occur, the recorder can trigger an action based on predefined rules, such as sending an email or mobile push notifications to alert the operator. Intuitive and customisable display Footage can be viewed using Wisenet Mobile or Wisenet Viewer, giving operators flexibility on how they access and manage video recording. An intuitive and customisable display allows managers to simply zoom in on details while fisheye dewarping provides clear images without distortion.
Teledyne FLIR, part of Teledyne Technologies Incorporated, announced a limited-time promotion for SIRAS™, a professional drone that includes a quick-connect dual radiometric thermal and visible camera payload. First responders, including police, fire, and search and rescue agencies, can now purchase one unit per agency at a significantly marked-down price of $6,995, a discount of more than 28 percent, through the end of the 2024 calendar year. SIRAS drones SIRAS drones are engineered for data security, performance, and affordability, making them the ideal choice for public safety, firefighting, and search and rescue missions. At a significant discount, agencies can replace or add to their existing drone fleet an offering that is purpose-built for safety and security. “First responders are investing in SIRAS. In recognition of their mission and budget restraints, we want to support the community with this promotion that runs through National First Responders Day and beyond,” said Mike Walters, Vice President, Product Management, Teledyne FLIR. He adds, “Especially for those organisations seeking an alternative to drones originating from countries of concern. Teledyne FLIR is proud to offer those on the frontlines a drone that makes their missions swift, safe, and secure.” Vue® TV128 payload features The Vue® TV128 payload features a 16MP visible camera with 128x zoom to pinpoint details SIRAS is an IP-54-rated aircraft with a flight time of more than 30 minutes, radar-based front collision avoidance, and backpack portability. With no geo-fencing restrictions, first responder UAV pilots are in control to determine when and where to fly the SIRAS as the mission demands. The Vue® TV128 payload features a 16MP visible camera with 128x zoom to pinpoint details. The integrated 640x512 pixel radiometric Boson® provides best-in-class thermal imagery, 5x digital zoom, and temperature measurement of every pixel in the scene. Drone pilots Designed with cyber security in mind, SIRAS stores imagery and video directly onto an onboard SD card without cloud connectivity features. Additionally, drone pilots are not required to set up an online profile, simplifying operations and minimising the risk of unintended online data exposure. The aircraft is manufactured in Taiwan and the payload is manufactured at the Teledyne FLIR facility in Goleta, Calif., USA.
National Fire Protection Association® (NFPA®) released survey results collected from over 170 industry professionals at the NFPA 2024 Conference & Expo®, the premier conference for fire, electrical, and life safety. The research findings reveal insights into trends and attitudes around digital tools, training and development, and AI implementation within the skilled trades industry. Mixed feelings about AI adoption Twenty-five percent of respondents believe AI should be used to help skilled trade workers streamline tasks during ongoing labour shortages. 19 percent of respondents indicated that either themselves or their organisations have begun experimenting with AI-powered solutions to simplify menial tasks. Additionally, one-third (31 percent) of respondents believe AI can spur industry growth by making the trades more attractive to a younger generation of workers. AI challenges AI to act as a “personal assistant” to field workers for hyper-personalised and on-the-go learning On the other hand, nearly one-half (47 percent) of respondents revealed they are not currently leveraging AI in their day-to-day work and are skeptical of it. Additionally, only 8 percent of respondents believe AI implementation won’t benefit the fire and life-safe industry at all. Respondents also cited utilising AI to act as a “personal assistant” to field workers for hyper-personalised and on-the-go learning (13 percent); streamline manual processes to save time (12 percent); and enhance learning and development initiatives, such as those delivered via virtual reality (8 percent). Digital tools are positively impacting training and development Eighty-two percent of respondents use digital tools daily to help streamline training and development programmes. The majority of respondents within this group recognise the diverse benefits that digital tools offer the skilled trades industry, including: Making training easier (98 percent). Saving time while training (94 percent). Streamlining the process of conducting training (95 percent). Challenges with digital tools However, respondents also noted challenges in leveraging digital tools within their day-to-day operations, despite an increase in the number of participants using five or more tools daily compared to the 2023 C&E Survey results. For example, 69 percent of respondents cited collaboration as a top challenge for 2024, a significant increase from 2023’s results (29 percent). The top-reported challenges teams face in leveraging digital tools include: Collaboration (69 percent). Inspection (51 percent). Complexity of projects (46 percent). Industry participation in NFPA programmes Eighty-five percent of respondents participate in at least one NFPA training and development programme a year and 18 percent of respondents participate in or offer training or programmes twice a year. The top NFPA products and solutions leveraged by skilled trade professionals include: NFPA print publications (66 percent). NFPA membership (61 percent). NFPA LiNK® (51 percent). Challenges persist when it comes to advancing training and development programmes, with a majority of respondents (70 percent) citing lack of time as the biggest barrier. Additional barriers include: Determining the right training (41 percent). Lack of access to qualified instructors (48 percent). Overwhelmed with options and/or a lack of time to vet training programmes (32 percent). Keeping track of which training is needed to maintain professional licenses (22 percent). Lack of technology to disseminate training to employee bases (18 percent). Inability to track and/or document training completions by employees (15 percent). Other (10 percent). Addressing the skilled labour gap 38% of respondents reported the skilled labour gap has negatively impacted the amount of time and money spent Nineteen percent of respondents noted the skilled labour gap has led to less time for career advancement opportunities through training and certifications. More than one-third (38 percent) of respondents reported the skilled labor gap has negatively impacted the amount of time and money spent on recruitment and retention, with 14 percent of respondents turning down projects due to a lack of qualified labour. Survey Methodology NFPA collected responses from 171 U.S. and international-based workers, 18 years and older, in the electrical, manufacturing, construction, engineering, architect/design, facility maintenance, fire service, and insurance/risk management fields to determine the findings of this industry research. The survey was conducted in person between June 17 - June 19, 2024, at the 2024 NFPA Conference & Expo®.
