Human identification system
Global security manufacturer, Gallagher Security, has announced that support for employee badges in Apple Wallet is available for Gallagher customers in the U.S. with the release of Gallagher Command Center v9.10. Employee badge in Apple Wallet is fully integrated with Gallagher Command Center, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. Managing credentials with ease O...
HID, a worldwide pioneer in trusted identity solutions, announces the availability of its new HID Seos Essential Bundle, providing small to mid-size businesses (SMBs) in Europe with the benefits of advanced access control in an all-in-one packaged solution that simplifies installation and deployment. With HID's legacy of security excellence spanning over 30 years, the new bundle combines the latest access control technology to provide premium security and enhanced user experience at a competiti...
Entrust, a global pioneer in trusted payments, identities, and data security announced a single-vendor enhanced authentication solution that integrates identity verification (IDV) and identity and access management (IAM) to fight deepfakes, phishing, account takeover (ATO) attacks and other threats. Identity authentication By enhancing the Entrust Identity as a Service (IDaaS) platform with Onfido’s AI-powered document and biometric verification, customers will be able to deploy ne...
In a landmark achievement, Gulf Business Machines (GBM), an end-to-end pioneering digital solutions provider, has been awarded two new accreditations from CREST and DESC (Dubai Electronic Security Center) in Penetration Testing and Incident Response. Cybersecurity solutions GBM's achievement of these certifications showcases its leadership and expertise in providing state-of-the-art cybersecurity solutions, reflecting the company’s commitment to maintaining local roots while adhering to...
IDnow, an identity verification provider in Europe, has unveiled VideoIdent Flex, a new version of its expert-led video verification service that blends advanced AI technology with human interaction. The human-based video call solution, supported by AI, has been designed and built to boost customer conversion rates, reduce rising fraud attempts, increase inclusivity, and tackle an array of complex online verification scenarios while offering a high-end service experience to end customers. Vide...
On February 28, 2024, IDEMIA Smart Identity and NIMC agreed to renew their long-standing collaboration and upgrade NIMC’s biometric system to become the most advanced biometric system in the world, comparable only with Aadhaar in India. The powerful biometric matching system will be able to handle 1 million 1:1 and 1:N identity verification searches per day. The initial system was designed to support 100 million records but has already reached around 90 million records and requires this e...
News
iDenfy, a Lithuania-based identity verification, compliance, and fraud prevention company, announced a new partnership with SCOPE FinTech Solutions, a Netherlands-based business that’s best known for its Software as a Service (SAAS) solutions tailored explicitly for fintech. This partnership marks a major leap forward in enhancing fintech security, particularly in response to the expanding European market and the escalating threat of financial fraud. Identity verification iDenfy helps SCOPE to streamline the identity verification process across multiple countries through straightforward, standardized ID inspection checks. According to iDenfy, this automated verification process will facilitate SCOPE's rapid expansion while maintaining a focus on essential aspects: user experience and compliance. Anti-money laundering (AML) program SCOPE recognizes the critical importance of the EU’s AMLDs and ever-evolving compliance challenges Specializing in assisting clients with due diligence and risk assessment processes, SCOPE recognizes the critical importance of the EU’s Anti-Money Laundering Directives (AMLDs) and ever-evolving compliance challenges. SCOPE stated that although the company had strong measures in place for its anti-money laundering (AML) program such as screening authoritative international databases and sanctions lists, along with employing various effective risk assessment tools, the lack of an automated identity verification solution presented difficulties in accurately verifying new users and adhering to Know Your Customer (KYC) regulations. Reliable KYC solution SCOPE required a fully automated process to verify the identities of both current and potential customers using their services, ensuring regulatory compliance while optimizing the conversion rate. In a quest to both comply with regulatory requirements and automate customer onboarding, SCOPE looked for a reliable KYC solution that could seamlessly integrate into its existing software and offer the same for its fast-growing fintech clients list. 3D liveness detection powered by AI SCOPE uses iDenfy's KYC software to automatically extract data from users' ID documents and cross-reference it As a result, SCOPE employed iDenfy's identity verification solution, featuring 3D liveness detection powered by AI. This upgraded tool enables SCOPE to leverage cutting-edge face recognition algorithms, effectively preventing attempts by fraudulent identities to gain access to the company's platform. Furthermore, SCOPE uses iDenfy's KYC software to streamline the verification process. This software automatically extracts data from users' ID documents and cross-references it with their account information, ensuring the authenticity of individuals accessing SCOPE's services. Seamless integration with the Data Outreach module The collaboration with iDenfy enables SCOPE to offer a complete onboarding solution by seamlessly incorporating the verification process into their Data Outreach module, automating the entire process for a more efficient end-user experience. This aligns with the company’s general mission to deliver secure, user-friendly, and innovative AML solutions to their clients. According to SCOPE, before iDenfy, finding a trusted KYC provider was a challenge, especially in the landscape of newly emerging threats, such as mobile application fraud that underscored the need for effective fraud prevention measures. Innovative fintech solutions “Together with iDenfy, we highlight our commitment to delivering innovative fintech solutions that meet the evolving needs of compliance-bound entities. The new ID verification solution has already helped us automate client onboarding while focusing on what matters most, compliance and efficiency,” commented Fred van‘t Hoff, CEO at SCOPE. “SCOPE's dedication to innovative fintech compliance solutions aligns perfectly with our mission. That’s why our team is very excited to support SCOPE’s efforts to mitigate the risk of fraudulent activities through robust practices, including identity verification,” added Domantas Ciulde, the CEO of iDenfy.
