Human identification system
Next DLP (Next), a pioneer in insider risk and data protection announced the launch of Secure Data Flow, a groundbreaking capability within the Reveal Platform that uses the "What, Where, Who and How" of data’s origin, movements and modifications to provide unparalleled protection. Revolutionising data protection In a rapidly evolving digital landscape, legacy data protection technologies are falling short. They rely heavily on pattern matching, regular expressions, keywords, user-applie...
HackerOne, the pioneer in human-powered security, has announced the launch of its first partner programme, PartnerOne. APNT also joined as a part of this new, growing partner network. Cybersecurity HackerOne launched the programme to meet a growing demand for cybersecurity solutions that leverage the global ethical hacker community. PartnerOne gives partners the ability to sell HackerOne solutions through their channels, reducing commercial barriers for customers wanting to adopt human-...
The evolving digital state of economies is also witnessing an evolution in corresponding threats and risks. And in the new era of digital banking, online fraud has emerged as the most concerning threat to transactions and banking security. Losses in online fraud According to a 2022 report by the Association of Certified Fraud Examiners (ACFE), a whooping USD 4.7 trillion is lost to online frauds out of the total global corporate revenue every year. This alarming number is expected to rise man...
Global security manufacturer, Gallagher Security, has announced that support for employee badges in Apple Wallet is available for Gallagher customers in the U.S. with the release of Gallagher Command Centre v9.10. Employee badge in Apple Wallet is fully integrated with Gallagher Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. Managing credentials with ease O...
HID, a worldwide pioneer in trusted identity solutions, announces the availability of its new HID Seos Essential Bundle, providing small to mid-size businesses (SMBs) in Europe with the benefits of advanced access control in an all-in-one packaged solution that simplifies installation and deployment. With HID's legacy of security excellence spanning over 30 years, the new bundle combines the latest access control technology to provide premium security and enhanced user experience at a competiti...
Entrust, a global pioneer in trusted payments, identities, and data security announced a single-vendor enhanced authentication solution that integrates identity verification (IDV) and identity and access management (IAM) to fight deepfakes, phishing, account takeover (ATO) attacks and other threats. Identity authentication By enhancing the Entrust Identity as a Service (IDaaS) platform with Onfido’s AI-powered document and biometric verification, customers will be able to deploy ne...
News
In a landmark achievement, Gulf Business Machines (GBM), an end-to-end pioneering digital solutions provider, has been awarded two new accreditations from CREST and DESC (Dubai Electronic Security Center) in Penetration Testing and Incident Response. Cybersecurity solutions GBM's achievement of these certifications showcases its leadership and expertise in providing state-of-the-art cybersecurity solutions, reflecting the company’s commitment to maintaining local roots while adhering to global standards. In an era marked by escalating sophisticated cyber threats, public and private sector institutions across the region are increasingly turning to accredited cybersecurity solutions providers who meet the stringent standards set by CREST and DESC. CREST and DSEC CREST is an international not-for-profit membership body dedicated to creating a secure digital world by establishing capability, capacity, consistency, and collaboration within the global cybersecurity industry. Formed in 2014, the Dubai Electronic Security Center (DESC) is a regulatory authority overseeing the cybersecurity framework and promoting electronic security initiatives in Dubai. Penetration testing and incident response services As a dual accredited member, GBM’s cybersecurity offering will be recognised and accepted in EMEA The accreditations assure customers that GBM's cybersecurity services are of the highest quality and delivered by experts with the right qualifications and skills. They highlight GBM's adherence to the highest standards in penetration testing and incident response services, ensuring clients receive the best-in-class cybersecurity solutions. As a dual accredited member, GBM’s cybersecurity offering will be recognised and accepted in EMEA. In Dubai, accreditation for these services is facilitated by Dubai Cyber Innovation Park through the Dubai Cyber Force Program, a collaborative effort between CREST and DESC. Commitment to cybersecurity excellence H.E Amer Sharaf, CEO of the Cyber Security Systems and Services Sector at DESC said, “As cyber threats evolve, organisations must work with accredited providers to safeguard their digital assets and operations." "The Dubai Cyber Force functions as an internationally recognised reference, delivering cyber services to the government, in line with the vision of His Highness Sheikh Mohammed bin Rashid Al Maktoum, Vice President and Prime Minister of the UAE, Ruler of Dubai, to make Dubai the safest city in the digital space. By achieving these certifications, GBM is further demonstrating its commitment to cybersecurity excellence.” Safeguarding digital assets Ossama El Samadoni, General Manager at GBM Dubai commented, “In today's rapidly evolving cyber landscape, our internationally recognised accreditations serve as more than just validations of our expertise. They stand as pillars reinforcing our customers' cybersecurity defenses, granting them unparalleled peace of mind." "By adhering to these rigorous standards, we assure our clients that their digital assets are safeguarded with the utmost care. Our dedication to providing top-notch cybersecurity solutions remains steadfast as we help our customers navigate the digital world confidently and securely.” Cyber threat assessment services Hasanian AlKassab, Director of Security BU at GBM said, "Cyber threat assessment services are essential in today’s