Human identification system
IDScan.net, the pioneer in AI-powered identity verification technology, proudly announces a year of significant growth in 2024. This success has been driven by product innovation, increased efficacy in the detection of fake IDs, strategic hires, and the establishment of new partnerships, further solidifying IDScan.net’s position as a pioneer in ID scanning and identity verification. Flagging fake and synthetic IDs The organisation has capitalised on growing ID fraud across a...
Verifying identities and conducting criminal background checks in the field has traditionally been one of the most time-consuming tasks for law enforcement officers. Real-time mobile biometrics In the past, this often required detaining individuals and transporting them to a station for fingerprint identification. Forward-thinking agencies like the Florida Department of Law Enforcement (FDLE) are tapping into highly accurate, real-time mobile biometric technology — Rapid ID — tran...
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, is proud to announce its involvement with several prominent organisations to promote the distribution of child identification kits. National Child ID programme Through its long association with FBI-LEEDA, Elite is represented along with the National Child ID programme in partnership with the NFL Alumni Association Pro Football Hall of Fame, and th...
adCAPTCHA, a new specialist security verification platform, has launched with £1m funding to tackle the ‘bots epidemic’ and protect organisations against cyber fraud. The London-based company, founded by industry veteran and entrepreneur Alfie Scarborough, equips organisations with the capability to identify and block bots through its sophisticated in-house developed patent-pending human verification technology. Layered security solution adCAPTCHA’s layered...
Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, has announced that the International Olympic Committee (IOC) will deploy its data-driven sustainability solution – Energy Expert – to help measure and analyse the electricity consumption at the competition venues of the forthcoming Olympic Games Paris 2024 ('Paris 2024'). Cloud-based platform By migrating the intelligence related to the power consumption and demand of the competition venues to the clo...
Next DLP (Next), a pioneer in insider risk and data protection announced the launch of Secure Data Flow, a groundbreaking capability within the Reveal Platform that uses the "What, Where, Who and How" of data’s origin, movements and modifications to provide unparalleled protection. Revolutionising data protection In a rapidly evolving digital landscape, legacy data protection technologies are falling short. They rely heavily on pattern matching, regular expressions, keywords, user-applie...
News
HackerOne, the pioneer in human-powered security, has announced the launch of its first partner programme, PartnerOne. APNT also joined as a part of this new, growing partner network. Cybersecurity HackerOne launched the programme to meet a growing demand for cybersecurity solutions that leverage the global ethical hacker community. PartnerOne gives partners the ability to sell HackerOne solutions through their channels, reducing commercial barriers for customers wanting to adopt human-powered security, which identifies vulnerabilities that automated testing fails to detect. Human-powered security solutions "With the addition of HackerOne, our customers have gained access to leading human-powered security solutions, which complement and extend our existing suite of offerings," said Remco Poortvliet, CTO at APNT. Remco Poortvliet adds, "Our customers can now access an extensive, global community of ethical hackers and benefit from AI red teaming, bug bounty programmes, and penetration testing." PartnerOne The programme offers partners comprehensive support to get the most out of HackerOne PartnerOne primarily supports channel and technology partners, including value-added resellers (VAR), solutions providers, and referral partners, among others. The programme offers partners comprehensive support to get the most out of HackerOne, with tools like free online training and enablement, opportunity management, lead source sharing, renewals managers, and more. The company appointed John Addeo as VP of Global Channels, to bring his more than two decades of global enterprise IT and cybersecurity business expertise to lead PartnerOne. Testing skills, services, and risk reduction "A rapidly evolving threat landscape has driven strong market demand for the adversarial testing skills, services, and risk reduction that only ethical hackers can provide," said John Addeo, VP of Global Channels at HackerOne. John Addeo adds, "Expanding access to HackerOne across the channel enables our growing partner network to build an additional revenue opportunity and support their customers through increasingly complex cybersecurity challenges." AI co-pilot Hai PartnerOne is part of HackerOne’s continued efforts to simplify how organisations benefit from its platform, which hosts a global community of over two million ethical hackers. In February, HackerOne announced its new AI co-pilot Hai, which enhances the insights organisations can access from programme and platform data. The company also recently announced CREST certification of its penetration testing solution to help organisations stay compliant. HackerOne continues to support leading organisations, including the U.S. Department of Defense, Adobe, and Goldman Sachs, so they find impactful vulnerabilities, reduce risk, and meet regulatory requirements.