HID, the worldwide pioneer in trusted identity solutions, and Olea Kiosks®, a visionary provider of self-service kiosk solutions, announced a new collaborative engagement that revolutionizes the user experience when it comes to access control and user authentication across a range of applications. WHAT: Industries from healthcare, hospitality and retail to banking, government, transportation and beyond are primed to empower people with unsurpassed levels of security and user convenience when it comes to countless check-in and access scenarios. The HID U.ARE.U™ Camera Identification System – featuring remarkable facial recognition technology (FRT) – can now be incorporated into the Olea HYPERMODULAR™ Kiosk to address the rising demand for flexible, customizable ID authentication and verification across various vertical settings. WHY: Facial recognition technology continues to gain traction based on its unique combination of high security and user convenience. Paired with the extremely flexible Olea kiosk, HID’s AI-powered U.ARE.U Camera Identification System is an ideal solution for applications needing to handle high throughput. HID FRT is: Fast and Accurate: On-the-spot verification authenticates and validates an individual’s identity in seconds, reducing wait time in line. Easy to Use: One look is all that’s required to securely capture a facial image for frictionless identity verification. Secure: Biometric traits provide irrefutable proof of identity and presence to prevent fraud. Convenient: One’s face is now their ID card, pin, and password, so there’s nothing to carry, forget, lose, or steal. No Human Intervention: This seamless technology requires no dedicated staff to check IDs. Contactless and Hygienic: Facial recognition offers a touchless way to authenticate individuals' identities, minimizing exposure to health risks by reducing shared touchpoints. Olea selected the HID U.ARE.U Camera Identification System for its many notable features, including: Top NIST ranking for matching performance & accuracy Ethically trained with AI to reduce matching bias Exceptional ‘In-the-Wild’ recognition (precise capture and authentication regardless of variances in lighting, backgrounds, pose, expression, etc.) Extraordinary presentation attack detection (PAD) against spoofs Stellar security & privacy with on-device (Edge) biometric processing Easy to configure (pioneering to faster deployment and faster ROI) Olea developed the HYPERMODULAR kiosk in response to market demands for flexible, customizable kiosks for security and access control space. In addition to housing HID’s pioneering facial recognition camera, Olea’s kiosk design can also accommodate fingerprint scanners, barcode scanners, ticket and ID document readers, RFID readers, card printers, and other HID offerings within its HYPERMODULAR footprint. HOW: Bringing together HID facial recognition with Olea kiosks supports myriad use cases for reliable self-service check-in and authentication. Just a sampling of applications include: Retail & Hospitality: Hotel self-check-in, self-checkout/face pay, ticketing at theme parks and VIP customer identification Banking: ATM verification and VIP customer identification Healthcare: Patient check-in and registration, managing personal data, scanning and recording insurance/ID cards, telemedicine services and payment collection Airport and Border Crossing: Passenger self-check-in, bag tag printing and bag drop, VIP lounge access, and security and immigration checkpoints WHEN: The HID-Olea Kiosks are available now. To learn more about HID’s facial recognition technology and Olea Kiosks, visit the solution pages: HID AI-powered facial recognition HID U.ARE.U Camera Identification System Olea HYPERMODULAR Kiosk
Businesses must prepare for a double-digit increase in climate change hazards that impact physical security in the next year and could threaten supply chains, people, and finances, according to G4S’s World Security Report. Almost two-fifths (38%) of companies surveyed expect it to impact their company in the next 12 months, an increase of 11% in 2022. The warning comes as the COP28 climate conference continues in the UAE. Security-impacting hazard 1,775 Chief Security Officers (CSOs) in 30 countries at large global companies with total revenue of more than $20 trillion took part in the first-ever World Security Report. Climate change is the third most likely security-impacting hazard to affect companies in the next year after economic unrest (47%) and pandemics (40%). CSOs also anticipate that floods, wildfires, earthquakes, landslides, and tsunamis will all increase. Identifying potential threats Most companies tend to be reactive, addressing security threats only after they've struck" Noah Price, International G4S Academy Director said, “Climate change and natural disasters pose a significant threat to a company's physical security operations." "Most companies tend to be reactive, addressing security threats only after they've struck. It’s business critical that CSOs anticipate potential threats and prepare for them. No action or just reaction is not an option. Need for preemptive security measures “Being reactive often results in significantly higher financial and reputational losses compared to the costs of implementing robust, preemptive security measures." "Planning will ensure businesses are more resilient, safeguarding people and assets.” What do businesses need to do? One of the most pragmatic security plans G4S advises is climate-specific risk assessments of places of work Contingency planning, investing in technology, and diversifying supply chains from climate change disruptions are three examples of the actions businesses can take. One of the most pragmatic security plans G4S advises is climate-specific risk assessments of places of work, operational locations, and where employees reside. This