digital landscape as they provide organisations with a comprehensive understanding of potential vulnerabilities and risks. Being recognised by CREST and DESC for our expertise in Penetration Testing and Incident Response further solidifies GBM’s position as a pioneer in cybersecurity." "Achieving these accreditations means we have met high industry standards and are well-equipped to deliver the much-needed technical expertise required for these domains with precision and efficiency." GBM Shield programme GBM's penetration testing services, under its GBM Shield programme, provide a comprehensive suite of cyber threat assessment services, including vulnerability assessment, penetration testing, configuration review, static and dynamic application security testing, wireless penetration testing, red teaming, and threat hunting. For incident response services, GBM's expert team delivers swift and effective cyber threat mitigation, digital evidence preservation, and regulatory compliance tailored to the unique challenges of the GCC region, leveraging cutting-edge Cor. by GBM capabilities.
IDnow, an identity verification provider in Europe, has unveiled VideoIdent Flex, a new version of its expert-led video verification service that blends advanced AI technology with human interaction. The human-based video call solution, supported by AI, has been designed and built to boost customer conversion rates, reduce rising fraud attempts, increase inclusivity, and tackle an array of complex online verification scenarios while offering a high-end service experience to end customers. VideoIdent The company's original expert-led product, VideoIdent, has been a cornerstone in identity verification for over a decade, serving the strictest requirements in highly regulated industries across Europe. VideoIdent Flex, re-engineered specifically for the UK market, represents a significant evolution, addressing the growing challenges of identity fraud, compliance related to Know-Your-Customer (KYC) and Anti-Money Laundering (AML) processes, and ensuring fair access and inclusivity in today's digital world outside of fully automated processes. Flexible human-based identity verification The human-machine collaboration not only boosts onboarding rates and prevents fraud but also strengthens trust As remote identity verification becomes more crucial yet more challenging, VideoIdent Flex combines high-quality live video identity verification with hundreds of trained verification experts, thus ensuring that genuine customers gain equal access to digital services while effectively deterring fraudsters and money mules. Unlike fully automated solutions based on document liveness and biometric liveness features, this human-machine collaboration not only boosts onboarding rates and prevents fraud but also strengthens trust and confidence in both end users and organisations. VideoIdent Flex can also serve as a fallback service in case a fully automated solution fails. AI-based technology with human intuition Bertrand Bouteloup, Chief Commercial Officer at IDnow, commented, "VideoIdent Flex marks a groundbreaking advancement in identity verification, merging AI-based technology with human intuition." "In a landscape of evolving fraud tactics and steady UK bank branch closures, our solution draws on our decade's worth of video verification experience and fraud insights, empowering UK businesses to maintain a competitive edge by offering a white glove service for VIP onboarding." KYC-compliant identity verification VideoIdent Flex opens up the option of customising checks as required by the respective regulatory bodies "With its unique combination of KYC-compliant identity verification, real-time fraud prevention solutions, and expert support, VideoIdent Flex is a powerful tool for the UK market." Whereas previous firms may have found video identification solutions to be excessive for their compliance requirement or out of reach due to costs, VideoIdent Flex opens up this option by customising checks as required by the respective regulatory bodies in financial services, mobility, telecommunications, or gaming, to offer a streamlined solution fit for every industry and geography. Customisable real-time fraud prevention VideoIdent Flex has several key features and benefits: Customisable: Pre-defined configurations to meet specific industry requirements and regional regulations. Expert-led: High-quality live video verification conducted by trained identity verification experts, ensuring accuracy, reliability, and compliance for high levels of assurance. Extensive document coverage: Support for a wide range of documents, facilitating global expansion and inclusivity. Real-time fraud prevention: Advanced fraud detection capabilities, including AI-driven analysis and manual checks, combat evolving fraud tactics and help protect against social engineering fraud, document tampering, projection, and deepfakes, especially for high-risk use cases and goods. Verification of high-risk individuals: Reviewing applications from high-risk persons, such as Politically Exposed Persons (PEPs), and high-risk countries; or assessing where fraud might be expected with real-time decisions, without alerting suspicion. Hybrid approach Bouteloup concluded, "Identity verification is incredibly nuanced; it's as intricate as we are as human beings. This compounds the importance of adopting a hybrid approach to identity capitalising on the dual benefits of advanced technology when combined with human knowledge and awareness of social cues." "With bank branches in the UK closing down, especially in the countryside, and interactions becoming more and more digital, our solution offers a means to maintain a human relationship between businesses and their end customers, no matter their age, disability, or neurodiversity." Powerful layer of security "VideoIdent Flex is designed from the ground up for organisations that cannot depend on a one-size-fits-all approach to ensuring their customers are who they say they are." "In a world where fraud is consistently increasing, our video capability paired with our experts adds a powerful layer of security, especially for those businesses and customers that require a face-to-face interaction."