The evolving digital state of economies is also witnessing an evolution in corresponding threats and risks. And in the new era of digital banking, online fraud has emerged as the most concerning threat to transactions and banking security. Losses in online fraud According to a 2022 report by the Association of Certified Fraud Examiners (ACFE), a whooping USD 4.7 trillion is lost to online frauds out of the total global corporate revenue every year. This alarming number is expected to rise manifold in the coming years. As a virtue of technological ease to commit cybercrime, all that is needed is certain technical knowledge and access to the right computer equipment. Online fraud is on the road to becoming the topmost threat to banking efficiency and performance. Neo-banking Banks have no option but to devise strategies and integrate technologies that incapacitate the efforts to commit fraud Other than costing tens of thousands of monetary losses, online frauds also dent the reputation of the banks and put the customers’ trust to the test. Unfortunately, such losses can take years to recover. However, as neo-banking becomes universally prevalent, banks have no option but to devise strategies and integrate technologies that incapacitate the efforts to commit fraud. Criticality of synthetic frauds As the banking landscape changes, identity fraud has become a major roadblock to securing payments and is increasing at a concerning rate. The cost of synthetic identity fraud is projected to rise to USD 5 billion in 2024, which is double its cost from USD 2.5 billion in 2022. The ever-evolving banking processes, as a counterpart of the global digitisation wave, are set to become the reality of tomorrow. Identity fraud So, it is difficult to accurately verify if the person sitting behind the virtual wall is an actual user or a synthetic identity created to perform a breach and steal valuable data. Such data becomes an easy target of fraudsters when accessed on unprotected or hyper-public networks and puts critical information at risk. The advisories towards performing checks on networks are often eye-balled, leading to compromise of not only personal data but integrated critical data as well. Scams and phishing attacks Sophisticated technology frauds through phishing and hacking are dangerous, leading to personality duping Scams and phishing attacks have put customers in a constant state of distress. Often posed as authentic transactions, scams are difficult to make out. Fraudulently extracting personally identifiable information (PII) for personal and financial gains is another challenge to security and data breaches across online channels. Sophisticated technology frauds through phishing and hacking are dangerous, leading to personality duping. E-commerce frauds from data leaks, gaining unauthorised access to payment accounts, man-in-the-middle attacks, and false billing hinder sectoral and economic growth. Ineffectiveness of traditional fraud prevention Governments lose 0.5% to 5% globally on account of fraud. With the changing payment systems, the state of threats is also changing to be more dangerous, easily blended in with legitimate practices. The existing ways of identity authentication, information encryption, and incident detection fall short of countering security threats. Since passwords and PINs have been quite established in the online banking ecosystem, fraudsters have found ways to go around and defy such layers to gain unauthorised access. Security questions and unique identifiers can easily be predicted and memorised. Multi-factor authentication Passwords and PINs can be compromised on public networks, easily forgotten and skimmed. Consequently, the frauds recorded in the past two years have been the highest in 20 years. And global payment frauds are further estimated to rise to USD 40.62 bn by 2027. Multi-factor authentication is still not universally adopted, limited to weak passwords and fingerprint biometrics. Need for reliable solutions Traditional fraud prevention techniques are inefficient in protecting the ever-rising online banking user count This is to say that traditional fraud prevention techniques are inefficient in protecting the ever-rising online banking user count. Economies realise that the effects of such stolen money can range from executing small purchases online to mobilising funds towards illegitimate funding for terrorist activities. So, it is crucial to build reliable solutions to cater to the changing security requirements with immediate action. Curtailing frauds through FRS Facial biometrics has emerged as a conventional solution with a focused application in fraud prevention. According to a report by Juniper Research, the experts expect digital identity verification checks in fintech and payments markets to amount to 70 billion in 2024. This shows a significant growth of 16% from the previous year’s number of 61 billion. The powerful features of liveness detection, quick identification, and accuracy make Facial Recognition Systems (FRS) almost fool-proof. It strengthens the multi-factor authentication regime, acting as an added layer of verification that can be applied across payment modalities. FRS, when integrated as a second or third factor of authentication, allows checking and rechecking for authentic identities, making verification more credible. FRS is also a major component of the fraud prevention strategy. According to the State of Fraud, Report 2023 by Alloy, behavioral biometrics, and selfie verification are the most important tools for fraud