Hanwha Vision, the global vision solution provider, has unveiled its new high-performance bi-spectrum radiometric thermal AI cameras, which are ideal for use in perimeter protection, traffic monitoring, manufacturing, industrial facilities, data centres, solar farms, and more. TNM-C3620TDR/C3622TDR cameras The TNM-C3620TDR/C3622TDR cameras serve as compact indoor models and feature QVGA resolution on the thermal lens and 2MP on the visible sensor, while the TNM-C4940TDR/C4942TDR outdoor models combine advanced VGA thermal and 4K video. The range is designed to deliver clear images in all lighting scenarios, with AI-powered analytics for accurate object detection, and temperature monitoring between -20°C and 130°C. AI for greater accuracy With the outdoor models supporting AI on thermal and visible sensors, they can detect objects in difficult lighting With the outdoor models supporting AI on thermal and visible sensors, they can not only detect objects in difficult lighting conditions, such as complete darkness, fog, or rain, but also alert operators to potential intrusion, loitering, or other suspicious behaviours. Meanwhile, the compact indoor models feature AI on the visible channel. Operational efficiency By ensuring a high degree of accuracy across the range, false alarms triggered by irrelevant motion, for example, wildlife or shadows, are significantly reduced, improving operational efficiency and meaning operators focus only on genuine events. Intelligent video analytics also include enter/exit monitoring and virtual line-crossing detection. Precise temperature monitoring The bi-spectrum radiometric thermal AI cameras offer precise temperature measurements between -20°C and 130°C, making them ideal for industrial applications. By providing critical data on temperature changes, the cameras can alert operators to potential issues such as overheating parts or equipment failure, minimising downtime, enabling proactive maintenance, and enhancing operational efficiency and safety. Operators can toggle between eight colour palettes on the thermal channel, to easily review any temperature changes and enhance the visibility of a scene. Perimeter protection and traffic management The cameras can also be used for traffic monitoring, alerting to stopped traffic that may signal a road accident In particular, the outdoor models are well suited to perimeter protection and can alert operators to potential boundary breaches. The thermal lens can identify potential perimeter breaches across sites by detecting body heat signatures, while the visual lens identifies and classifies objects. The cameras can also be used for traffic monitoring, alerting to stopped traffic that may signal a road accident or congestion. The cameras enable a high degree of accuracy and fewer false alarms. Flexible options The TNM-C3622TDR (indoor model) and TNM-C4942TDR (outdoor model) operate at 8fps on the thermal sensor and therefore are excluded from the Wassenaar Arrangement, an export control regime that governs sensitive goods including cameras with frame rates over 9fps. This makes exporting and importing them simpler and, as such, results in shorter lead times.
Israeli startup company Revealense has unveiled a groundbreaking AI-based technology platform called Illuminator, designed to identify the behvaioural DNA of individuals using video analysis. The system has the potential to transform decision-making processes for managers, investigators, psychologists, and researchers by providing high-quality bias-free, and precise insights, with accuracy rates of up to 92%. Human behvaiour analysis The technology is a significant advancement in the analysis of human behvaiour and has been patented for several breakthroughs in the field. Founded in November 2021 by Dov Donin, the CEO, Revealense has assembled a team of experts in psychology, neuropsychology, mathematics, AI, computer vision, and neural networks. AI-based illuminator system The illuminator system utilises artificial intelligence to analyse the behvaiour of individuals captured on video Every individual possesses unique personality lines and emotional and cognitive responses like a fingerprint. The illuminator system utilises artificial intelligence to analyse the behvaiour of individuals captured on video, whether live or recorded. It can accurately identify the specific context of the video, such as a job interview, credibility check, investigation of a hostile person, or diagnosis of a mental state, and activate the appropriate algorithms for the situation. Real-time monitoring The system also provides real-time monitoring of physiological characteristics, such as changes in skin pigmentation, blood flow, pulse, voice, eye blinking, facial expressions, and signs of neural discharge. These indicators allow the system to assess the emotional and mental state of the individual and identify the specific content that triggered a nervous reaction or stress. Mental DNA signature The technology produces a unique "mental DNA signature" of the individual, enabling managers, investigators, psychologists, and researchers to make bias-free, fair, accurate, and high-quality decisions. Unlike other solutions on the market, the illuminator integrates a neural network that cross-references various parameters to verify findings, ensuring consistency and calibration of results. This approach addresses the limitations of existing solutions that track only one or a few indices without mutual checking between them. Unbiased insights The technology used is a breakthrough in the analysis of human behvaiour and has been patented Because Illuminator incorporates ethical, responsible, and fair AI that neutralises cultural influences, it provides unbiased insights without the influence of geographic region, religion, language, nationality, or race. The technology used is a breakthrough in the analysis of human behvaiour and has been patented for several innovations in this field. Identifying behvaioural profiles “AI provides new opportunities for improving the lives of people around the world. However, existing AI solutions often base their analysis on inaccurate and missing data leads." "With Illuminator, we provide a comprehensive solution for identifying behvaioural profiles and personality characteristics of individuals. This gives decision-makers powerful tools to understand others and make accurate, fair, and equitable decisions,” said Dov Donin, the founder and CEO of Revealense. SaaS model “The system is easy to implement through a cloud service model (SaaS) and can scale according to any need. For example, it can examine the development of mental trauma, identify the potential for violence, diagnose reliability, and many other use cases." Due to the need for a responsible way of analysing human behvaiour, Revealense already has several customers around the world, with significant growth potential in several market segments. Institution and Homeland Security applications Revealense identifies mental states, assists in the treatment process, and identifies causes of trauma For mental health institutions, Revealense identifies mental states, assists in the treatment process, and identifies causes of trauma and anxiety. This market is expected to grow by 30% annually to reach $20 billion in the US by 2027. Homeland security organisations can use the Illuminator platform to fulfill several requirements. These include interrogation rooms and remote checking of people's reliability and profiles. This market is expected to reach $20 billion in the US by 2025. Cyber defence market With a 550% increase in deep fake attacks since 2019, the reputational and financial damage caused by these videos is significant. In the US, the cyber defence market against deep fake content is expected to reach $40 billion by 2030 across governmental, media, finance, and other industry segments. Revealense's illuminator technology is poised to make a significant impact in these markets, providing valuable insights and solutions for a wide range of applications.
As the cybersecurity landscape evolves with the looming threat of quantum computing, industry pioneers are joining forces to develop robust solutions. The Hyperform consortium unites several pioneering players in cybersecurity and post-quantum: IDEMIA Secure Transactions, a project coordinator and a pioneering provider of secure solutions, CryptoNext, a provider of post-quantum cryptography remediation solutions, Atempo, a provider of data protection solutions, Prim’X, a software publisher of encryption solutions, Synacktiv, an offensive security company and licenced testing laboratory (CESTI), CEA Leti, a global pioneer in miniaturisation technologies enabling smart, energy-efficient and secure solutions for industry, INRIA, the French national institute for digital science and technology, with world-class researchers in cryptography and secure implementation, and the French cybersecurity agency (ANSSI), who will supervise the security and performance assessment of the solution. Funded by the French government investment plan France 2030, and credits from the European Union, the consortium is a key element in the development of European sovereignty in post-quantum cryptography. Next-generation quantum-safe chip Hyperform consortium will work to develop quantum-safe components so that service providers The arrival of the quantum computer will jeopardise the security of sensitive data. The objective of Hyperform is to design quantum-safe solution that will protect government, enterprise and citizen data from the threat of quantum computer. The consortium will set up a complete demonstrator for cloud data storage, documents archiving and online collaboration, based on sovereign encryption software used to protect the most critical information. With more than 7.5 million euros invested by the consortium, France 2030 and the European Union, and 29 experts recruited, the Hyperform consortium has very strong ambitions. Over the next three years, the Hyperform consortium will work to develop quantum-safe components so that service providers – including banks, governments, and software companies – can ensure unrivalled data security for their end-user services. The first end-to-end solutions will have the potential to set the standard for the whole industry. As part of this project, the consortium will develop a next-generation quantum-safe chip and create post-quantum cryptographic libraries, enhancing payment transactions as well as identity document reading. Supervision of the ANSSI security agency Performance and security of these new keys will be assessed under the care of the ANSSI In order to facilitate the transition to these advanced security measures, existing cybersecurity software will be modified. The performance and security of these new solutions will be assessed under the supervision of the ANSSI security agency. "True to our commitment to providing service providers with state-of-the-art security services, we are very proud to lead the Hyperform consortium. This collaborative project highlights our shared expertise in post-quantum technologies and our joint commitment to crafting solutions that meet industry demands. By working hand-in-hand with the ecosystem, we will be able to develop a robust quantum-safe framework, driving co-innovation and industry-wide progress," Marc Bertin, Chief Technology Officer at IDEMIA Secure Transactions. Advancement of post-quantum algorithms With a global team of 800 experts in research and development, IDEMIA Secure Transactions stands at the forefront of technology, particularly in post-quantum cryptography, as a world-pioneering authority. The company has been a trailblazer in the advancement of post-quantum algorithms and notably, in 2022, achieved a milestone by introducing the first quantum-resistant 5G SIM. The Division recently unveiled the first crypto-agility solution that will enable service providers of secure products to future-proof the security of their products in the post-quantum era.