On February 28, 2024, IDEMIA Smart Identity and NIMC agreed to renew their long-standing collaboration and upgrade NIMC’s biometric system to become the most advanced biometric system in the world, comparable only with Aadhaar in India. The powerful biometric matching system will be able to handle 1 million 1:1 and 1:N identity verification searches per day. The initial system was designed to support 100 million records but has already reached around 90 million records and requires this extension to address the whole Nigerian population. In context, NIMC is already positioned to achieve the sustainable development goals target set for 2030 by the United Nations, which calls for a legal identity for all by the year 2030. New powerful system In addition, the system upgrade is going to allow NIMC to be compliant with OSIA In addition, the system upgrade is going to allow NIMC to be compliant with OSIA, an open standard set of interfaces (APIs) that enables seamless connectivity between all components of the identity management ecosystem. “We are very proud to continue our long-standing collaboration with NIMC for the greater good of Nigeria’s growing population. The new powerful system is future-proof and will ensure that all Nigerians have access to a secured, trusted identity, enabling them to exercise their rights and responsibilities as a citizen. Moreover, this contract, in the most populous country in Africa, demonstrates IDEMIA’s capability to deploy its technologies on a very large scale,” said Olivier Charlanes, Senior Vice President of Middle East and Africa at IDEMIA Smart Identity. “Taking this next step in the enhancement of our system with IDEMIA Smart Identity was a natural choice for us. We wanted to ensure that we deliver the best-in-class solution to our fellow Nigerians, and the pure power of the biometric matching we will receive ensures that the solution is future-proof for our growing population,” said Engr. Abisoye Coker-Odusote, CEO, National Identity Management Commission (NIMC) and Chairman of the OSIA Advisory Committee.
iDenfy, a Lithuania-based identity verification, compliance, and fraud prevention company, announced a new partnership with SCOPE FinTech Solutions, a Netherlands-based business that’s best known for its Software as a Service (SAAS) solutions tailored explicitly for fintech. This partnership marks a major leap forward in enhancing fintech security, particularly in response to the expanding European market and the escalating threat of financial fraud. Identity verification iDenfy helps SCOPE to streamline the identity verification process across multiple countries through straightforward, standardised ID inspection checks. According to iDenfy, this automated verification process will facilitate SCOPE's rapid expansion while maintaining a focus on essential aspects: user experience and compliance. Anti-money laundering (AML) programme SCOPE recognises the critical importance of the EU’s AMLDs and ever-evolving compliance challenges Specialising in assisting clients with due diligence and risk assessment processes, SCOPE recognises the critical importance of the EU’s Anti-Money Laundering Directives (AMLDs) and ever-evolving compliance challenges. SCOPE stated that although the company had strong measures in place for its anti-money laundering (AML) programme such as screening authoritative international databases and sanctions lists, along with employing various effective risk assessment tools, the lack of an automated identity verification solution presented difficulties in accurately verifying new users and adhering to Know Your Customer (KYC) regulations. Reliable KYC solution SCOPE required a fully automated process to verify the identities of both current and potential customers using their services, ensuring regulatory compliance while optimising the conversion rate. In a quest to both comply with regulatory requirements and automate customer onboarding, SCOPE looked for a reliable KYC solution that could seamlessly integrate into its existing software and offer the same for its fast-growing fintech clients list. 3D liveness detection powered by AI SCOPE uses iDenfy's KYC software to automatically extract data from users' ID documents and cross-reference it As a result, SCOPE employed iDenfy's identity verification solution, featuring 3D liveness detection powered by AI. This upgraded tool enables SCOPE to leverage cutting-edge face recognition algorithms, effectively preventing attempts by fraudulent identities to gain access to the company's platform. Furthermore, SCOPE uses iDenfy's KYC software to streamline the verification process. This software automatically extracts data from users' ID documents and cross-references it with their account information, ensuring the authenticity of individuals accessing SCOPE's services. Seamless integration with the Data Outreach module The collaboration with iDenfy enables SCOPE to offer a complete onboarding solution by seamlessly incorporating the verification process into their Data Outreach module, automating the entire process for a more efficient end-user experience. This aligns with the company’s general mission to deliver secure, user-friendly, and innovative AML solutions to their clients. According to SCOPE, before iDenfy, finding a trusted KYC provider was a challenge, especially in the landscape of newly emerging threats, such as mobile application fraud that underscored the need for effective fraud prevention measures. Innovative fintech solutions “Together with iDenfy, we highlight our commitment to delivering innovative fintech solutions that meet the evolving needs of compliance-bound entities. The new ID verification solution has already helped us automate client onboarding while focusing on what matters most, compliance and efficiency,” commented Fred van‘t Hoff, CEO at SCOPE. “SCOPE's dedication to innovative fintech compliance solutions aligns perfectly with our mission. That’s why our team is very excited to support SCOPE’s efforts to mitigate the risk of fraudulent activities through robust practices, including identity verification,” added Domantas Ciulde, the CEO of iDenfy.