prevention. This growing inclination is a result of accurate threat detection and temporary account-locking functions made possible through FRS. In the current state of technology, facial biometrics has achieved 99% accuracy and is still improving with rapid advancements in algorithms to achieve higher inclusivity and precision. When a face image is used as the unique ID to validate online payments, the chances of fraud are reduced to near zero. The questions of identity theft and forgery can be rested with the implementation of countering AI-enabled solutions. Liveness detection quickly differentiates an actual person from a fictitious identity and raises alerts of attempted breaches. PII is secured with facial biometrics as the key keeps it safe from leaks and thefts. Face image helps access resources and make transactions, reducing the risks of illicit uses and phishing attacks. Forming a secure future Financial institutions and governments alike are aware of the scale of problems online fraud poses and seek reliable technologies for effective prevention. Online banking is becoming a part of the everyday routine for consumers. However, it is important to take steps to ensure that online fraud is not as omnipresent. Emergence of AI As the threats of online fraud loom, facial recognition technology can be trusted to provide the most optimal solution With the emergence of AI, exploration of its capabilities to build a robust financial environment is more critical than exciting. As the threats of online fraud loom, facial recognition technology can be trusted to provide the most optimal solution that not only improves security but also expands the competencies of the existing operational efforts. Advancements in digital banking “To ensure that security moves with the pace of advancements in digital banking, facial recognition technology can act as a backbone of support,” said Eugenia Marina, Business Development Director, MENA region, RecFaces. "Not only does it reduce the risks of frauds, but accelerates the speed of the banking revolution." Guardian of online security “In our digital world, facial recognition stands as the unwavering guardian of online security," said Valerie Lapteva, Business Development Director, APAC region, RecFaces. "It's the trusted shield that keeps fraudsters at bay while preserving convenience for all.” Safe and secure online environment “Facial recognition technology offers significant advantages over traditional password-based methods, which are susceptible to theft and phishing attacks," said Surkit Varma, Global Marketing Partner, APAC & MENA regions, RecFaces. "By embracing facial recognition, we can create a safer and more secure online environment for everyone.”
Global security manufacturer, Gallagher Security, has announced that support for employee badges in Apple Wallet is available for Gallagher customers in the U.S. with the release of Gallagher Command Centre v9.10. Employee badge in Apple Wallet is fully integrated with Gallagher Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. Managing credentials with ease Once an employee badge has been added to Apple Wallet, users can simply hold their iPhone or Apple Watch near an NFC-enabled reader to easily and securely unlock office doors, eliminating the need to open an app or present a traditional, plastic access card. If an iPhone needs to be charged, employees can still use their device to access their office or amenity areas with Power Reserve. Secure, and private access experience “As we embrace the evolving needs of our customers, we constantly look for ways to expand the capabilities of our existing credentials and add support for new ones,” says Gallagher Security Chief Product Officer, Meredith Palmer. She continues, “Users of security solutions increasingly expect their access experience to be seamless, leveraging native technologies built into the devices that they use every day. Support for employee badges in Apple Wallet enables an easy, secure, and private access experience for users of iPhone and Apple Watch.” Convenient and contactless access Unlike physical cards, there is no waiting time for gaining building credentials and access for new employees Employee badge in Apple Wallet helps deliver a convenient and contactless access experience. Employees can add their employee badge to Apple Wallet after an initial set-up and provisioning through Gallagher’s Mobile Connect app. Once added, the badge will give them access to enter their office building, office space, and shared amenity spaces. Unlike physical cards, there is no waiting time for gaining building credentials and access for new employees. Privacy and security features Employee badges in Apple Wallet take full advantage of the privacy and security features built into the iPhone and Apple Watch. They are stored on the device, which means Apple doesn’t see the places employees access, so data is private and secure. If their iPhone or Apple Watch is misplaced, the owner of the device can promptly use the Find My app to lock the device and help locate it. Employee badges in Apple Wallet Employee badges in Apple Wallet are available for approved Gallagher customers in the United States, with global availability to be announced soon. Employee badges in Apple Wallet have also been made available for the 700 staff at Gallagher headquarters in Hamilton, New Zealand, and will be rolled out across Gallagher’s global offices empowering employees to seamlessly and securely gain access to offices with just a simple tap of their iPhone or Apple Watch.