should be regularly reviewed and updated. Risk evaluation “In light of the wildfires we witnessed around the world, it's imperative business leaders ask themselves: have we evaluated the risk of such events recurring?" "Have we proactively installed measures like sprinkler systems or perimeter defenses to mitigate future threats? Beyond physical infrastructure, it's crucial to consider the human element, how do such events impact our employees, their families, and their ability to work?" Price emphasized. Infrastructure to withstand environmental risks If supply chains are strategically diversified, threats to one region are less likely to affect production Businesses should invest in infrastructure that can withstand extreme weather events. Buildings that are reinforced, have flood protection systems, and fire-resistant materials will lessen the impact. Companies are facing up to US$120 billion in costs from environmental risks in their supply chains within the next five years. If supply chains are strategically diversified, threats to one region are less likely to affect production, manufacturing, or commerce reducing the overall impact on business productivity. Addressing the fragility of supply chains Mike Maltezakis, G4S Academy Supply Chain Specialist, said, “Recent droughts in the Panama Canal, flash flooding and extreme wildfires have highlighted the fragility of supply chains. The need for them to be resilient and as diverse as possible is increasingly necessary." “If you’re an e-commerce business, a supply chain disruption like the Panama Canal drought has the potential to be not only costly but leaves you and your products vulnerable to theft." Varied supply chain options The biggest security threat with this is that they use violence against staff and crew members to take what they want" "You could have millions of pounds worth of product sat in cargo that an Organized Crime Group (OCG) looks to take advantage of. And with droughts in the canal more likely, so is the likelihood that OCG bases itself nearby because they see a recurring opportunity." "The biggest security threat with this is that they use violence against staff and crew members to take what they want. Having varied supply chain options means companies are less at risk of being over-reliant on certain suppliers.” Predictive and aerial technology Predictive and aerial technology will be key to assessing the risks, and damage and enable key strategic decision-making. Over the next five years, 42% and 39% of World Security Report respondents are planning to use AI machine learning, and IoT devices in their physical security operations, respectively. Almost a quarter (24%) will use drones and unmanned aerial systems (UAS). AI and machine learning Strategically placed devices can monitor factors like water levels, soil moisture, or air quality and send instant alerts AI and machine learning can be used for predictive analytics when looking at climate-related risks. For instance, AI can analyze vast amounts of data from past weather patterns, satellite imagery, and climate models to predict natural disasters with greater accuracy, enabling timely preventive measures. IoT, in real-time, can monitor environmental conditions. Strategically placed devices can monitor factors like water levels, soil moisture, or air quality and send instant alerts flagging abnormal readings, which can indicate impending floods, droughts, or other climate threats. Unmanned Aerial Systems Unmanned Aerial Systems, i.e. drones and satellites, can assess the impact of climate events on infrastructure. Drones can provide aerial views of affected areas, helping businesses assess damage quickly and plan their response effectively. Concluding, Price said, “Businesses have a vital role to play in reducing climate change, but also in keeping their operations running, people and assets safe, and protecting themselves from a wide range of climate threats. ”
Transmit Security, a pioneering Identity Security specialist announces the general availability and next phase of AI integration into the Transmit Security platform with the release of Conversational Analytics. This text-based analytics service leverages generative AI to empower anyone, even those without technical expertise to perform quick custom searches on their identity databases. Conversational Analytics The Transmit Security platform can be queried with natural language questions such as “What are the most prevalent attack tactics in the past week?” or “Who are the most targeted/at-risk users?” The Conversational Analytics model will then establish the intent of the question and extract the information from the identity database in seconds. These queries will be handled with proper authentication and authorization so that sensitive information is kept confidential, compliance is maintained and data handling remains within predefined access controls. Limitations of out-of-the-box dashboards Many analytics services provide dashboards or integrative capacity if users want to stream their data Many analytics services provide dashboards or integrative capacity if users want to stream their data into third-party systems. However, out-of-the-box dashboards are often limited to what the product provides, and streaming to third-party systems still requires users to integrate that data, which is an often time-consuming and error-prone process. Valuable insights Conversational Analytics circumvents that by allowing Transmit Security customers to directly interrogate data, both from the Transmit Security platform and from 3rd party integrations, and analyze user identity behavior, device activity, and trends with natural language expressions. This enables them to quickly gain valuable insights without the need for technical expertise and pursue inquiries into usage trends, behavioral anomalies, and potential