HID, the worldwide pioneer in trusted identity solutions, and Olea Kiosks®, a visionary provider of self-service kiosk solutions, announced a new collaborative engagement that revolutionises the user experience when it comes to access control and user authentication across a range of applications. WHAT: Industries from healthcare, hospitality and retail to banking, government, transportation and beyond are primed to empower people with unsurpassed levels of security and user convenience when it comes to countless check-in and access scenarios. The HID U.ARE.U™ Camera Identification System – featuring remarkable facial recognition technology (FRT) – can now be incorporated into the Olea HYPERMODULAR™ Kiosk to address the rising demand for flexible, customisable ID authentication and verification across various vertical settings. WHY: Facial recognition technology continues to gain traction based on its unique combination of high security and user convenience. Paired with the extremely flexible Olea kiosk, HID’s AI-powered U.ARE.U Camera Identification System is an ideal solution for applications needing to handle high throughput. HID FRT is: Fast and Accurate: On-the-spot verification authenticates and validates an individual’s identity in seconds, reducing wait time in line. Easy to Use: One look is all that’s required to securely capture a facial image for frictionless identity verification. Secure: Biometric traits provide irrefutable proof of identity and presence to prevent fraud. Convenient: One’s face is now their ID card, pin and password, so there’s nothing to carry, forget, lose or steal. No Human Intervention: This seamless technology requires no dedicated staff to check IDs. Contactless and Hygienic: Facial recognition offers a touchless way to authenticate individuals' identities, minimising exposure to health risks by reducing shared touchpoints. Olea selected the HID U.ARE.U Camera Identification System for its many notable features, including: Top NIST ranking for matching performance & accuracy Ethically trained with AI to reduce matching bias Exceptional ‘In-the-Wild’ recognition (precise capture and authentication regardless of variances in lighting, backgrounds, pose, expression, etc.) Extraordinary presentation attack detection (PAD) against spoofs Stellar security & privacy with on-device (Edge) biometric processing Easy to configure (pioneering to faster deployment and faster ROI) Olea developed the HYPERMODULAR kiosk in response to market demands for flexible, customisable kiosks for security and access control space. In addition to housing HID’s pioneering facial recognition camera, Olea’s kiosk design can also accommodate fingerprint scanners, barcode scanners, ticket and ID document readers, RFID readers, card printers, and other HID offerings within its HYPERMODULAR footprint. HOW: Bringing together HID facial recognition with Olea kiosks supports myriad use cases for reliable self-service check-in and authentication. Just a sampling of applications include: Retail & Hospitality: Hotel self-check-in, self-checkout/face pay, ticketing at theme parks and VIP customer identification Banking: ATM verification and VIP customer identification Healthcare: Patient check-in and registration, managing personal data, scanning and recording insurance/ID cards, telemedicine services and payment collection Airport and Border Crossing: Passenger self-check-in, bag tag printing and bag drop, VIP lounge access and security and immigration checkpoints WHEN: The HID-Olea Kiosks are available now. To learn more about HID’s facial recognition technology and Olea Kiosks, visit the solution pages: HID AI-powered facial recognition HID U.ARE.U Camera Identification System Olea HYPERMODULAR Kiosk
Businesses must prepare for a double-digit increase in climate change hazards that impact physical security in the next year and could threaten supply chains, people, and finances, according to G4S’s World Security Report. Almost two-fifths (38%) of companies surveyed expect it to impact their company in the next 12 months, an increase of 11% in 2022. The warning comes as the COP28 climate conference continues in the UAE. Security-impacting hazard 1,775 Chief Security Officers (CSOs) in 30 countries at large global companies with total revenue of more than $20 trillion took part in the first-ever World Security Report. Climate change is the third most likely security-impacting hazard to affect companies in the next year after economic unrest (47%) and pandemics (40%). CSOs also anticipate that floods, wildfires, earthquakes, landslides, and tsunamis will all increase. Identifying potential threats Most companies tend to be reactive, addressing security threats only after they've struck" Noah Price, International G4S Academy Director said, “Climate change and natural disasters pose a significant threat to a company's physical security operations." "Most companies tend to be reactive, addressing security threats only after they've struck. It’s business critical that CSOs anticipate potential threats and prepare for them. No action or just reaction is not an option. Need for preemptive security measures “Being reactive often results in significantly higher financial and reputational losses compared to the costs of implementing robust, preemptive security measures." "Planning will ensure businesses are more resilient, safeguarding people and assets.” What do businesses need to do? One of the most pragmatic security plans G4S advises is climate-specific risk assessments of places of work Contingency planning, investing in technology, and diversifying supply chains from climate change disruptions are three examples of the actions businesses can take. One of the most pragmatic security plans G4S advises is climate-specific risk assessments of places of work, operational locations, and where employees reside. This should be regularly reviewed and updated. Risk evaluation “In light of the wildfires we witnessed around the world, it's imperative business leaders ask themselves: have we evaluated the risk of such events recurring?" "Have we proactively installed measures like sprinkler systems or perimeter defences to mitigate future threats? Beyond physical infrastructure, it's crucial to consider the human element, how do such events impact our employees, their families, and their ability to work?" Price emphasised. Infrastructure to withstand environmental risks If supply chains are strategically diversified, threats to one region are less likely to affect production Businesses should invest in infrastructure that can withstand extreme weather events. Buildings that are reinforced, have flood protection systems, and fire-resistant materials will lessen the impact. Companies are facing up to US$120 billion in costs from environmental risks in their supply chains within the next five years. If supply chains are strategically diversified, threats to one region are less likely to affect production, manufacturing, or commerce reducing the overall impact on business productivity. Addressing the fragility of supply chains Mike Maltezakis, G4S Academy Supply Chain Specialist, said, “Recent droughts in the Panama Canal, flash flooding and extreme wildfires have highlighted the fragility of supply chains. The need for them to be resilient and as diverse as possible is increasingly necessary." “If you’re an e-commerce business, a supply chain disruption like the Panama Canal drought has the potential to be not only costly but leaves you and your products vulnerable to theft." Varied supply chain options The biggest security threat with this is that they use violence against staff and crew members to take what they want" "You could have millions of pounds worth of product sat in cargo that an Organised Crime Group (OCG) looks to take advantage of. And with droughts in the canal more likely, so is the likelihood that OCG bases itself nearby because they see a recurring opportunity." "The biggest security threat with this is that they use violence against staff and crew members to take what they want. Having varied supply chain options means companies are less at risk of being over-reliant on certain suppliers.” Predictive and aerial technology Predictive and aerial technology will be key to assessing the risks, and damage and enable key strategic decision-making. Over the next five years, 42% and 39% of World Security Report respondents are planning to use AI machine learning, and IoT devices in their physical security operations, respectively. Almost a quarter (24%) will use drones and unmanned aerial systems (UAS). AI and machine learning Strategically placed devices can monitor factors like water levels, soil moisture, or air quality and send instant alerts AI and machine learning can be used for predictive analytics when looking at climate-related risks. For instance, AI can analyse vast amounts of data from past weather patterns, satellite imagery, and climate models to predict natural disasters with greater accuracy, enabling timely preventive measures. IoT, in real-time, can monitor environmental conditions. Strategically placed devices can monitor factors like water levels, soil moisture, or air quality and send instant alerts flagging abnormal readings, which can indicate impending floods, droughts, or other climate threats. Unmanned Aerial Systems Unmanned Aerial Systems, i.e. drones and satellites, can assess the impact of climate events on infrastructure. Drones can provide aerial views of affected areas, helping businesses assess damage quickly and plan their response effectively. Concluding, Price said, “Businesses have a vital role to play in reducing climate change, but also in keeping their operations running, people and assets safe, and protecting themselves from a wide range of climate threats. ”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorised test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organisations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realise the vision of Matter.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) programme included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of colour, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organisations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Case studies