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication? Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building unlocked during production hours. For all but the smallest shops, front-door access typically involves individual radio-frequency identification (RFID) badges that enable tracking of who is coming and going and at what times. Use of physical keys, password login It is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training But when it comes to production machinery, many manufacturers still rely on physical keys, password login on the human-machine interface (HMI), or a shared PIN to unlock machine access. In some shops, machines may not be secured at all, it is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training to use the machines responsibly. However, this is not necessarily a good assumption, especially in a larger manufacturing plant where many people can access the production floor. Valuable and sensitive equipment CNC machines, robotic welders, process equipment, and other production machinery can cost anywhere from $5,000 to half a million or more, depending on their size and function. They also have significant safety risks for untrained users and may hold valuable and sensitive IP (such as customer design specs or batch recipes). User authentication Authenticating users at the machine level closes an important security loophole and makes plants safer and more productive. Machine authentication prevents untrained or unauthorised users from accessing production machinery. The right authentication system also allows access levels to be tailored for different users based on training credentials, job roles, or even projects. Machine authentication benefits A strong machine authentication solution provides several benefits for manufacturers: Minimises unplanned downtime and expensive damage to machines caused by untrained operators. Enables tracking of production outcomes by machine operator for better quality control and troubleshooting. Protects company and client IP held on the machine by preventing unauthorised access to machine controls and memory. Enhances plant safety and compliance by limiting machine access to operators with the appropriate credentials. Reduces the risk of deliberate sabotage by unauthorised operators, including damage to machines and production facilities and data theft or corruption. Mark Merino, the Director of the Digital Factory Group for Polaris Automation, explains, “Machine authentication allows us to identify which people are logged into different pieces of equipment and make sure they are trained appropriately for the machine and have the right clearances for the data they are trying to access.” Choosing the right machine authentication solution Access control for production machinery can be accomplished by various means, including password and PIN systems, physical keys or fobs, RFID badges, or smartphone-based mobile credentialing systems. The best machine authentication system will: Be highly reliable and secure to protect the machine from unauthorised access. Enable identification of individual operators and tracking of who has used the machines, at what times, and for what projects. Allow access levels to be differentiated by the user. Be easy to implement and administer. Discourage sharing or cloning of credentials. RFID readers An RFID reader can be easily connected to or integrated with the HMI for the machine In most manufacturing environments, the simplest solution for machine authentication is the RFID badge employees already carry for building entry. An RFID reader can be easily connected to or integrated with the HMI for the machine. All users must do to authenticate themselves is swipe their badge over the reader to unlock machine controls. RFID benefits RFID provides multiple benefits for end users, IT, and managers: It leverages technology already widely used, so users do not have to carry a separate key or fob to access machine controls. It is more secure and easier to manage than a password system, as passwords are frequently forgotten, shared, or hacked. Unlike shared PINs, physical keys, or fobs, user authentication via an ID badge enables accurate identification of who is logging into the machine. Users are much less likely to share their picture ID badge (which is often also linked to HR functions such as time and attendance) than a machine password, PIN, or key. If an ID badge is lost or stolen, or an employee leaves the company, IT can easily disable access to the card. RFID credentials are very difficult to hack or clone. Transmission between the reader and card can be encrypted for added security. Unlike biometric options, RFID is highly reliable even in hot, dirty, or humid environments and does not require workers to remove gloves, safety goggles, or masks. Getting started with machine authentication Machine authentication starts with selecting the right RFID reader. A universal RFID reader supports easy implementation, integration with other building systems, and scaling. A universal reader also provides flexibility for the future in case companies want to change transponder technologies or allow for user authentication using mobile credentials on a smartphone. IIoT model User authentication must be designed within the context of the wider security ecosystem of the plant To ensure the security of production machinery, user authentication must be designed within the context of the wider security ecosystem of the plant. Modern production machines are increasingly networked and connected in an “Industrial Internet of Things” (IIoT) model. That means machines are not only vulnerable themselves but are also endpoints in the broader IT landscape of the plant. Machine authentication systems must incorporate best practices for endpoint security, such as those outlined by ISO (International Organisation for Standardisation), NIST (National Institute of Standards and Technology), and other industry organisations. Best practices: The reader installation should be tamper-proofed to prevent physical disruption of the authentication system. Use an encryption standard suitable for the security level of the application. Encryption prevents data interception or card cloning. If higher security is desired, RFID can be implemented as part of a multi-factor authentication system along with biometrics and/or a password or PIN. The authentication system should support different access levels for different users or classes of users. A role-based permission system allows for different levels of access for line operators, supervisors, IT, and maintenance, for example. For maximum safety and security, individual users should only have the minimum access required to do their jobs. With secure machine authentication, manufacturers can protect people, production equipment, and IP, while enabling smooth operations. It all starts with an authentication system that supports reliable and secure operator identification at the machine level.