fraud by instantly asking follow-up questions on returned outputs across the fraud stack. Track responses Conversational Analytics also lets users track responses to those questions over time. If a user needs to know about the behavior, they can build that query into their dashboard so it can keep providing them with answers day after day. Top-down and Bottom-up approach Conversational Analytics’ AI-powered investigations can be used in two ways Conversational Analytics’ AI-powered investigations can be used in two ways. A “top-down” approach in which, for each identified fraud case, an AI chatbot can be directly queried in natural language and provide answers which give full context to the case, addressing critical fraud threats in real-time. Conversely, a “bottom-up” approach offers offline, ongoing fraud analysis which can be monitored from a dashboard and leveraged for reporting and management briefing. Customer Identity “Customer Identity is a key part of fraud detection and investigation,” says Danny Kadyshevitch, Senior Product Lead for Detection and Response at Transmit Security, “but many organizations struggle to use their identity data productively." "This new analytics service uses AI to unlock the possibilities for laymen users to carry out crucial forensic tasks, investigate abnormal user behavior, and develop long-term anti-fraud and defense strategies.” Conversational Analytics was released in Beta for Transmit Security customers in June this year and the full version will be available by the end of the year.
In a groundbreaking collaboration, Partisia Blockchain and the University of Applied Sciences and Arts Western Switzerland (HES-SO Valais-Wallis) are poised to transform the management of digital identities for Swiss citizens. This partnership aims to develop a decentralized electronic identity system in harmony with the Swiss Federal Council’s unwavering commitment to data privacy and security. Redefining digital identity management This collaboration marks a significant leap toward redefining digital identity management in Switzerland. The joint project aims to empower individuals with control over their data, ensuring a future where privacy and security are not compromised. The primary objective of this project is to define the architecture for a self-sovereign identity (SSI)--based electronic identity (e-ID), creating a minimum viable product (MVP) and seamlessly integrating it into a public administration portal. SSI-based e-ID SSI solution empowers citizens by enabling them to wield credentials issued by public administrations The SSI solution empowers citizens by enabling them to wield credentials issued by public administrations in mobile applications, offering the autonomy to select the data they disclose when accessing services. Central to this innovation is blockchain technology, with Partisia Blockchain at the forefront, introducing a fast, sustainable, and privacy-centric blockchain solution. Enhancing security Kurt Nielsen, PhD, President of Partisia Blockchain, says, “We aim to place control firmly in the hands of individuals, allowing them to become the ultimate custodians of their personal information." "This approach not only enhances privacy but also elevates the level of security that individuals can expect from digital identity management.” Decentralized system This decentralized system ensures that the individual is the ultimate owner of their information Partisia Blockchain, known for its proficiency in zero-knowledge and private smart contracts, provides a platform where individuals exercise absolute control over their data. This decentralized system ensures that the individual is the ultimate owner of their information, setting a new standard in privacy and security. Simple, secure, and open-source approach Jean-Luc Beuchat, Professor at HES-SO Valais-Wallis, says, “We are thrilled to introduce our SSI solution, designed to provide a simple, secure, and open-source approach to digital identity management." "Its versatility makes it ideal for a wide range of applications, from government-issued e-IDs to humanitarian aid initiatives. Our scalable solution can be seamlessly adapted to meet the unique requirements of diverse organizations.” Target vision for an e-ID The paper outlined three technical approaches: a state identity provider, a public-key infrastructure, and SSI In response to the rejection of the Federal Act on Electronic Identification Services (e-ID Act) by Swiss citizens in March 2021, the Swiss Federal Council promptly recommended Parliament approve six motions addressing citizens’ concerns and proposing a new e-ID Act. This led to the drafting of technical solutions by the Federal Office of Justice (FOJ), including the discussion paper on the target vision for an e-ID in August 2021. The paper outlined three technical approaches: a state identity provider, a public-key infrastructure, and self-sovereign identity (SSI). Opting for the latter approach, the Federal Council is in the final stages of concluding consultations before the year’s end. Benefits of SSI The solution developed by Partisia Blockchain, DuoKey, and HES-SO Valais-Wallis is slated for presentation to the Swiss Federal Department of Justice before Christmas. Emphasizing its various benefits, including non-disclosure of personal information, data usability for statistics and planning without revealing personal information, and its compliance with Swiss legislation, this solution aligns seamlessly with the vision outlined by the Swiss Federal Council. Reshaping digital identity The Partisia Blockchain and HES-SO Valais-Wallis’ joint solution is a pivotal moment in reshaping digital identity management in Switzerland, emphasizing a commitment to privacy, security, and a decentralized approach. The joint efforts aim to echo the Swiss regulations of data governance, prioritizing