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travellers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognising this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritise security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl. “The whole world goes in and out. Security is very important.” Hofbräuhaus Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It currently attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Need for digital access Inobtrusive digital devices and low-impact installation were a necessity to ensure compliance Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers including up to 100 waiters working each shift within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. eCLIQ key-based digital access solution Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. Programmable keys for staff management ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly, simply by reprogramming cylinders ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between the cylinder, key, and system so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager, “I can programme keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” Anytime, anywhere access The system is easy to expand anytime, future-proofing Hofbräuhaus access With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime, future-proofing Hofbräuhaus access. Master key system “The situation before the new master key system was installed was problematic,” says Robert Graßl. “Keys were distributed and nobody knew who held them. Everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
The Rewley Road Swing Bridge, an integral part of Oxford's industrial history, underwent a remarkable transformation in 2023 from rusting to restoration. Through a collaborative effort between the Oxford Preservation Trust, the Railway Heritage Trust, Historic England, and input on security solutions from Jacksons Fencing, this iconic landmark was meticulously restored and safeguarded for the enjoyment of present and future generations. A journey through time Dating back to 1851, the Rewley Road Swing Bridge played a pivotal role in the movement of goods and people during the 19th century in Oxford. However, changing times lead to its disuse and subsequent state of disrepair. By the 1980s, the bridge stood permanently fixed in an open position. Recognising the historical and cultural significance of the bridge, the Oxford Preservation Trust embarked on a restoration journey to bring this historical treasure back to life. Jacksons Fencing was specified by the Railway Heritage Trust and Historic England to provide demarcation fencing around the landmark, playing a vital role in ensuring the successful establishment of the bridge as a visitor attraction. Modern security meets historical elegance Fencing's unique vertical bar design not only exudes visual grace but also helps as a robust barrier To ensure the safety of visitors and protect the bridge from potential vandalism, Jacksons Fencing provided a thoughtful protection plan that seamlessly integrated modern security features with the bridge’s historical aesthetic. In the pursuit of safeguarding the Rewley Road Swing Bridge, Jacksons Fencing introduced a total of 57 metres of 1.25 m high Barbican Imperial® fencing which seamlessly harmonised security with the bridge's historical charm. The fencing's unique vertical bar design not only exudes visual elegance but also serves as a robust barrier against unauthorised access. This fence choice is ideal for a heritage project as it offers the look of traditional metal railings but with a modern, stronger, and more sustainable tubular design. Barbican Imperial fencing Concealed connectors and the absence of visible bolts or fixings further amplify the fencing's security prowess while maintaining a clean and uncluttered appearance. As an integral part of the protection strategy, a 3.6 m wide double leaf gate was integrated, complete with a pad-lockable slide latch. This innovative latch ensures controlled access, reinforcing security without compromising convenience. The specification of high-quality materials was paramount for this project. The selected Barbican Imperial fencing was meticulously crafted from high-quality hot dip galvanised steel, equipping it with exceptional strength and resistance against the corrosive forces of time. To ensure the bridge's appearance would not wither, a black polyester powder coating was applied. This not only adds a touch of timeless sophistication but also guarantees durability and a long-lasting finish. By embracing modern techniques, the bridge's protective features are seamlessly integrated into its historic context, allowing it to confidently stand the test of time. A safe haven for local wildlife Gaps between the pales of the fencing facilitate the free movement of animals through the site Jacksons Fencing's commitment extended beyond human safety to encompass the thriving local ecosystem. With a profound understanding of the importance of coexistence with nature, the new security solution was intentionally designed to accommodate the movement of local wildlife. Gaps between the pales of the fencing facilitate the free movement of animals through the site ensuring that while security remains uncompromised, the natural ecosystem can flourish undisturbed. Now fully restored, a new life has been breathed into the Rewley Road Swing Bridge. Beyond its full restoration, the bridge now symbolises a link between the past and the future. Author's quote Peter Jackson, Managing Director, Jacksons Fencing, comments: "We're thrilled to have been part of restoring the Rewley Road Swing Bridge's historic charm while infusing modern security. Our commitment to eco-conscious solutions mirrors the Oxford Preservation Trust's vision for a biodiverse landscape. He adds, "By strategically integrating wildlife-friendly features, we've created a haven for both heritage and nature. The bridge's removal from the Heritage at Risk Register and its recognition with the Railway Heritage Trust Conservation Award in 2022 spotlight our collective dedication to preserving history while embracing security and sustainability."