Security beat
Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzeit, President of Idesco, a provider of ID card solutions. Supply chain concerns Supply chain concerns will continue as companies seek to upgrade and purchase new ID printers and badges An impact of the pandemic was a shortage of supplies related to the ID card industry, says Schonzeit. Like other industries, several leading ID card and printer manufacturers had supply chain issues, and some deliveries were delayed at times for more than six months. Supply chain concerns will continue into 2023 as more companies return to the workplace and others seek to upgrade their current systems and purchase new ID printers and badges. Persistent price increase concerns “The shortage created hardships for end users and often resulted in them purchasing any solution that was readily available even if it was not the preferred one,” says Schonzeit. Another issue during the pandemic was persistent price increases, due both to inflationary pressures and a shortage of products. The industry was used to stable prices with infrequent increases, but the pandemic changed this quickly. Some companies also decided to upgrade their entire system as employees returning to the office increased demand. Oversized credentials advantages Among the advantages of oversized credentials is the ability to print more information on the card, says Schonzeit. For example, a larger credential allows event organisers to preprint the corporate agenda on the back of the card to increase efficiency. In addition, companies can enhance their brand presence by distributing a nice thick plastic badge to attendees. Two categories Standard credit card size These are generally CR100 size, which is around 40% larger than the standard credit card Oversized badges fall into two main categories. One category is for cards that are larger than the standard credit card size (CR80), but smaller than event badges. These are generally CR100 size, which is around 40% larger than the standard credit card. They are generally used by law enforcement or healthcare institutions. It is easier to see an oversized badge more clearly from a distance than a regular-sized badge. Oversized ID badges The other category of oversized ID badges is used for events, these badges are typically 3.5” by 5.5” and are usually worn around the neck. These events include categories such as sporting events, corporate events, music festivals, and trade shows. The badges are generally used only for the duration of the event and are often kept as souvenirs. Anticipating the needs “My advice for event planners is to manage your expectations about badges as it is very hard to order extra badges at the last minute,” says Schonzeit. “It is important to plan well in advance and anticipate your needs upfront to help avoid a shortage.” Idesco often gets requests from customers to include some type of technology on the credentials. The most common technologies are proximity cards, NFC, and/or UHF. “It is a much ‘cleaner’ and safer solution if the chip can be embedded within the credential as opposed to putting a sticker on the outside of the credential,” says Schonzeit. Additional technologies in credentials Customers wanting technology in their credentials should allow additional lead time Generally, these additional technologies are used for gaining entry to a location (access control), or they can be used for gathering valuable information regarding an event, including attendance at seminars, crowd flow, vending, and food services information, among others. Supply chain issues have led to less availability of many of the most common chips, which can impact delivery times. Customers wanting technology in their credentials should allow additional lead time, says Schonzeit. Applications In addition to corporate events, sporting events, and trade shows, other markets can also benefit from oversized ID badges. Industries include healthcare, government, and law enforcement. Oversized badges are becoming more popular in hospitals, for example, where color coding can make it easy to identify doctors, nurses, and hospital personnel from a distance, even in congested hospital spaces. ID card necessity Could there be a negative impact on the ID card industry if more companies allow employees to work from home? It’s always a possibility, says Schonzeit. “However, with many hybrid options out there, most employees are required to come to the office either one or two days a week,” he says. “Employees will still need a way to access their workplace for meetings, conferences, etc., and will require an ID card to do so.” Mobile vs. physical credentials The growing popularity of mobile credentials has created some concerns in the ID card marketplace The growing popularity of mobile credentials has created some concerns in the ID card marketplace about the continuing need for a physical credential. So far it has not been an issue. “[Mobile credentials] have not had any type of meaningful effect on the physical ID card market,” says Schonzeit. Relying on smartphones “Sometimes these disruptive technologies can linger in the background for some time and then suddenly have a massive effect on the market. This is something to be concerned about, but I don’t think there is an imminent threat.” A big issue with using only mobile credentials is the need for a backup plan rather than relying only on a smartphone to enter a facility. Also, for mobile credentials to work, specialised readers are required, which requires a large investment. “In my opinion, ID badges are here to stay for the long haul,” says Schonzeit.
Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximise that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges such as dysfunctional supply chains and lingering consequences of a global pandemic. Here are some of the larger and/or most impactful M&A transactions of 2021. Stanley Black & Decker sells to Securitas Stanley Black & Decker announces an agreement to sell most of its Security assets to Securitas AB for $3.2 billion in cash. The transaction includes Stanley Black & Decker's Commercial Electronic and Healthcare Security business lines. The businesses carry 2021 forecasted revenues of approximately $1.7 billion. “The business is well-positioned for ongoing growth within Securitas, a global pioneer in the security industry,” says James M. Loree, Stanley Black & Decker's CEO. Openpath’s solution makes businesses more secure with multi-factor authentication Motorola acquires Openpath and Envysion Motorola Solutions adds to its security industry portfolio with the acquisition of Openpath Security Inc., a cloud-based mobile access control provider. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contactless entry experience, and can be easily scaled and managed due to its cloud-based architecture. Motorola also announces the acquisition of Envysion, a provider of video security and business analytics solutions for quick-service restaurant and retail industries. Delta Electronics buys March Networks Delta Group, a provider of power and thermal management solutions, , purchased 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence company March Networks, from Infinova International Ltd. through its subsidiary Delta International Holding Limited B.V. Following the close of the transaction, it was expected that March Networks will continue to operate from its Canadian headquarters, and the March Networks executive management team will continue to lead the organization. Delta Electronics is also the parent company of VIVOTEK. APi Group acquires Chubb Fire and Security Business APi Group Corp. agreed to acquire the Chubb Fire & Security Business from Carrier Global Corporation for an enterprise value of US$ 3.1 billion. Headquartered in the United Kingdom, Chubb has approximately 13,000 employees globally and a sales and service network that spans 17 countries, serving more than 1.5 million customer sites in Europe, Asia Pacific, and Canada. APi Group is a business services provider of safety, specialty, and industrial services in more than 200 locations worldwide. Teledyne Technologies Inc. will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion Teledyne acquires FLIR Teledyne Technologies Inc. and FLIR Systems, Inc. jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion. Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction.” Resideo adds Norfolk Wire and Electronics Resideo Technologies, Inc. acquired privately held Norfolk Wire & Electronics, based in Richmond, Virginia. Norfolk was founded in 1985 and is a regional distributor of security, telecom, network, and audio-video (AV) related products, supplies, and tools. With 11 full-service retail locations and a 43,000 sq. ft. distribution centre, Norfolk serves customers across the mid-Atlantic region and will be part of Resideo's ADI Global Distribution business, a wholesale distributor of security, AV, and low-voltage products. Triton acquires ACRE, which acquires Feenics and Matrix Triton Partners acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton is investing alongside the current management team of ACRE. Weeks later, ACRE acquired cloud-based workplace solutions company Time Data Security (TDS). Later in the year, ACRE announced acquisition of Feenics and Matrix Systems. Feenics brings cloud-based access control solutions brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio. Brivo, Inc. and Crown PropTech Acquisitions have entered into an agreement making Brivo a publicly listed company Brivo becomes publicly traded through the merger Brivo, Inc., a cloud-based access control and smart building technologies company, and Crown PropTech Acquisitions, a publicly traded special purpose acquisition company (SPAC), have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company. The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.” Nice buys Nortek Security Nice, a global manufacturer of smart home, security, home, and building automation solutions, , acquired Nortek Security & Control from Melrose Industries. Nortek Security & Control is a developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets. Eagle Eye acquires Uncanny Vision Eagle Eye Networks, a cloud video surveillance solutions company, has acquired Uncanny Vision Solutions, an artificial intelligence (AI) analytics and Solutions Company. The acquisition accelerates the company’s leadership in providing AI and analytics, to make customers’ businesses more efficient and the world a safer place. The acquisition also includes research and development (R&D) capabilities and a new regional office located in Bangalore, India.
