Testing & Approvals
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long CO...
The PSA Network, the world’s largest consortium of professional systems integrators announced the lineup of sponsors for PSA TEC 2024 (TEC) in Dallas, Texas, May 13-17. PSA TEC 2024 "PSA TEC 2024 will again be the most powerful event for security integrators, and we have an incredible group of technology partner sponsors that enable PSA to exceed expectations in delivering high-quality educational offerings, networking, and exclusive engagement with prominent industry pioneers...
F5 announced new best-in-class security offerings that strengthen protections and simplify management for customers. With the launches of F5 Distributed Cloud Services Web Application Scanning, BIG-IP Next Web Application Firewall (WAF), and NGINX App Protect for open-source deployments, F5 is extending its leadership with the industry’s most effective and most comprehensive AI-ready app and API security suite. SOAS report The news comes as F5’s just-released 2024 State...
DigiCert, a global provider of digital trust, announced the first World Quantum Readiness Day, which will take place on September 26, 2024. This initiative aims to spotlight the critical need for current security infrastructures to adapt to the imminent reality of quantum computing. Quantum computing Quantum computing promises unparalleled computational power and will transform industries by making certain tasks exponentially faster. However, this leap forward also presents significant...
Next DLP, a pioneer in data loss prevention and insider threat solutions announced that their Reveal Platform is the first Insider Risk Management solution to automatically map detection events to MITRE Engenuity Center for Threat-Informed Defense’s (Center) expanded Insider Threat Knowledge Base (ITKB 2.0). The ITKB 2.0 is the first of its kind to offer an evidence-based, multi-organizational, and publicly-available compendium of insider threat tactics, techniques, and procedures (TT...
Bugcrowd, the pioneer in crowdsourced security introduced the availability of its AI Pen Testing on the Bugcrowd Platform to help AI adopters detect common security flaws before threat actors take advantage. AI Pen Testing is a part of Bugcrowd’s AI Safety and Security Solutions portfolio, in addition to the recently announced AI Bias Assessment offering. Access to AI Commoditized access to AI is revolutionizing how work is done in every industry. AI also presents new categ...
News
AMAG Technology™, an Allied Universal Company®, announces the launch of AMAG Technology Financial Services, a groundbreaking initiative designed to provide channel partners with flexible leasing alternatives for their customers. This program offers a strategic resource for channel partners, allowing them to offer customers the choice between purchasing products and services outright or leasing them for an agreed-upon term. Customized, flexible leasing AMAG Technology Financial Services offers customized, flexible leasing solutions via a strategic partnership with Vantage Financial. "We are excited to introduce AMAG Technology Financial Services as a strategic resource for our valued channel partners," said AMAG Technology President, David Sullivan. Service benefits AMAG Technology’s channel partners will experience improved cash flow, shortened sales cycles "Our partnership with Vantage allows us to provide tailored leasing solutions that meet the unique needs of our channel partners and their customers, ultimately enhancing their ability to finalize sales and drive business growth." AMAG Technology’s channel partners will experience improved cash flow, shortened sales cycles, improved margins, and more repeat business. Low total cost of ownership Their end users can preserve cash, eliminate budget constraints, have flexible terms and payment structures, combine multiple purchases into one payment, bundle equipment, and lower their total cost of ownership. “It’s a win for all involved,” said Sullivan. “It helps channel partners drive business growth and eliminates budget constraints for end users.”