HID, a worldwide pioneer in trusted identity solutions, announces the availability of its new HID Seos Essential Bundle, providing small to mid-size businesses (SMBs) in Europe with the benefits of advanced access control in an all-in-one packaged solution that simplifies installation and deployment. With HID's legacy of security excellence spanning over 30 years, the new bundle combines the latest access control technology to provide premium security and enhanced user experience at a competitive cost. HID Seos Essential Bundle “We believe that premium security should be accessible to all businesses, regardless of their size. The HID Seos Essential Bundle delivers this belief by providing smaller businesses with a solution that includes the essential features of our award-winning access control solution,” says Gerald Grattoni, HID’s VP & Head of Mature Markets, Physical Access Control Solutions. “The supporting bundle simplifies the complexities often needed for larger enterprises, offering a straightforward, cost-effective solution that equips every business with top-tier security with ease.” Key features Simplified access control Included in the bundle is a secure, certified next-generation RFID and Bluetooth® HID Signo Express reader The HID Seos Essentials Bundle offers a combination of a reader and a choice of preprogrammed credentials including support for HID Mobile Access®, making it a highly versatile solution for smaller, non-enterprise installations. Included in the bundle is a secure, independently certified next-generation RFID and Bluetooth® HID Signo Express reader which is easy to install using a simple terminal strip and Wiegand connection. Cost-effective alternative It is a more secure, cost-effective alternative to CSN-based credentials, which can be easily cloneable and breached. Compatible with all standard PACS systems, this means that SMBs have total flexibility as to the type of credential they use, preprogrammed traditional PVC cards, fobs, or even the latest smartphone solution, HID Mobile Access, and access controller of their choice. Premium security meets smaller budgets The new bundle allows SMBs to maximise the value of their security investment with a solution tailored to the budgetary constraints of most organisations of this size, without compromising on the quality or effectiveness of the access control system. Easy to order, install, and manage To aid distributors and integrators, the new bundle comes with a single part number to make for easier ordering. Credentials within the Seos Essentials bundle come preprogrammed with a unique secure number. This makes rollouts seamless, saving sales partners time and money with maintenance minimal given HID’s proven device reliability. The new HID Seos Essentials Bundle is available for sale now and will be on display at The Security Event, on April 30-May 2 at Stand 5/F40.
Entrust, a global pioneer in trusted payments, identities, and data security announced a single-vendor enhanced authentication solution that integrates identity verification (IDV) and identity and access management (IAM) to fight deepfakes, phishing, account takeover (ATO) attacks and other threats. Identity authentication By enhancing the Entrust Identity as a Service (IDaaS) platform with Onfido’s AI-powered document and biometric verification, customers will be able to deploy next-level identity authentication before allowing a privileged action or making a high-value transaction. This equips the IDaaS platform with a new layer of hardened security that resists identity fraud and phishing secures digital interactions and safeguards sensitive information. Access management Entrust was recognised in the 2023 Gartner Magic Quadrant for Access Management Entrust was recognised in the 2023 Gartner Magic Quadrant for Access Management. In that report, Gartner predicted, "By 2027, integration with identity verification for onboarding, credentialing & recovery will be a standard feature of access management tools, potentially reducing account takeover attacks against these processes by 75%.” Identity-centric security "As physical and digital credentials merge, identity has become central to security. AI-driven threats, deepfakes, synthetic identities, and ransomware gangs are driving a rising need for confidence in the identities of the people seeking to connect, access, and transact,” said Bhagwat Swaroop, President of Digital Security at Entrust. “That’s why identity-centric security is essential to making Zero Trust work. Entrust is the only provider that can integrate world-class IDV and IAM to enhance fraud prevention, reduce manual intervention, and improve the user experience.” AI-driven facial biometrics With the combined power of these solutions, organisations can: Securely and efficiently authenticate users and validate their identities in real-time to protect against fraud, phishing, and other account takeover attacks, in 2023, Onfido saw a 3000% increase in deepfake attempts, speaking to the critical need for identity verification. Seamlessly deploy IDV with ID and biometric checks as step-up authentication for employees or customers attempting a privileged action, such as a high-value transaction, or being issued a passkey or phishing-resistant token. Prevent lateral movement in the event of a breach by incorporating AI-driven facial biometrics and the IDV process enabled by risk-based adaptive authentication to enforce a higher level of assurance. Stay ahead of evolving deepfakes and cheapfakes. The integrated solution is expected to be rolled out to customers in the coming months and will be demoed at the upcoming RSA Conference in San Francisco from 6 – 9 May 2024. Entrust at RSAC 2024 As well as demoing the newly integrated