Thermal cameras can be used for rapid and safe initial temperature screening of staff, visitors and customers. Used the right way, the cameras can help prevent unnecessary spread of viruses like the novel coronavirus. During the global pandemic, use of thermal cameras has increased, but they have not always been used correctly, and therefore, not effectively. Hikvision’s temperature screening thermal products are currently assisting users in initial temperature screening across the global market. During 2020, demand increased in most markets, and the company highly recommends that Hikvision’s thermographic cameras be used in accordance with local laws and regulations. Limitations of the technology include throughput and the impact of ambient conditions. Detect viruses and fever Hikvision releases a video that illustrates how skin temperature measurements are normalised within minutes Thermal cameras cannot detect viruses and fever and should only be used as a first line of screening before using secondary measures to confirm, says Stefan Li, Thermal Product Director at Hikvision. “We also believe it is important for businesses and authorities to use [thermal cameras] alongside a full programme of additional health and safety procedures, which includes handwashing, regular disinfection of surfaces, wearing protective clothing such as masks, and social distancing.” Hikvision has released a video that illustrates how skin temperature measurements are normalised within minutes after someone emerges from the cold. Mr. Li says the video demonstrates the accuracy of forehead measurement under difficult circumstances when people come inside from a cold outdoor environment. Temperature screening facilities “There have been some claims that measuring the forehead temperature is not as accurate as measuring the inner canthus, and we believe this video demonstrates the accuracy of forehead measurement very well,” he says. “We also illustrate how the skin temperature will experience a process of recovery (warming up), no matter if it is measured by a thermal camera or a thermometer.” Mr. Li adds that people should wait five minutes in such circumstances before starting a temperature measurement. “We hope that stakeholders who are involved in the design of temperature screening facilities and associated health and safety procedures will recognise how important it is to consider the skin temperature recovery time, and that forehead measurement can provide accurate test results,” says Mr. Li. Thermal imaging manufacturers The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced The temperature measurement principle of thermal imaging is to detect the heat radiation emitted by the human body. The detected heat value often does not reflect the true internal body temperature of an individual. Furthermore, the temperature varies among different parts of the human, such as the forehead, ears, underarms, etc. A temperature compensation algorithm can be used to adjust the measured skin temperature to align with the internal body temperature. The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced. At present, thermal imaging manufacturers in the market, and even forehead thermometer manufacturers, have developed their own algorithms to map the skin temperature measured by the camera to the internal body temperature, so as to compensate the skin temperature to the internal body temperature. Thermal cameras This is also why Hikvision recommends that the "actual body temperature" should be checked with a secondary device for confirmation. The calibration work for a thermal camera is completed in the production process at the factory, including calibration of reference values and detection point and so on. At the same time, the equipment parameters should be adjusted before on-site use to ensure accurate temperature reads. Hikvision does not deny the accuracy of temperature measurement at the inner canthus but prefers forehead temperature measurement and algorithms based on actual use scenarios, says Mr. Li. A large amount of test data and practical results indicates that the forehead is a correct and easy-to-use temperature measurement area, says the company. There are advantages and disadvantages of choosing different facial areas for temperature measurement. Default compensation temperature Two main approaches direct the measurement area and how compensation algorithms are applied: Forehead area + default forehead compensation algorithm value Upper half face (forehead + canthus) + default inner canthus compensation algorithm value. Both methods deploy compensation algorithms, but the default compensation temperature of the inner canthus will be less than the default compensation temperature of the forehead, generally speaking. The reason is that the temperature of the inner canthus of most people is higher than their forehead, so the temperature compensation is relatively low (i.e., closer to the actual temperature inside the body.) Upper face area Hikvision found that selecting the upper face area plus the default compensation value for the inner canthus resulted in situations when the calculated temperature is lower than the actual temperature. For the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face Mr. Li explains: “The reason is that when the camera cannot capture the position of the inner canthus (for example, when a person is walking, or the face is not facing the camera), the camera will automatically capture the temperature of the forehead. Then the result that appears is the sum of the forehead temperature plus the default compensation temperature of the inner canthus, which is lower than the actual temperature of the person being measured. Therefore, errors are prone to occur.” Thermal imaging products But for the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face. Also, the default forehead compensation temperature is based on rigorous testing and can also correctly mimic the actual temperature of the person being measured, says Mr. Li. After many test comparisons, considering that the results of forehead temperature measurement are relatively more stable, and in order to avoid the false results from inner canthus temperature measurement, Hikvision chose the forehead temperature measurement approach. “We look forward to bringing thermal imaging products from a niche market where there is a relatively high-end industry application to a mass market and serving more users,” says Mr. Li. Facial recognition terminals Additional application parameters can maximise effectiveness of thermal cameras for measuring body temperature: Positioning and height - All cameras must be mounted appropriately to avoid loss of accuracy and performance. The installation height of each camera must be adjusted according to camera resolution and focal length, and stable installation is needed to avoid errors caused by shaking. Ensuring a ‘one-direction path’ - The detection area must ensure that cameras capture the full faces of all those passing by or stopping, and obstacles should be avoided in the field of view, such as glass doors that block the camera. Adequate start-up and usage - A waiting time of more than 90 minutes is required for preheating, after the initial start-up. Before conducting a thermal scan, people should be given three to five minutes to allow their body temperature to stabilise. When Hikvision MinMoe facial recognition terminals are used, people must stand at a fixed distance, pass one by one, make a short stop, and face the camera directly. Hikvision cameras support efficient group screening, but one-by-one screening is suggested for more accurate results, says Mr. Li. Unstable environmental condition An unstable environmental condition may affect the accuracy of thermal camera systems Environmental factors can impact the accuracy of thermal cameras, and the idea of using a black body is to provide the camera with a reference point that has a stable temperature. The black body is heated to a specific temperature and helps the thermal camera to know how much error is caused by environmental factors in the room, and how the camera should calibrate itself in real time to improve its accuracy. A black body can help increase the temperature measurement accuracy, and the most common improvement is from ±0.5 degrees to ±0.3 degrees. However, it also increases the cost of the installation. In some markets, customers may require black bodies in order to comply with regulatory accuracy requirements. An unstable environmental condition may affect the accuracy of thermal camera systems for measuring temperature. Medical temperature measurement Therefore, Hikvision suggests that the ambient conditions should be met for installation and use. First of all, users should avoid installing devices in hot or changeable environments. All cameras require indoor environments with calm air, consistent temperature and no direct sunlight. Installation should also be avoided in semi-open locations that may be prone to changes in ambient conditions, such as doorways, and there should be enough stable, visible light. All devices should be installed to avoid backlighting, high temperature targets, and reflections in the field of view as far as possible. “We often see the misconception that thermal cameras can replace medical temperature measurement equipment, which is not the case,” says Mr. Li. Rapid preliminary screening “Temperature screening thermographic cameras are designed for the detection of skin-surface temperatures, and the measurement should be conducted to achieve rapid preliminary screening in public areas. It is really important that actual core body temperatures are measured subsequently with clinical measurement devices.”