VuWall, a technology pioneer in video wall control systems and unified visualization solutions, proudly announces significant enhancements to its VuStream 150 H.264 HDMI video encoder. The VuStream 150, part of the VuStream series of encoders and decoders, seamlessly integrates with the PAK video wall, KVM nodes, and VuScape controllers, while being centrally configured and managed by the TRx centralized management software platform. Cost-effective solutions "Our commitment to continual enhancements across all our AV-over-IP products aims to provide our customers with the highest quality and most cost-effective solutions," said Fadhl Al-Bayaty, Vice President of Product Management at VuWall. "The improvements made to the VuStream 150 ensure that every aspect of performance and flexibility not only meets but exceeds expectations, empowering seamless content distribution, control, and management for years to come." VuStream 150 encoder The versatility extends to its streaming capabilities, effortlessly enabling unicast or multicast transmission The latest VuStream 150 encoder appliance supports HDMI signals at resolutions up to 3840x2160@60Hz and supports 4:4:4 pass-through, as well as 4:2:0 and 4:2:2 encoding and streaming. This versatility extends to its streaming capabilities, effortlessly enabling unicast or multicast transmission to PAK processing nodes configured for various setups, including operator stations or expansive video walls, VuScape video wall controllers, and common media players like VLC. PoE, NDAA Boasting high-quality UHD encoding, a sleek and compact design, Power over Ethernet (PoE) support, and seamless compatibility with third-party software decoding, the VuStream 150 is reshaping the landscape of video-over-IP solutions. Moreover, the VuStream 150 is NDAA (National Defense Authorization Act) and TAA (Trade Agreements Act) compliant, adhering to the provisions outlined in the National Defense Authorization Act and eligible for procurement by the United States government, respectively. Additionally, as part of the VuWall ecosystem, VuWall, including its TRx Centralized Management Platform, is SOC 2 compliant, a testament to the company's commitment to top-tier information security practices, policies, and procedures.
Enhancing physical security, especially perimeter intrusion detection (PID) at critical infrastructure sites like airports, data centers, warehouses, and utilities, is increasingly crucial due to growing threats such as theft, protests, sabotage, terrorism, and war. Quanergy 3D LiDAR Solutions In its latest whitepaper, Quanergy 3D LiDAR Solutions Redefining the Physical Security of Critical Infrastructure, global technology intelligence firm ABI Research forecasts the worldwide physical security market for LiDAR sensors will surpass 3 million total installations by 2030, with water infrastructure leading the segment. The yearly revenue opportunity will exceed US$6 billion in 2030. Physical breaches “Physical security, specifically PID, encompasses controlling access for both individuals and vehicles into secured areas, as well as preventing objects from being thrown or passed across perimeter boundaries,” explains Dominique Bonte, Vice President of end markets, at ABI Research. "Moreover, physical breaches often precede cyberattacks, underscoring the importance of intrusion detection in combating cyber threats." 2D technologies lack accuracy and performance Current security solutions relying on cameras and/or radar struggle to effectively detect and track intruders Current security solutions relying on cameras and/or radar struggle to effectively detect and track intruders, and produce numerous false alerts, leading to higher operating costs and alarm fatigue. These legacy two-dimensional (2D) technologies lack accuracy and perform poorly in low light and adverse weather conditions, resulting in missed events, increased liabilities, and a high cost of ownership. 3D LiDAR features According to Bonte, “Three-dimensional (3D) LiDAR offers robust, reliable, and high-precision detection and tracking employing mesh architecture at an overall lower total cost of ownership (TCO), allowing security personnel and critical infrastructure to increase the effectiveness while reducing the cost associated with manned guard services.” The whitepaper, Quanergy 3D LiDAR Solutions Redefining the Physical Security of Critical Infrastructure, explores: A comparison of physical security technologies. Key critical infrastructure markets. LiDAR case studies for physical security segments. Physical Security LiDAR market sizing and forecasts. Quanergy LiDAR solutions for physical security. Reliable, and high-precision detection ABI Research believes that 3D LiDAR solutions will have a transformational impact on the physical security market, redefining how to protect vulnerable critical infrastructure. “The unique characteristics of LiDAR in terms of detection accuracy and reliability, range and field of view, continuous tracking, ease of deployment, and privacy preservation make it the technology of choice for next-generation physical security solutions to protect a wide range of mission-critical assets in the utility, data center, airport, and other critical infrastructure segments,” Bonte concludes.