individual empowerment and stringent privacy measures. Privacy-preserving authentication Supported by proven cryptographic techniques, this system maintains data integrity and privacy The system relies on verifiable credentials (VCs) to ensure secure and privacy-preserving authentication along with SD-JWT selective disclosure. Managed through smart contracts deployed by a universally trusted governance framework, citizens can securely log into various web portals using these credentials. Supported by proven cryptographic techniques, this system maintains data integrity and privacy, ensuring a robust digital identity management solution. Energy efficiency, scalability, and data security Energy efficiency, scalability, and security have been at the core of our solution as well. Partisia Blockchain not only offers a sustainable choice but also ensures the scalability needed to accommodate any number of users while upholding the highest standards of security. The collaboration between Partisia Blockchain, DuoKey, and HES-SO Valais-Wallis marks a pivotal step forward in digital identity management in Switzerland, particularly in the context of the broader European landscape where projects, such as the European Union’s e-ID, are sparking discussions about privacy and data security. Robust privacy and security By focusing on an SSI-based e-ID and utilizing zero-knowledge and private smart contracts, this solution aims to empower individuals with unparalleled control over their data. This approach not only ensures robust privacy and security but also sets a new standard in digital identity management, highlighting user empowerment and a commitment to a decentralized framework.
Veridas, the Spanish technology company specializing in digital identity and biometrics announced it has once again been included in the Gartner Market Guides for Identity Verification and User Authentication. The Gartner Market Guides include definitions, benefits, key findings, and recommendations for organizations looking to implement and utilize both User Authentication and Identity Verification technologies for security, risk management, and fraud prevention. User authentication As defined in the Market Guide for User Authentication, “User authentication is used to provide credence in an identity claim for a person already known to an organization." "The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. Without effective authentication, the security of and trust in that person’s digital interactions are deeply undermined.” DEI considerations IAM pioneers should also pay attention to socioeconomic bias, especially about the acceptability" When discussing the market direction for User Authentication, the Market Guide states “IAM pioneers (and everyone else) should also reflect diversity, equity, and inclusion (DEI) considerations." "To avoid impairing security, as well as UX, IAM pioneers should choose methods that are equitable across different clines. IAM pioneers should also pay attention to socioeconomic bias, especially about the acceptability and possession of different authenticators.” Biometric technology “We think the Market Guide touches on the drastic difference in utilization of biometric technology when socioeconomic bias is ignored. At Veridas, our roots are firmly planted in the idea that users should not suffer to authenticate themselves, they should be able to do so freely and entirely as they are,” said Eduardo Azanza, CEO, of Veridas. “For this reason, we urge biometric adopters to explore a range of biometric tools, such as Face and Voice biometrics, to best support their users.” Identity Verification Identity verification capabilities, delivered as SaaS or on-premises, assure that a real-world identity exists" Additionally, in the Gartner Market Guide for Identity Verification, Identity Verification is defined as “the combination of activities during a remote interaction that brings a real-world identity claim within organizational risk tolerances." "Identity verification capabilities, delivered as SaaS or on-premises, assure that a real-world identity exists and that the individual claiming the identity is its true owner and genuinely present during a remote interaction.” Improving security and/or UX For security and risk management pioneers who focus on identity and access management, the Gartner Market Guide for Identity Verification recommends pioneers “Investigate if multiple use cases exist within your organization where the technology can improve security and/or UX both across workforce and customer interfaces. Examples include: Customer use cases such as automating Know Your Customer (KYC) processes, preventing identity fraud during application processes, and increasing trust between buyers and sellers on marketplaces. Workforce use cases such as remote hiring, onboarding, and ensuring the integrity of credentialing and account recovery processes.” Common layers of defense Active techniques typically involve asking the user to act, such as turning their head or smiling" The Gartner Market Guide for Identity Verification additionally highlighted common layers of defenses for both presentation and injection attacks, including Liveness detection, defined as “Active or passive techniques to assess genuine human presence before the selfie is taken." "Active techniques typically involve asking the user to act, such as turning their head or smiling. Passive techniques may involve looking for micromovement in the face, 3D depth analysis, and changes in light reflection as blood flows under the skin and others.” Liveness detection “Liveness detection continues to drive organizations' trust and reliability in biometric technology,” said Eduardo Azanza, CEO, of Veridas. “As deepfake attacks continue to increase, we can stop threat actors in their tracks with our easy-to-use and 100% proprietary technology.”
Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardization of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration toward the standardization of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralizing as much as possible. Practically, this means utilizing APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of Cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralization in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well-positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
Security systems represent a significant investment, yet many organizations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control, and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance, or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realizing their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction Left unchecked a consumption gap can create frustration for system integrators, manufacturers, and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators, and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers toward the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customized training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customized training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialized expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realize the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defenses, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitization of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of Cyber Resilience in Protecting Service Availability Cyber resilience refers to organization's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organization's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimizing the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimized, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organization. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorized individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorized access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organizations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organizations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labeled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organizations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organizations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organization can respond quickly and effectively to a breach, minimizing its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organizations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organizations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customized questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorized test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organizations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realize the vision of Matter.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Case studies
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travelers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognizing this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritize security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl. “The whole world goes in and out. Security is very important.” Hofbräuhaus Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It currently attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Need for digital access Inobtrusive digital devices and low-impact installation were a necessity to ensure compliance Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers including up to 100 waiters working each shift within a unified system that could authorize access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were necessary to ensure compliance with heritage preservation regulations. eCLIQ key-based digital access solution Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so they don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. Programmable keys for staff management ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorizations are removed rapidly, simply by reprogramming cylinders ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between the cylinder, key, and system so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager, “I can program keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” Anytime, anywhere access The system is easy to expand anytime, future-proofing Hofbräuhaus access With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime, future-proofing Hofbräuhaus access. Master key system “The situation before the new master key system was installed was problematic,” says Robert Graßl. “Keys were distributed and nobody knew who held them. Everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
The Rewley Road Swing Bridge, an integral part of Oxford's industrial history, underwent a remarkable transformation in 2023 from rusting to restoration. Through a collaborative effort between the Oxford Preservation Trust, the Railway Heritage Trust, Historic England, and input on security solutions from Jacksons Fencing, this iconic landmark was meticulously restored and safeguarded for the enjoyment of present and future generations. A journey through time Dating back to 1851, the Rewley Road Swing Bridge played a pivotal role in the movement of goods and people during the 19th century in Oxford. However, changing times lead to its disuse and subsequent state of disrepair. By the 1980s, the bridge stood permanently fixed in an open position. Recognizing the historical and cultural significance of the bridge, the Oxford Preservation Trust embarked on a restoration journey to bring this historical treasure back to life. Jacksons Fencing was specified by the Railway Heritage Trust and Historic England to provide demarcation fencing around the landmark, playing a vital role in ensuring the successful establishment of the bridge as a visitor attraction. Modern security meets historical elegance Fencing's unique vertical bar design not only exudes visual grace but also serves as a robust barrier To ensure the safety of visitors and protect the bridge from potential vandalism, Jacksons Fencing provided a thoughtful protection plan that seamlessly integrated modern security features with the bridge’s historical esthetic. In the pursuit of safeguarding the Rewley Road Swing Bridge, Jacksons Fencing introduced a total of 57 meters of 1.25 m high Barbican Imperial® fencing which seamlessly harmonized security with the bridge's historical charm. The fencing's