Case studies
A premier cancer research and treatment institute in India, renowned for advancing oncology, serves as a national centre for specialised healthcare. Committed to delivering innovative treatments and holistic care, the institute integrates state-of-the-art technology with a highly skilled medical team. It emphasises comprehensive patient management, pioneering research, and educational initiatives to enhance oncology expertise. The institute's cutting-edge facilities are tailored to support groundbreaking research, driving progress in cancer treatment and care. Challenges/requirements The research institute relied on a legacy network setup that gradually introduced multiple challenges: Integration with Existing Infrastructure: The institute sought a Unified Communication System that could effortlessly adapt to its intricate legacy setup. Maintaining compatibility was essential to preserve seamless connectivity and ensure the continuity of critical daily operations. Scalability for Future Growth: With plans for expansion, the institute foresaw growing communication needs, including enhanced connectivity and advanced functionalities. Matrix was entrusted to provide a solution that not only resolves present challenges but is also designed to scale effortlessly for future requirements. Secure Communication: With the critical sensitivity of medical communications, ensuring data security and compliance with healthcare standards was paramount. Matrix was tasked with delivering a robust solution designed to safeguard privacy and protect against security risks. Solution The Matrix Unified Communication System incorporated a VoIP-PRI gateway and an embedded IP-PBX server, effectively integrating with third-party IP phones. This configuration bridged modern communication technology with the institute's legacy systems, ensuring seamless functionality. The solution highlights are as follows: Integration with Legacy Network: The Matrix Unified Communication System incorporated two SETU VTEP1P VoIP-PRI gateways, seamlessly connecting with the existing legacy PRI network to ensure smooth integration and enhanced communication capabilities. IP Network: The embedded IP-PBX server, PRASAR UCS-SPARK200, facilitates the IP network connection via a router, enabling seamless communication across the system. Integration with Third-Party IP Phones: The IP-PBX server, connected via the LAN, powers the IP network to support over 300 third-party IP phones, creating a comprehensive and unified communication system. Results The implementation of the Matrix Unified Communication System significantly enhanced the Cancer Research Institute's communication infrastructure. The key outcomes were: Smooth Transition with Legacy Infrastructure: The system effortlessly connected with the institute’s existing PRI network, allowing the retention of its current setup while introducing modern VoIP capabilities. This ensured operational continuity and efficient workflows without the need for costly upgrades or disruptions. Future-Ready Scalability: The IP-PBX server, capable of supporting up to 2100 users, provides the institute with a flexible and adaptable communication solution. Designed to accommodate future growth, the system ensures increased connectivity and the integration of advanced features, aligning seamlessly with the institute’s expanding needs. Optimized Licencing Structure: The deployment of the Matrix SIP server enabled the institute to reduce licencing costs by up to 20%, delivering significant savings while maintaining high-quality communication capabilities. Enhanced Device Connectivity: Reliable IP connectivity across over 300 third-party IP phones has streamlined internal communication within the institute. This seamless integration allows staff to collaborate efficiently across departments, enabling quicker decision-making and more unified operations. The Matrix Unified Communication System empowered the Cancer Research Institute to transition to a scalable and integrated communication infrastructure. This solution not only supports current operations but also accommodates future growth, effectively resolving core challenges with a seamless and sustainable approach.
The Salvation Army's mission is to meet human needs wherever and whenever necessary. Their presence spans 13 Western states, plus Guam, the Marshall Islands, and Micronesia. This commitment to service is supported by local programmes that are tailored to each community’s specific needs, and technology plays a crucial role in ensuring that these operations run smoothly. Addressing security challenges As part of their long-term goal to modernise security and streamline operations, the Salvation Army Western Territory turned to Verkada to address growing security challenges across more than 700 sites in diverse urban environments. "We're in some of the most colourful neighbourhoods in every major Western city, like Watts, California, and downtown Denver," says Randy Haan, Director of IT Infrastructure. "With these locations come security challenges, and having reliable surveillance and access control is critical." Centralised command for streamlined management Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups Before implementing Verkada in 2017, The Salvation Army managed disparate, localised security systems that required significant maintenance and support. Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups, which resulted in time-consuming troubleshooting and poor visibility in critical moments. Cloud-based approach "When we were looking at different camera systems, Verkada's cloud-based approach stood out. We didn’t need NVRs or complex server setups—it was a no-brainer," Randy explains. "Verkada’s platform centralised everything, allowing us to manage access control and surveillance from anywhere." Simplifying day-to-day operations This centralisation not only enhanced security coverage but also simplified day-to-day operations. Joshua Brown, Endpoint Security Administrator, adds, "We used to need a large team to handle security across all our sites. Now, with Verkada, we’ve reduced the need for staffing by about 50 to 70 percent for IT support, and it’s allowed us to expand security at a much faster rate." Saving over $1.5 million with Verkada’s scalable solutions Randy attributes this significant cost reduction to the elimination of hardware maintenance Since implementing Verkada, The Salvation Army Western Territory has saved over $1.5 million. Randy attributes this significant cost reduction to the elimination of hardware maintenance, reduced staffing requirements, and minimised support needs. "We’ve gone from needing a dedicated technician at each of our 240 locations to just two people managing all 3,000 cameras across these sites," Randy notes. Management from one platform "For a nonprofit like The Salvation Army, where every dollar counts, this shift has been invaluable." Joshua also points out that the ease of managing systems from one platform has been transformative. "With Verkada, I can snapshot configurations, roll them out, and get everything up and running quickly. It’s 10 times easier than before." Expanding capabilities with Verkada's integrated system In addition to security cameras, the Salvation Army has integrated Verkada’s access control solutions across many of its locations. One recent highlight is the TD52 Intercom system, which Randy and his team highly anticipated. "We’ve been waiting for an intercom system that integrates with access control and surveillance for years," Randy says. New alarm panels "Now, with the TD52, we have seamless entry management at critical locations." Joshua is also excited about the new alarm panels being rolled out. "We’ve seen legacy systems fail repeatedly, but now we can replace those with Verkada’s alarms, which offer better value and integration across our facilities." Seamless cloud migration and Azure AD integration Verkada’s cloud-based platform has made this transition easier for its security systems The Salvation Army Western Territory has been migrating to the cloud for nearly a decade, and Verkada’s cloud-based platform has made this transition easier for their security systems. "Verkada’s integration with our Azure AD was a game changer," Randy says. One-stop-shop solution "We no longer need separate systems to manage users. Everything is streamlined, adding or removing access takes seconds, and it’s all automated with our primary directory." Joshua adds, "Before Verkada, we had sites with multiple NVRs, each with different passwords, and nobody knew how to manage them. Now, it’s all in one pane of glass, and it’s much easier to handle security across all our locations." Looking forward while expanding with confidence As The Salvation Army continues to grow and expand its operations, Randy and Joshua are confident that Verkada will remain a critical part of their infrastructure. "Why wait?" Randy advises other organisations to consider a switch to Verkada. "The initial investment may seem high, but the return on investment over time is massive. You reduce staffing needs, streamline operations, and can manage everything with just a few people." Cost-saving measures With a mission as broad and impactful as The Salvation Army's, every cost-saving measure allows them to reinvest in the communities they serve. Randy sums up, "Verkada’s solutions have been invaluable for a nonprofit like us. The cost savings and ease of management allow us to focus more on what matters: helping people."