Compatibility with a range of credential technologies can be a critical factor when selecting access control. As organizations across the world explore a move to mobile keys for access, it is more important than ever. Aperio’s open technology platform has been built on compatibility. Its range of battery-powered access hardware for integration with third-party access control systems can secure almost any opening. Wireless Aperio solutions Customers have a choice of wireless Aperio handles, escutcheons, cylinders, security locks, server rack locks, and new cabinet/cupboard locks. With Aperio, it is straightforward to control all access points digitally. And with the rapid growth of mobile adoption in security, Aperio is extending support for mobile credentials, to keep offering high convenience and security benefits to customers. Extending mobile access options The single most important factor when considering a switch to mobile, according to report data, is convenience Changes in end-user demand are reflected in a survey for the Wireless Access Control Report 2023, which suggests 29% of organizations already use mobile credentials, instead of or alongside RFID cards while another 40% of respondents anticipated deploying them within the next two years. The single most important factor when considering a switch to mobile, according to report data, is convenience. HID Seos® Aperio native mobile access is built on HID Seos®, a next-generation platform with class-leading cryptography, authentication, and privacy protection. Seos Mobile Access supports both NFC and BLE. Unlocking an Aperio device by phone is easy and intuitive: users present their phone to the reader, just like a smart card. They don’t even need to open an app. Aperio has also integrated cutting-edge mobile access credentials from Gallagher and STid in response to the growing demand for mobile solutions. With this, Aperio broadens the range of options available, facilitating seamless integration with mobile devices and enhanced flexibility. High convenience “The open nature of the Aperio development platform removes compatibility worries for OEMs, integrators, and other partners which translates to high convenience for their customers,” says Piet Van Den Bossche, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA. “It is a natural progression for us now to add support for STid and Gallagher mobile credentials, to reflect their growth among our integration partners.” Aperio openness: “No lock-in, only choice” Security managers may gradually roll out mobile access while RFID cards already issued remain valid “Aperio’s approach supports an ecosystem where customers are not constrained by their initial choices,” adds Van Den Bossche. “Aperio users can effortlessly transition to the latest mobile credential technologies without being tied down, ensuring they are always equipped to meet evolving security demands and new challenges.” In addition, to increase flexibility, Aperio locks can handle multiple credential technologies at the same site: Security managers may gradually roll out mobile access while RFID cards already issued remain valid. Credential compatibility Aperio’s credential compatibility has grown in tandem with the platform. Aperio wireless devices now unlock via the widest range of RFID technologies, in both Online and Offline modes. “To continue to make these convenience and security advantages available to the widest possible market, Aperio will continue to be an open platform that supports the growth in mobile credentials,” confirms Van Den Bossche.
ShapeBlue, a pioneer in delivering CloudStack engineering services and support, announces a partnership with proIO, a German Private Cloud Provider empowering SMBs across various industries through its Infrastructure-as-a-Service and Managed Hosting solutions. This collaboration marks a milestone in advancing cloud infrastructure and support for organizations in the region, implementing Apache CloudStack as their IaaS platform. Fully managed IaaS solution Both companies recognize the benefits of having control over cloud infrastructure and having a reliable partner delivering a fully managed IaaS solution. Embracing a managed private cloud environment ensures better cost management enhances security measures, maximizes hardware investments, and ensures flexibility and compliance with regulations. Utilizing CloudStack to orchestrate the IT environment offers companies unparalleled flexibility to tailor their infrastructure to their unique needs while leveraging existing resources effectively. Open-source technology Giles Sirett, CEO of ShapeBlue commented, "With the partnership with proIO we address the needs of SMBs in Germany for a powerful managed cloud. We will focus on the adoption of open-source technology, helping them to control costs and ensure reliability. "ShapeBlue has a global footprint, with customers in 19 countries. Driven by the desire of organizations to repatriate cloud workloads and changes in the market, with proIO we aim to repeat the success that we have in other markets." Innovative solutions proIO and ShapeBlue join forces to help companies in Germany harness the potential of open-source technology proIO and ShapeBlue join forces to help companies in Germany harness the potential of open-source technology backed up by reliable support. "With our expertise and proven offerings, we will develop innovative solutions and deliver optimal results. We are convinced that this partnership will open up further opportunities and that we can achieve even more together," says Swen Brüseke, CEO at proIO. Cloud, network, and storage infrastructure "We look forward to working with ShapeBlue to develop forward-thinking solutions and support our customers in the best possible way." This new partnership allows German companies to benefit from the local presence of proIO, their experience as a CloudStack integrator, and ShapeBlue's 100s of man-years of experience in designing and building complex cloud, network, and storage infrastructure with Apache CloudStack.