unique vertical bar design not only exudes visual elegance but also serves as a robust barrier against unauthorized access. This fence choice is ideal for a heritage project as it offers the look of traditional metal railings but with a modern, stronger, and more sustainable tubular design. Barbican Imperial fencing Concealed connectors and the absence of visible bolts or fixings further amplify the fencing's security prowess while maintaining a clean and uncluttered appearance. As an integral part of the protection strategy, a 3.6 m wide double leaf gate was integrated, complete with a pad-lockable slide latch. This innovative latch ensures controlled access, reinforcing security without compromising convenience. The specification of high-quality materials was paramount for this project. The selected Barbican Imperial fencing was meticulously crafted from high-quality hot dip galvanized steel, equipping it with exceptional strength and resistance against the corrosive forces of time. To ensure the bridge's appearance would not wither, a black polyester powder coating was applied. This not only adds a touch of timeless sophistication but also guarantees durability and a long-lasting finish. By embracing modern techniques, the bridge's protective features are seamlessly integrated into its historic context, allowing it to confidently stand the test of time. A safe haven for local wildlife Gaps between the pales of the fencing facilitate the free movement of animals through the site Jacksons Fencing's commitment extended beyond human safety to encompass the thriving local ecosystem. With a profound understanding of the importance of coexistence with nature, the new security solution was intentionally designed to accommodate the movement of local wildlife. Gaps between the pales of the fencing facilitate the free movement of animals through the site ensuring that while security remains uncompromised, the natural ecosystem can flourish undisturbed. Now fully restored, a new life has been breathed into the Rewley Road Swing Bridge. Beyond its full restoration, the bridge now symbolizes a link between the past and the future. Author's quote Peter Jackson, Managing Director, Jacksons Fencing, comments: "We're thrilled to have been part of restoring the Rewley Road Swing Bridge's historic charm while infusing modern security. Our commitment to eco-conscious solutions mirrors the Oxford Preservation Trust's vision for a biodiverse landscape. He adds, "By strategically integrating wildlife-friendly features, we've created a haven for both heritage and nature. The bridge's removal from the Heritage at Risk Register and its recognition with the Railway Heritage Trust Conservation Award in 2022 spotlight our collective dedication to preserving history while embracing security and sustainability."
Located in Kerala, India, the Somatheeram Ayurveda Hospital with a Resort Ambiance is the best place for not only visual rejuvenation but also physical and mental rejuvenation. Through Ayurveda, Somatheeram provides a means to shed all worries, anxieties, and illnesses. With the objective of combining Ayurveda and Tourism, the Somatheeram Research Institute & Ayurveda Hospital was founded in the year 1985, thus making it the world’s first-ever Ayurvedic Hospital in a Resort Ambiance. The Somatheeram Group of Companies came into being with the efforts of the Founder Managing Director, and Architect Mr. Baby Mathew. Challenges Multi-location transmission proves to be an expensive affair if devices are not chosen wisely Somatheeram has multiple resorts, located at different locations. Multi-location communication can prove to be an expensive affair if communication devices are not chosen wisely. Their dependence on public service providers for communication added to their woes of communication between their resorts. To elaborate: Feasibility of existing telephony: Existing telephony became impracticable considering the frequent communication between multi-located properties. Managing different protocols: Interface with different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Absence of modern phone features: The lack of advanced features like abbreviated dialing, call pick up, and internal call restriction, prevented them from becoming efficient in day-to-day operations. Transition to modern communication with existing infrastructure: Their investment in existing infrastructure needed protection while also a provision had to be made to modernize the communication using existing infrastructure. Solution The solution offered was based on the fundamentals of multi-location communication solutions Matrix analyzed the challenges of communications for Somatheeram and crafted a solution that was the best fit. The solution offered was based on the fundamentals of multi-location communication solutions. This included the Matrix range of IP-PBX (ETERNITY GENX12S) and GSM Gateway (SIMADO GFX11 and SIMADO GFX11 4G) that optimized the feasibility of communication and helped the firm become more efficient. Solution includes: The Hybrid IP-PBX included ETERNITY GENX12SAC, which enabled them up to 240 Analog users with 64 CO Ports. Another Hybrid IP-PBX included ETERNITY PENX, which allowed them access to 100 IP Users, onboard IP User Support, LDAP Client support, support of 4G VoLTE ports, COSEC Door Integration, and much more. The GSM gateway included SIMADO GFX11 and SIMADO GFX11 4G which enabled them to make and receive calls from analog extensions. The capability to integrate with almost all industry-pioneering PBXs enabled them a smooth transition to modern communication while maintaining existing infrastructure. Results The solution so implemented enabled all properties to work as a single communication platform and proved to be beneficial for Somatheeram and its properties in more than one way. The Hybrid IP-PBX enabled them, unified communication facilities like Email to SMS, audio/video calling, unified messaging facilities, and multi-location collaboration features like UC client integration, one-number reach, etc. The Hybrid IP-PBX also enabled, investment optimization through universal network connectivity, easy and centralized phonebook management through LDAP client support, mobility convenience through 4G VoLTE support, and much more. The GSM/4G gateway enabled them, GSM/4G connectivity to existing infrastructure, hotline extension dialing, emergency number dialing even in the absence of a sim card, etc. through secure network bridging.