IDaaS platform at its booth (#5361N), Entrust will also run a series of demos and presentations including: Fight Phishing: With credential compromise on the rise and involved in more than half of breaches, organisations need to implement an identity-centric security strategy. Neutralise Deepfakes: As the advancements of deepfakes create a critical challenge to businesses in their onboarding process, learn how the strategic deployment of AI techniques can detect deepfakes, ensure accuracy, and enhance client verification. Helping Ensure Compliance: Whether meeting regulatory standards, implementing Zero Trust, or preparing for post-quantum, make sure users’re on the right side of compliance. Safeguarding Data: As Entrust explores the benefits of AI and confronts the looming threat of post-quantum, digital security strategies should centre around data now more than ever. 2024 Identity Fraud Report This news comes as updated data from Onfido’s 2024 Identity Fraud Report reveals that in the last six months, digital forgeries accounted for 34.8% of document fraud the company caught, nearly double the 16.7% seen in 2023 (and roughly 12 times the amount of digital forgeries seen in 2021). This data and more will be released in a new special edition of the Fraud Report for RSAC.
In a landmark achievement, Gulf Business Machines (GBM), an end-to-end pioneering digital solutions provider, has been awarded two new accreditations from CREST and DESC (Dubai Electronic Security Center) in Penetration Testing and Incident Response. Cybersecurity solutions GBM's achievement of these certifications showcases its leadership and expertise in providing state-of-the-art cybersecurity solutions, reflecting the company’s commitment to maintaining local roots while adhering to global standards. In an era marked by escalating sophisticated cyber threats, public and private sector institutions across the region are increasingly turning to accredited cybersecurity solutions providers who meet the stringent standards set by CREST and DESC. CREST and DSEC CREST is an international not-for-profit membership body dedicated to creating a secure digital world by establishing capability, capacity, consistency, and collaboration within the global cybersecurity industry. Formed in 2014, the Dubai Electronic Security Center (DESC) is a regulatory authority overseeing the cybersecurity framework and promoting electronic security initiatives in Dubai. Penetration testing and incident response services As a dual accredited member, GBM’s cybersecurity offering will be recognised and accepted in EMEA The accreditations assure customers that GBM's cybersecurity services are of the highest quality and delivered by experts with the right qualifications and skills. They highlight GBM's adherence to the highest standards in penetration testing and incident response services, ensuring clients receive the best-in-class cybersecurity solutions. As a dual accredited member, GBM’s cybersecurity offering will be recognised and accepted in EMEA. In Dubai, accreditation for these services is facilitated by Dubai Cyber Innovation Park through the Dubai Cyber Force Program, a collaborative effort between CREST and DESC. Commitment to cybersecurity excellence H.E Amer Sharaf, CEO of the Cyber Security Systems and Services Sector at DESC said, “As cyber threats evolve, organisations must work with accredited providers to safeguard their digital assets and operations." "The Dubai Cyber Force functions as an internationally recognised reference, delivering cyber services to the government, in line with the vision of His Highness Sheikh Mohammed bin Rashid Al Maktoum, Vice President and Prime Minister of the UAE, Ruler of Dubai, to make Dubai the safest city in the digital space. By achieving these certifications, GBM is further demonstrating its commitment to cybersecurity excellence.” Safeguarding digital assets Ossama El Samadoni, General Manager at GBM Dubai commented, “In today's rapidly evolving cyber landscape, our internationally recognised accreditations serve as more than just validations of our expertise. They stand as pillars reinforcing our customers' cybersecurity defenses, granting them unparalleled peace of mind." "By adhering to these rigorous standards, we assure our clients that their digital assets are safeguarded with the utmost care. Our dedication to providing top-notch cybersecurity solutions remains steadfast as we help our customers navigate the digital world confidently and securely.” Cyber threat assessment services Hasanian AlKassab, Director of Security BU at GBM said, "Cyber threat assessment services are essential in today’s digital landscape as they provide organisations with a comprehensive understanding of potential vulnerabilities and risks. Being recognised by CREST and DESC for our expertise in Penetration Testing and Incident Response further solidifies GBM’s position as a pioneer in cybersecurity." "Achieving these accreditations means we have met high industry standards and are well-equipped to deliver the much-needed technical expertise required for these domains with precision and efficiency." GBM Shield programme GBM's penetration testing services, under its GBM Shield programme, provide a comprehensive suite of cyber threat assessment services, including vulnerability assessment, penetration testing, configuration review, static and dynamic application security testing, wireless penetration testing, red teaming, and threat hunting. For incident response services, GBM's expert team delivers swift and effective cyber threat mitigation, digital evidence preservation, and regulatory compliance tailored to the unique challenges of the GCC region, leveraging cutting-edge Cor. by GBM capabilities.
Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorised test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organisations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realise the vision of Matter.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) programme included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of colour, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organisations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Case studies
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travellers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognising this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritise security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl. “The whole world goes in and out. Security is very important.” Hofbräuhaus Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It currently attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Need for digital access Inobtrusive digital devices and low-impact installation were a necessity to ensure compliance Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers including up to 100 waiters working each shift within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. eCLIQ key-based digital access solution Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. Programmable keys for staff management ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly, simply by reprogramming cylinders ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between the cylinder, key, and system so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager, “I can programme keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” Anytime, anywhere access The system is easy to expand anytime, future-proofing Hofbräuhaus access With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime, future-proofing Hofbräuhaus access. Master key system “The situation before the new master key system was installed was problematic,” says Robert Graßl. “Keys were distributed and nobody knew who held them. Everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
The Rewley Road Swing Bridge, an integral part of Oxford's industrial history, underwent a remarkable transformation in 2023 from rusting to restoration. Through a collaborative effort between the Oxford Preservation Trust, the Railway Heritage Trust, Historic England, and input on security solutions from Jacksons Fencing, this iconic landmark was meticulously restored and safeguarded for the enjoyment of present and future generations. A journey through time Dating back to 1851, the Rewley Road Swing Bridge played a pivotal role in the movement of goods and people during the 19th century in Oxford. However, changing times lead to its disuse and subsequent state of disrepair. By the 1980s, the bridge stood permanently fixed in an open position. Recognising the historical and cultural significance of the bridge, the Oxford Preservation Trust embarked on a restoration journey to bring this historical treasure back to life. Jacksons Fencing was specified by the Railway Heritage Trust and Historic England to provide demarcation fencing around the landmark, playing a vital role in ensuring the successful establishment of the bridge as a visitor attraction. Modern security meets historical elegance Fencing's unique vertical bar design not only exudes visual grace but also helps as a robust barrier To ensure the safety of visitors and protect the bridge from potential vandalism, Jacksons Fencing provided a thoughtful protection plan that seamlessly integrated modern security features with the bridge’s historical aesthetic. In the pursuit of safeguarding the Rewley Road Swing Bridge, Jacksons Fencing introduced a total of 57 metres of 1.25 m high Barbican Imperial® fencing which seamlessly harmonised security with the bridge's historical charm. The fencing's unique vertical bar design not only exudes visual elegance but also serves as a robust barrier against unauthorised access. This fence choice is ideal for a heritage project as it offers the look of traditional metal railings but with a modern, stronger, and more sustainable tubular design. Barbican Imperial fencing Concealed connectors and the absence of visible bolts or fixings further amplify the fencing's security prowess while maintaining a clean and uncluttered appearance. As an integral part of the protection strategy, a 3.6 m wide double leaf gate was integrated, complete with a pad-lockable slide latch. This innovative latch ensures controlled access, reinforcing security without compromising convenience. The specification of high-quality materials was paramount for this project. The selected Barbican Imperial fencing was meticulously crafted from high-quality hot dip galvanised steel, equipping it with exceptional strength and resistance against the corrosive forces of time. To ensure the bridge's appearance would not wither, a black polyester powder coating was applied. This not only adds a touch of timeless sophistication but also guarantees durability and a long-lasting finish. By embracing modern techniques, the bridge's protective features are seamlessly integrated into its historic context, allowing it to confidently stand the test of time. A safe haven for local wildlife Gaps between the pales of the fencing facilitate the free movement of animals through the site Jacksons Fencing's commitment extended beyond human safety to encompass the thriving local ecosystem. With a profound understanding of the importance of coexistence with nature, the new security solution was intentionally designed to accommodate the movement of local wildlife. Gaps between the pales of the fencing facilitate the free movement of animals through the site ensuring that while security remains uncompromised, the natural ecosystem can flourish undisturbed. Now fully restored, a new life has been breathed into the Rewley Road Swing Bridge. Beyond its full restoration, the bridge now symbolises a link between the past and the future. Author's quote Peter Jackson, Managing Director, Jacksons Fencing, comments: "We're thrilled to have been part of restoring the Rewley Road Swing Bridge's historic charm while infusing modern security. Our commitment to eco-conscious solutions mirrors the Oxford Preservation Trust's vision for a biodiverse landscape. He adds, "By strategically integrating wildlife-friendly features, we've created a haven for both heritage and nature. The bridge's removal from the Heritage at Risk Register and its recognition with the Railway Heritage Trust Conservation Award in 2022 spotlight our collective dedication to preserving history while embracing security and sustainability."