In a groundbreaking initiative to bolster security measures, Indian Railways has successfully implemented Herta's state-of-the-art facial recognition solutions across its extensive network of train stations in the Eastern region. This transformative project marks a significant step towards ensuring the safety and well-being of passengers and staff throughout the railway system. The project becomes the largest one in the world in the transport sector. Herta has also been awarded two more regions that will be implemented after the Eastern one. Facial recognition technology The deployment of Herta's cutting-edge facial recognition technology is part of IndianRailways' commitment to embracing advanced solutions for enhancing security. By leveraging Herta's expertise, the railway network aims to create a safer environment for passengers, mitigate potential security threats, and streamline operational efficiency. Key features Key features of Herta's facial recognition solutions implemented at 230 train stations using thousands of video surveillance cameras include: Real-time Identification: Herta's technology provides real-time facial identification capabilities, allowing for swift and accurate recognition of individuals within the train station premises. Enhanced Security: The implementation of facial recognition enhances security by automatically identifying and alerting authorities about the presence of individuals with potential security concerns, contributing to the overall safety of passengers and staff. Efficient Monitoring: Herta's system enables efficient monitoring of the train stations, offering a proactive approach to security management. The technology assists in the quick response to incidents and ensures a rapid resolution of security issues. User-Friendly Interface: The intuitive user interface of Herta's solutions facilitates easy integration with existing security systems, providing a seamless experience for railway personnel responsible for monitoring and managing security. Stringent security requirements Mr. Rahat Jain, IDIS INDIA - MD, expressed his enthusiasm about the successful implementation, stating, "We are delighted to announce the successful integration of Herta's facial recognition solutions at Indian Railways." Startologic, the official partner overseeing the deployment of Herta's facial recognition solutions at Indian Railways, is proud to be part of this transformative project. The successful implementation showcases the capability of Herta's technology to meet the stringent security requirements of one of the world's largest railway networks.
The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driven approaches to law enforcement. Through initiatives like "Smart Policing," a collaboration with the local community and Winston-Salem State University, the department aims for systemic change in crime reduction and community safety. Real-time intelligence Lieutenant Ben Jones oversees the Real Time Crime Center (RTCC) housed in the Criminal Intelligence Bureau, a crucial nerve in the department’s operations. Under his stewardship, the team assists officers in protecting over 253,020 people across 133.7 square miles. “A more informed officer makes better decisions. We provide as much real-time intelligence as possible to detect, deter, and solve crime.” The challenge Get Connected Winston-Salem campaign integrates community-owned cameras into the police's video security Facing violent crime and an annual increase in homicides, the WSPD emphasises rapid responses underpinned by precise and accurate data. A particularly innovative step is the "Get Connected Winston-Salem" campaign, which integrates community-owned cameras into the police's video security system through Fūsus. This not only broadens the scope of crime monitoring but also exemplifies the department's commitment to collaborative crime-fighting. However, finding suspects’ vehicles was a logistical nightmare and still relied heavily on witness accounts. “We began looking at LPR solutions to assist in shootings, homicides, and cases involving vehicles.” Intelligence gathering with LPR and Multisensor To elevate its crime-solving capability, the city has strategically placed Verkada License Plate Recognition (LPR) and Multisensor cameras at traffic light intersections. “Our goal is to improve the solvability and speed of investigations by being able to identify suspects' vehicles across different intersections. We tie LPR with the Multisensor, which gives a four-way view across the intersection. No other solutions we evaluated offer this capability.” The nature of the incident When an incident is reported, the initial call is directed to the Patrol Divisions, and first responders are dispatched accordingly In partnership with the Winston-Salem Department of Technology (DoT), Jones plugs Multisensor cameras directly into the city system where there's Fiber and power. When an incident is reported, the initial call is directed to the Patrol Divisions, and first responders are dispatched accordingly. The nature of the incident determines its next course: for instance, serious shooting incidents are relayed to the Violent Firearms Investigative Team, while homicides are dealt with by the Criminal Investigation Division. Real-time Verkada Analytics “Before, we relied on witness information. Now, with Verkada and Fūsus, finding what we need can take just minutes instead of days.” The Verkada software, in conjunction with Fūsus, enhances the accuracy and speed of investigations, particularly in locating vehicles associated with a crime and finding missing people. People and Vehicle Analytics allow for the swift identification of both suspects and missing people throughout the city. Finding missing people - Detailing a success story, Lt. Jones recounts, “We found a missing person on a Verkada camera, and used People Analytics to find her at different times. We were able to confirm that she was alive at particular times, which gave investigators a starting point.” Coupled with ShotSpotter, a gunfire detection system, the team swiftly locates suspects using real-time analytics Finding suspects by vehicle - Coupled with ShotSpotter, a gunfire detection system, the team swiftly locates suspects using real-time analytics. “As soon as there is a shooting, the team uses Verkada to quickly locate suspects’ vehicles based on their description and colour." "A high percentage of violent crimes involve suspects who arrive, leave, or commit the crime from a vehicle. Verkada helps us identify where they’ve been, where they are, and where they’re headed.” Alerting with video context - Verkada goes a step beyond the image of a vehicle tag, providing a video of the car, its tag, and other vital details. “In the past, we might’ve stopped every red car. With Verkada, we have higher accuracy and less chance of mistaken identity." "I've been in the LPR market for a while and found that most solutions only give you a picture of the tag and vehicle. Verkada associates a video with each tag, so we have additional context easily available for intelligence gathering.” What's next Entering phase two, the goal is to place Multisensors closer together and increase the Verkada security These use cases with Verkada are just the beginning. Lt. Jones envisions a future where the department can seamlessly locate vehicles from one intersection to another, making suspect identification efficient and precise. Entering phase two, the goal is to place Multisensors closer together and increase the Verkada security coverage across the city. Real-time problem solving "The LPRs and Multisensor fit into our overlapping technology strategy, and we plan to increase the density of our deployment. If we’re pursuing an active shooter for example, having the cameras near our shotspotter areas allows us to use both technologies in conjunction with one another to locate the shooter.” Furthermore, by showcasing the efficacy of Verkada to other police departments, Winston-Salem aims to set a benchmark in crime-solving on the East Coast. Lt. Jones adds, “My goal is real-time problem solving; witnessing events as they unfold, not after. With Verkada, we’re turning that goal into reality.”