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions along with its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD), published a case study reviewing the overwhelmingly positive results from the successful deployment of multiple ROSA security robots at a multi-family community in San Jose, California. Innovative security technology The case study titled "From Break-Ins to Breakthroughs: How a Multiple RAD ROSA System Reshaped an HOA Community’s Security" highlights the transformation of Westside Manor Homeowners Association from a vulnerable community plagued by often dangerous break-ins to a secure environment through the adoption of RAD’s innovative security technology. Struggling with limited funds and frustrated with previously ineffective measures Struggling with limited funds and frustrated with previously ineffective measures, the HOA partnered with EPIC Security Works, a RAD-authorized dealer, to deploy multiple ROSA devices equipped with AI analytics, lights, audio, and visual messaging. This innovative approach led to a significant reduction in break-ins, effectively transforming the community's security landscape. Author's quote “This case study summarizes the detailed and coordinated efforts that RAD, its dealers, remote monitoring partners, property managers, and end users perform as we successfully disrupt the security and #proptech marketplaces,” said Steve Reinharz, CEO of AITX and RAD. “I am so proud of this winning combination where everything and everybody worked together enabling a safe and more secure environment for the community’s residents.” RAD’s software suite notification ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be deployed in about 15 minutes. Like other RAD solutions, it only requires power as it includes all necessary communications hardware. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, license plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. RAD has published four Case Studies detailing how ROSA has helped eliminate instances of theft Two-way communication is optimized for cellular, including live video from ROSA’s dual high-resolution, full-color, always-on cameras. RAD has published four Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at multi-family communities, car rental locations, and construction sites across the country. RAD solutions AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the $25 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35% and 80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers this tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics, and software platforms are developed in-house.
Custom Consoles announces the completion of a control room desk for Opem Security, a pioneering provider of security systems and services. Located at Opem’s headquarters in Milton Keynes, the desk will form part of the round-the-clock monitoring support Opem performs for clients in many locations. Custom Consoles’ experience “We were looking for a robust and ergonomically well-designed desk that would allow our staff to work comfortably and efficiently,” comments Opem Founder and Managing Director, Jason Pelham. Custom Consoles’ experience and industry background are evident in the styling and build quality" He adds, “SteelBase gave us the freedom to specify exactly what we had in mind from a standard range of structural components, including integral accommodation for our computer equipment and video monitor displays. Custom Consoles’ experience and industry background are evident in the styling and build quality. They can also be seen in the attention to detail such as cable management with easy access during initial installation and throughout the desk’s lifetime. Our operators also appreciate being able to position the horizontal and vertical angle of the monitor screens to suit their preferred viewing angle, each screen being mounted on an individually adjustable mounting arm.” SteelBase installations “This is the most recent of many SteelBase installations we have produced for clients in the security, aviation, and industrial process control sectors,” said Custom Consoles Sales Manager, Gary Fuller. He adds, “Working alongside Opem, we designed a 5-meter-wide curved unit comprising seven bays. Each bay has its own front and rear doors and provides vented space for a computer as well as accommodation for up to 6U of rack-mounted technical equipment. The desktop is 1.2 meters in front-to-back depth and incorporates a continuous cable tray running the entire desk width, protected by an easily removable flush-fitting cover panel. Mounting points for data and power sockets are provided in each PC compartment." Cable management SteelBase takes its name from the high-strength steel base frames that form its structural core A structured desking system offering a hard-wearing and ergonomic solution for control room consoles, SteelBase takes its name from the high-strength steel base frames that form its structural core. Desks and related fittings such as equipment pods and side units can be specified and combined from a range of standard powder-coated steel base frames. Cable management is provided throughout the console with access to equipment via hinged removable doors to both front and rear. SteelBase furniture Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Careful attention has been paid to styling. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements of SteelBase are guaranteed against component failure for five years of normal use. SteelBase furniture is designed to meet or exceed the requirements of ISO9241-5, EN527-1, 2, and 3, and BS EN ISO11064.
Products
Round table discussion
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organization, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
The upcoming ISC West trade show in Las Vegas will offer innumerable networking and learning opportunities for attendees. Manufacturers will take the opportunity to promote their businesses and showcase products and services to a targeted audience. Best of all, the event will be "in person," an advantage we should never again take for granted. We asked this week's Expert Panel Roundtable: What big announcements do you expect at ISC West 2023?
There’s always more to talk about in our Expert Panel Roundtable discussions, and we appreciate the variety of opinionated responses offered throughout the year. Looking back at 2022, we found several random and uncategorized Expert Panel responses that were not previously published. We have rescued these responses from our cutting-room floor and present them here in the interest of generating even more discussion.
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadGunshot Detection
Download