TEOCO, the provider of analytics and optimization solutions to over 300 communication service providers (CSPs) worldwide, announces that KPN, a premier provider of communications services in the Netherlands, is utilizing TEOCO's digital airspace management platform, AirborneRF, to support its Drone Connect service, which allows drone operators to connect to KPN's mobile 5G network and select the safest flight route with the best mobile coverage. The ability to launch drone flights quickly and safely, especially during critical emergencies or disasters, is becoming increasingly important. AirborneRF KPN can offer drone operators secure and reliable network connectivity with all the critical data in one place In addition to providing connectivity for control, data exchange, and 3D mobile coverage maps, KPN is leveraging AirborneRF to provide drone operators with population density data to minimize operational risks for drone flights. By leveraging TEOCO's AirborneRF, KPN can offer drone operators secure and reliable network connectivity with all the critical data in one place to answer questions such as: 'Where and when is it safe to fly?' and, 'Who is flying, and why?'." Connectivity, analytics, and monitoring capabilities "To minimize the ground risk, insight into the population density on the flight route is essential," said Han de Glint, Business Development Manager at KPN. "TEOCO's AirborneRF empowers Drone Connect with the connectivity, analytics, and monitoring capabilities essential to ensuring every drone flight is safe, efficient, and controllable from points A to B – especially beyond visual line of sight." Safe, secure, and reliable drone flights "For mobile operators to fully monetize the burgeoning UAV/drone opportunity, they need to be able to offer the aviation industry more than just connectivity services," commented Thomas Neubauer, VP, of Business Development, and Innovation at TEOCO. "AirborneRF provides a bridge between the telco and aviation worlds to ensure safe, secure, and reliable drone flights at scale." Digital Airspace Management platform AirborneRF, TEOCO's Digital Airspace Management platform, ensures drone operators can maintain mobile connectivity for every device within the flight path, which is essential for beyond-visual line-of-sight (BVLOS) drone operations. Bringing together the mobile network operator's radio network with unmanned aerial vehicle (UAV) airspace control, AirborneRF accurately calculates the safe zones for cellular-controlled drones to operate. It delivers this information to Air Traffic Management (ATM) and UAV Traffic Management (UTM) systems in real time. By connecting cellular networks with aviation systems, AirborneRF enables safe BVLOS services at scale.
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town center stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behavior also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorized access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimize this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorized entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise clients on how these trends are evolving and impacting their security and risk management approach. Here’s how we can expect to see them discussed at the show next month: Trend 1: Artificial intelligence is the new industry standard. AI is this year's buzzword. While AI is not new to the industry, this year it has become a standard to operate with AI being adopted or expanded more ubiquitously. Legacy AI-enhanced security offerings that have been years in the making are becoming more advanced and are being integrated into expert analyst teams to leverage the best of both man and machine. Limitations AI augments the data processing ability; however, human-led intelligence is still necessary AI can generate unparalleled levels of data and insights, but it also has its limitations. AI does not have the emotional intelligence that can influence decision-making. For instance, our Crisis24 analyst teams know that every one of the intelligence alerts they provide to leadership may save a life or protect a business. AI augments the data processing ability; however, human-led intelligence is still necessary to effectively elevate knowledge of those threats through an organization to incite action. Trend 2: Predictive analytics powered by AI will transform security operations. Predictive analytics enabled by AI will allow for more precise planning and execution of true emergency management. Those living or operating in conflict zones must be ready to spring into action and predictive analytics can help better evaluate risks, threat levels, and the probability of certain events. When I served in Iraq in 2003, our greatest challenge was operating in an unpredictable environment and navigating the many unknown threats. With these large-scale threats, it was difficult to account for the vast array of variables involved and ensure that all parties were protected. Broad and instant visibility Predictive analytics provides broad and instant visibility into numerous potential outcomes, impacts, and mitigation strategies for a wide variety of threats. When dealing with risks that are constantly evolving and quickly accelerating, the insights from predictive analytics can have a direct impact on risk management, mitigation strategies, and preparedness levels. Predictive analytics can anticipate the ripple effect that threats can have on organizations, their people, and their assets and enable security teams to plan. Trend 3: Risk mitigation is increasingly both global and hyper-local. A company’s workforce is often scattered across the country or the world, working from home or on the go Remote work and a flood of 24/7 data sources have driven demand for timely, accurate, and hyper-local intelligence. Where before an organization may have had a handful of facilities around the world where its employees gathered, now a company’s workforce is often scattered across the country or the world, working from home or on the go. Preventive mitigation steps To keep their people and assets safe, business pioneers need to know what’s happening in all corners of the globe, while also easily accessing details on what is happening at the street corner level. How a business takes care of its people, including anticipating risks and taking preventive mitigation steps as well as responding quickly in the face of threats, can directly affect its reputation. Every company is in the business of safety and security when it comes to looking after its people on a global, national, and increasingly hyper-local scale.