Ipsotek, an Eviden Business at Atos Group, has announced that it was appointed to provide its AI video analytics technology at the soon-to-be-opened new Midfield Terminal Building at Abu Dhabi International Airport, in Abu Dhabi, UAE. Delivered in partnership with Atlas Security, deployment of Ipsotek’s AI video analytics solutions is anticipated to improve operations, security, and safety across various areas of the Midfield Terminal Building, which is renowned for its iconic architecture and recently gained international attention as a filming location for Mission: Impossible - Dead Reckoning Part One. Advanced surveillance capabilities Ipsotek's AI video analytics technology is well-equipped to address these circumstances Safety and security are clearly paramount in any airport environment, and Ipsotek's AI video analytics technology is well-equipped to address these concerns. The advanced surveillance capabilities of the solution enable operators to detect and identify potential threats across various zones of the airport. By leveraging intelligent algorithms and machine learning, the system can recognise suspicious behaviours, unauthorised access attempts, or other pre-defined security risks in real time, allowing for swift response and mitigation. Ipsotek's AI video analytics By leveraging Ipsotek's cutting-edge video analytics solutions, the airport aims to enhance its security measures by effectively detecting abandoned baggage scenarios. Security teams at the airport will be able to quickly identify and respond to any unattended baggage, reducing potential security risks and ensuring a safe environment for passengers and staff. "The deployment of Ipsotek's AI video analytics solutions at the Midfield Terminal Building signifies a significant leap forward for the aviation industry," said Sophiene Marzouk, Ipsotek’s UAE Country Manager. Sophiene Marzouk adds, "We are proud to collaborate with Atlas Security to deliver state-of-the-art technology that enhances operations, security, and safety in one of the world's most iconic airport buildings." Ipsotek's solutions Ipsotek's solutions also play a crucial role in optimising queue management and crowd control “Atlas Security aspires to implement the best technology for security systems in airports and we therefore look to partner with companies bringing innovation in security applications with Artificial Analytics. One company that brings this cutting-edge technology is Ipsotek and Atlas Security is proud to work in the Midfield Terminal Building with Ipsotek,” said Khizer Rehman, Project and Technical Manager at Atlas Security. Ipsotek's solutions will also play a crucial role in optimising queue management and crowd control throughout the airport. By analysing video feeds, the software can determine queue lengths and alert airport staff to potential bottlenecks. New standards for excellence The intelligent system will empower operators to proactively manage queues, allocate resources effectively, and ensure a smooth flow of passengers. As travellers eagerly anticipate the unveiling of the Midfield Terminal Building, the deployment of Ipsotek's AI video analytics solutions is set to improve the airport experience, from safety to security and operations setting new standards for excellence in the aviation industry and turning an impossible mission into a successful deployment.
The Rewley Road Swing Bridge, an integral part of Oxford's industrial history, underwent a remarkable transformation in 2023 from rusting to restoration. Through a collaborative effort between the Oxford Preservation Trust, the Railway Heritage Trust, Historic England, and input on security solutions from Jacksons Fencing, this iconic landmark was meticulously restored and safeguarded for the enjoyment of present and future generations. A journey through time Dating back to 1851, the Rewley Road Swing Bridge played a pivotal role in the movement of goods and people during the 19th century in Oxford. However, changing times lead to its disuse and subsequent state of disrepair. By the 1980s, the bridge stood permanently fixed in an open position. Recognising the historical and cultural significance of the bridge, the Oxford Preservation Trust embarked on a restoration journey to bring this historical treasure back to life. Jacksons Fencing was specified by the Railway Heritage Trust and Historic England to provide demarcation fencing around the landmark, playing a vital role in ensuring the successful establishment of the bridge as a visitor attraction. Modern security meets historical elegance Fencing's unique vertical bar design not only exudes visual grace but also helps as a robust barrier To ensure the safety of visitors and protect the bridge from potential vandalism, Jacksons Fencing provided a thoughtful protection plan that seamlessly integrated modern security features with the bridge’s historical aesthetic. In the pursuit of safeguarding the Rewley Road Swing Bridge, Jacksons Fencing introduced a total of 57 metres of 1.25 m high Barbican Imperial® fencing which seamlessly harmonised security with the bridge's historical charm. The fencing's unique vertical bar design not only exudes visual elegance but also serves as a robust barrier against unauthorised access. This fence choice is ideal for a heritage project as it offers the look of traditional metal railings but with a modern, stronger, and more sustainable tubular design. Barbican Imperial fencing Concealed connectors and the absence of visible bolts or fixings further amplify the fencing's security prowess while maintaining a clean and uncluttered appearance. As an integral part of the protection strategy, a 3.6 m wide double leaf gate was integrated, complete with a pad-lockable slide latch. This innovative latch ensures controlled access, reinforcing security without compromising convenience. The specification of high-quality materials was paramount for this project. The selected Barbican Imperial fencing was meticulously crafted from high-quality hot dip galvanised steel, equipping it with exceptional strength and resistance against the corrosive forces of time. To ensure the bridge's appearance would not wither, a black polyester powder coating was applied. This not only adds a touch of timeless sophistication but also guarantees durability and a long-lasting finish. By embracing modern techniques, the bridge's protective features are seamlessly integrated into its historic context, allowing it to confidently stand the test of time. A safe haven for local wildlife Gaps between the pales of the fencing facilitate the free movement of animals through the site Jacksons Fencing's commitment extended beyond human safety to encompass the thriving local ecosystem. With a profound understanding of the importance of coexistence with nature, the new security solution was intentionally designed to accommodate the movement of local wildlife. Gaps between the pales of the fencing facilitate the free movement of animals through the site ensuring that while security remains uncompromised, the natural ecosystem can flourish undisturbed. Now fully restored, a new life has been breathed into the Rewley Road Swing Bridge. Beyond its full restoration, the bridge now symbolises a link between the past and the future. Author's quote Peter Jackson, Managing Director, Jacksons Fencing, comments: "We're thrilled to have been part of restoring the Rewley Road Swing Bridge's historic charm while infusing modern security. Our commitment to eco-conscious solutions mirrors the Oxford Preservation Trust's vision for a biodiverse landscape. He adds, "By strategically integrating wildlife-friendly features, we've created a haven for both heritage and nature. The bridge's removal from the Heritage at Risk Register and its recognition with the Railway Heritage Trust Conservation Award in 2022 spotlight our collective dedication to preserving history while embracing security and sustainability."
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
The upcoming ISC West trade show in Las Vegas will offer innumerable networking and learning opportunities for attendees. Manufacturers will take the opportunity to promote their businesses and showcase products and services to a targeted audience. Best of all, the event will be "in person," an advantage we should never again take for granted. We asked this week's Expert Panel Roundtable: What big announcements do you expect at ISC West 2023?
Products
Videos
Human area network: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download