Located in Kerala, India, the Somatheeram Ayurveda Hospital with a Resort Ambiance is the best place for not only visual rejuvenation but also physical and mental rejuvenation. Through Ayurveda, Somatheeram provides a means to shed all worries, anxieties, and illnesses. With the objective of combining Ayurveda and Tourism, the Somatheeram Research Institute & Ayurveda Hospital was founded in the year 1985, thus making it the world’s first-ever Ayurvedic Hospital in a Resort Ambiance. The Somatheeram Group of Companies came into being with the efforts of the Founder Managing Director, and Architect Mr. Baby Mathew. Challenges Multi-location transmission proves to be an expensive affair if devices are not chosen wisely Somatheeram has multiple resorts, located at different locations. Multi-location communication can prove to be an expensive affair if communication devices are not chosen wisely. Their dependence on public service providers for communication added to their woes of communication between their resorts. To elaborate: Feasibility of existing telephony: Existing telephony became impracticable considering the frequent communication between multi-located properties. Managing different protocols: Interface with different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Absence of modern phone features: The lack of advanced features like abbreviated dialing, call pick up, and internal call restriction, prevented them from becoming efficient in day-to-day operations. Transition to modern communication with existing infrastructure: Their investment in existing infrastructure needed protection while also a provision had to be made to modernise the communication using existing infrastructure. Solution The solution offered was based on the fundamentals of multi-location communication solutions Matrix analysed the challenges of communications for Somatheeram, and crafted a solution that was the best fit. The solution offered was based on the fundamentals of multi-location communication solutions. This included the Matrix range of IP-PBX (ETERNITY GENX12S) and GSM Gateway (SIMADO GFX11 and SIMADO GFX11 4G) that optimised the feasibility of communication and helped the firm become more efficient. Solution includes: The Hybrid IP-PBX included ETERNITY GENX12SAC, which enabled them up to 240 Analogue users with 64 CO Ports. Another Hybrid IP-PBX included ETERNITY PENX, which allowed them access to 100 IP Users, onboard IP User Support, LDAP Client support, support of 4G VoLTE ports, COSEC Door Integration, and much more. The GSM gateway included SIMADO GFX11 and SIMADO GFX11 4G which enabled them to make and receive calls from analogue extensions. The capability to integrate with almost all industry-pioneering PBXs enabled them a smooth transition to modern communication while maintaining existing infrastructure. Results The solution so implemented enabled all properties to work as a single communication platform and proved to be beneficial for Somatheeram and its properties in more than one way. The Hybrid IP-PBX enabled them, unified communication facilities like Email to SMS, audio/video calling, unified messaging facilities, and multi-location collaboration features like UC client integration, one-number reach, etc. The Hybrid IP-PBX also enabled, investment optimisation through universal network connectivity, easy and centralised phonebook management through LDAP client support, mobility convenience through 4G VoLTE support, and much more. The GSM/4G gateway enabled them, GSM/4G connectivity to existing infrastructure, hotline extension dialing, emergency number dialing even in the absence of a sim card, etc. through secure network bridging.