Located in Kerala, India, the Somatheeram Ayurveda Hospital with a Resort Ambiance is the best place for not only visual rejuvenation but also physical and mental rejuvenation. Through Ayurveda, Somatheeram provides a means to shed all worries, anxieties, and illnesses. With the objective of combining Ayurveda and Tourism, the Somatheeram Research Institute & Ayurveda Hospital was founded in the year 1985, thus making it the world’s first-ever Ayurvedic Hospital in a Resort Ambiance. The Somatheeram Group of Companies came into being with the efforts of the Founder Managing Director, and Architect Mr. Baby Mathew. Challenges Multi-location transmission proves to be an expensive affair if devices are not chosen wisely Somatheeram has multiple resorts, located at different locations. Multi-location communication can prove to be an expensive affair if communication devices are not chosen wisely. Their dependence on public service providers for communication added to their woes of communication between their resorts. To elaborate: Feasibility of existing telephony: Existing telephony became impracticable considering the frequent communication between multi-located properties. Managing different protocols: Interface with different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Absence of modern phone features: The lack of advanced features like abbreviated dialing, call pick up, and internal call restriction, prevented them from becoming efficient in day-to-day operations. Transition to modern communication with existing infrastructure: Their investment in existing infrastructure needed protection while also a provision had to be made to modernise the communication using existing infrastructure. Solution The solution offered was based on the fundamentals of multi-location communication solutions Matrix analysed the challenges of communications for Somatheeram, and crafted a solution that was the best fit. The solution offered was based on the fundamentals of multi-location communication solutions. This included the Matrix range of IP-PBX (ETERNITY GENX12S) and GSM Gateway (SIMADO GFX11 and SIMADO GFX11 4G) that optimised the feasibility of communication and helped the firm become more efficient. Solution includes: The Hybrid IP-PBX included ETERNITY GENX12SAC, which enabled them up to 240 Analogue users with 64 CO Ports. Another Hybrid IP-PBX included ETERNITY PENX, which allowed them access to 100 IP Users, onboard IP User Support, LDAP Client support, support of 4G VoLTE ports, COSEC Door Integration, and much more. The GSM gateway included SIMADO GFX11 and SIMADO GFX11 4G which enabled them to make and receive calls from analogue extensions. The capability to integrate with almost all industry-pioneering PBXs enabled them a smooth transition to modern communication while maintaining existing infrastructure. Results The solution so implemented enabled all properties to work as a single communication platform and proved to be beneficial for Somatheeram and its properties in more than one way. The Hybrid IP-PBX enabled them, unified communication facilities like Email to SMS, audio/video calling, unified messaging facilities, and multi-location collaboration features like UC client integration, one-number reach, etc. The Hybrid IP-PBX also enabled, investment optimisation through universal network connectivity, easy and centralised phonebook management through LDAP client support, mobility convenience through 4G VoLTE support, and much more. The GSM/4G gateway enabled them, GSM/4G connectivity to existing infrastructure, hotline extension dialing, emergency number dialing even in the absence of a sim card, etc. through secure network bridging.