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions along with its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD), published a case study reviewing the overwhelmingly positive results from the successful deployment of multiple ROSA security robots at a multi-family community in San Jose, California. Innovative security technology The case study titled "From Break-Ins to Breakthroughs: How a Multiple RAD ROSA System Reshaped an HOA Community’s Security" highlights the transformation of Westside Manor Homeowners Association from a vulnerable community plagued by often dangerous break-ins to a secure environment through the adoption of RAD’s innovative security technology. Struggling with limited funds and frustrated with previously ineffective measures Struggling with limited funds and frustrated with previously ineffective measures, the HOA partnered with EPIC Security Works, a RAD authorised dealer, to deploy multiple ROSA devices equipped with AI analytics, lights, audio, and visual messaging. This innovative approach led to a significant reduction in break-ins, effectively transforming the community's security landscape. Author's quote “This case study summarises the detailed and coordinated efforts that RAD, its dealers, remote monitoring partners, property managers and end users perform as we successfully disrupt the security and #proptech marketplaces,” said Steve Reinharz, CEO of AITX and RAD. “I am so proud of this winning combination where everything and everybody worked together enabling a safe and more secure environment for the community’s residents.” RAD’s software suite notification ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be deployed in about 15 minutes. Like other RAD solutions, it only requires power as it includes all necessary communications hardware. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, licence plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. RAD has published four Case Studies detailing how ROSA has helped eliminate instances of theft Two-way communication is optimised for cellular, including live video from ROSA’s dual high-resolution, full-colour, always-on cameras. RAD has published four Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at multi-family communities, car rental locations and construction sites across the country. RAD solutions AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the $25 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35% and 80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers this tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house.
Custom Consoles announces the completion of a control room desk for Opem Security, a pioneering provider of security systems and services. Located at Opem’s headquarters in Milton Keynes, the desk will form part of the round-the-clock monitoring support Opem performs for clients in many locations. Custom Consoles’ experience “We were looking for a robust and ergonomically well-designed desk that would allow our staff to work comfortably and efficiently,” comments Opem Founder and Managing Director, Jason Pelham. Custom Consoles’ experience and industry background are evident in the styling" He adds, “SteelBase gave us the freedom to specify exactly what we had in mind from a standard range of structural components, including integral accommodation for our computer equipment and video monitor displays. Custom Consoles’ experience and industry background are evident in the styling and build quality. They can also be seen in the attention to detail such as cable management with easy access during initial installation and throughout the desk’s lifetime. Our operators also appreciate being able to position the horizontal and vertical angle of the monitor screens to suit their preferred viewing angle, each screen being mounted on an individually adjustable mounting arm.” SteelBase installations “This is the most recent of many SteelBase installations we have produced for clients in the security, aviation and industrial process control sectors,” said Custom Consoles Sales Manager, Gary Fuller. He adds, “Working alongside Opem, we designed a 5 metre wide curved unit comprising seven bays. Each bay has its own front and rear doors and provides vented space for a computer as well as accommodation for up to 6U of rack-mounted technical equipment. The desktop is 1.2 metres in front-to-back depth and incorporates a continuous cable tray running the entire desk width, protected by an easily removable flush-fitting cover panel. Mounting points for data and power sockets are provided in each PC compartment." Cable management SteelBase takes its name from the high-strength steel base frames that form its structural core A structured desking system offering a hard-wearing and ergonomic solution for control room consoles, SteelBase takes its name from the high-strength steel base frames that form its structural core. Desks and related fittings such as equipment pods and side units can be specified and combined from a range of standard powder-coated steel base frames. Cable management is provided throughout the console with access to equipment via hinged removable doors to both front and rear. SteelBase furniture Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Careful attention has been paid to styling. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements of SteelBase are guaranteed against component failure for five years of normal use. SteelBase furniture is designed to meet or exceed the requirements of ISO9241-5, EN527-1, 2 and 3, and BS EN ISO11064.
Products
Round table discussion
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
The upcoming ISC West trade show in Las Vegas will offer innumerable networking and learning opportunities for attendees. Manufacturers will take the opportunity to promote their businesses and showcase products and services to a targeted audience. Best of all, the event will be "in person," an advantage we should never again take for granted. We asked this week's Expert Panel Roundtable: What big announcements do you expect at ISC West 2023?
There’s always more to talk about in our Expert Panel Roundtable discussions, and we appreciate the variety of opinionated responses offered throughout the year. Looking back at 2022, we found several random and uncategorised Expert Panel responses that were not previously published. We have rescued these responses from our cutting-room floor and present them here in the interest of generating even more discussion.
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download