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions along with its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD), published a case study reviewing the overwhelmingly positive results from the successful deployment of multiple ROSA security robots at a multi-family community in San Jose, California. Innovative security technology The case study titled "From Break-Ins to Breakthroughs: How a Multiple RAD ROSA System Reshaped an HOA Community’s Security" highlights the transformation of Westside Manor Homeowners Association from a vulnerable community plagued by often dangerous break-ins to a secure environment through the adoption of RAD’s innovative security technology. Struggling with limited funds and frustrated with previously ineffective measures Struggling with limited funds and frustrated with previously ineffective measures, the HOA partnered with EPIC Security Works, a RAD authorised dealer, to deploy multiple ROSA devices equipped with AI analytics, lights, audio, and visual messaging. This innovative approach led to a significant reduction in break-ins, effectively transforming the community's security landscape. Author's quote “This case study summarises the detailed and coordinated efforts that RAD, its dealers, remote monitoring partners, property managers and end users perform as we successfully disrupt the security and #proptech marketplaces,” said Steve Reinharz, CEO of AITX and RAD. “I am so proud of this winning combination where everything and everybody worked together enabling a safe and more secure environment for the community’s residents.” RAD’s software suite notification ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be deployed in about 15 minutes. Like other RAD solutions, it only requires power as it includes all necessary communications hardware. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, licence plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. RAD has published four Case Studies detailing how ROSA has helped eliminate instances of theft Two-way communication is optimised for cellular, including live video from ROSA’s dual high-resolution, full-colour, always-on cameras. RAD has published four Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at multi-family communities, car rental locations and construction sites across the country. RAD solutions AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the $25 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35% and 80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers this tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house.
Custom Consoles announces the completion of a control room desk for Opem Security, a pioneering provider of security systems and services. Located at Opem’s headquarters in Milton Keynes, the desk will form part of the round-the-clock monitoring support Opem performs for clients in many locations. Custom Consoles’ experience “We were looking for a robust and ergonomically well-designed desk that would allow our staff to work comfortably and efficiently,” comments Opem Founder and Managing Director, Jason Pelham. Custom Consoles’ experience and industry background are evident in the styling" He adds, “SteelBase gave us the freedom to specify exactly what we had in mind from a standard range of structural components, including integral accommodation for our computer equipment and video monitor displays. Custom Consoles’ experience and industry background are evident in the styling and build quality. They can also be seen in the attention to detail such as cable management with easy access during initial installation and throughout the desk’s lifetime. Our operators also appreciate being able to position the horizontal and vertical angle of the monitor screens to suit their preferred viewing angle, each screen being mounted on an individually adjustable mounting arm.” SteelBase installations “This is the most recent of many SteelBase installations we have produced for clients in the security, aviation and industrial process control sectors,” said Custom Consoles Sales Manager, Gary Fuller. He adds, “Working alongside Opem, we designed a 5 metre wide curved unit comprising seven bays. Each bay has its own front and rear doors and provides vented space for a computer as well as accommodation for up to 6U of rack-mounted technical equipment. The desktop is 1.2 metres in front-to-back depth and incorporates a continuous cable tray running the entire desk width, protected by an easily removable flush-fitting cover panel. Mounting points for data and power sockets are provided in each PC compartment." Cable management SteelBase takes its name from the high-strength steel base frames that form its structural core A structured desking system offering a hard-wearing and ergonomic solution for control room consoles, SteelBase takes its name from the high-strength steel base frames that form its structural core. Desks and related fittings such as equipment pods and side units can be specified and combined from a range of standard powder-coated steel base frames. Cable management is provided throughout the console with access to equipment via hinged removable doors to both front and rear. SteelBase furniture Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Careful attention has been paid to styling. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements of SteelBase are guaranteed against component failure for five years of normal use. SteelBase furniture is designed to meet or exceed the requirements of ISO9241-5, EN527-1, 2 and 3, and BS EN ISO11064.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
Round table discussion
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
The upcoming ISC West trade show in Las Vegas will offer innumerable networking and learning opportunities for attendees. Manufacturers will take the opportunity to promote their businesses and showcase products and services to a targeted audience. Best of all, the event will be "in person," an advantage we should never again take for granted. We asked this week's Expert Panel Roundtable: What big announcements do you expect at ISC West 2023?
There’s always more to talk about in our Expert Panel Roundtable discussions, and we appreciate the variety of opinionated responses offered throughout the year. Looking back at 2022, we found several random and uncategorised Expert Panel responses that were not previously published. We have rescued these responses from our cutting-room floor and present them here in the interest of generating even more discussion.
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Video surveillance](https://www.sourcesecurity.com/img/emagazines/612/video-surveillance-magazine-security-technology-trends-international.jpg)
Video surveillance
Download