Security beat
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organizations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customized questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorized test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organizations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realize the vision of Matter.
Case studies
As the UAE's economy progressed, its territory became the world's experimental zone for pioneering construction technologies. The continuous rise of the construction industry has introduced a large number of laborers to stations on construction sites. How to systematically manage workers under regulations, while ensuring the rights and interests of both workers and enterprises is the main problem currently faced by NGC on its way forward. The customer Nael General Contracting (NGC), founded in 1998, is one of the UAE's premier construction companies. Its core areas of expertise include the Design and Execution of Turnkey Construction Projects, Steel Structures, Aluminum & Glassworks, Interior Fit-out, Hard & Soft landscapes, MEP infrastructure, and Facilities Management. Based on 25 years of safe working life, NGC currently has more than 9,000 employees and has successfully contracted not limited to 250 projects. “NGC is seeking the best intelligent attendance solution for one of its construction sites with nearly a thousand workers.” To this end, NGC consulted Anviz's long-term partner Xedos. The challenge Workers' attendance management on and off work is bitterly chaotic without intelligent attendance Workers' attendance management on and off work is bitterly chaotic without intelligent attendance equipment. Workers' shifts are unreasonable and shift coordination is formidable. There are even abundant irregularities such as punching in on behalf of others and tampering with attendance data without permission. So laborers take the fairness of wage calculations with a grain of salt. Need for an intelligent and complete attendance solution “At the same time, the human resources department spends at least 10 hours per month sorting out the clock data of nearly a thousand employees to output monthly results reports." "The financial department also demands to settle workers' compensation based on attendance reports. It leads to continuous delays in salary payments. It is urgent to seek an intelligent and complete attendance solution." The solution Simplify attendance while outputting cloud reports FaceDeep 3 & CrossChex Cloud can cover the above needs and submit a satisfactory solution to NGC Based on ensuring the attendance management of nearly a thousand laborers, while also meeting the output of centralized visual reports and reducing labor costs, FaceDeep 3 & CrossChex Cloud can cover the above needs and submit a satisfactory solution to NGC. NGC's site manager said, "Attendance at the construction site is not transparent, and most workers are often worried about whether their salary for the next month will be recorded in their accounts. There has even been chaos in paid attendance, which has brought a lot of trouble to the normal operation of construction." FaceDeep 3, CrossChex Cloud Based on high-precision liveness face detection and dual-camera lenses, FaceDeep 3 can accurately identify workers and complete personal attendance verification under any environmental conditions, preventing the use of fake faces such as videos and pictures to check in. The CrossChex Cloud implements hierarchical management and designs administrator operation logs to record their action lines, effectively eliminating the unhealthy trend of tampering with records for personal gain. Attendance visualization reports Integrate through CrosssChex Cloud and SQL DATABASE to synchronize each employee's attendance records NGC's Finance Minister said, "Every month some workers appeal against errors in attendance records, but there is nothing we can do about the large amount of confusing data records." Integrate through CrosssChex Cloud and SQL DATABASE to synchronize each employee's attendance records, and automatically generate attendance visualization reports. Real-time updates Administrators and employees can make attendance management transparent by viewing reports at any time. The cloud system is equipped with shift and schedule management functions that administrators can adjust in real time according to the construction progress. Workers can apply for make-up attendance to achieve flexible management. Key benefits Convenient and worry-free attendance experience The efficient attendance system ensures a quick clock-in experience and simplifies the attendance process. Cloud visual reports make it easy to calculate workers' salaries. Reduced human resource costs Cloud visual reports make it easy to calculate workers' salaries. For the HR department, there's no longer a need to manually sort out large amounts of attendance data. Client's quote “The person in charge of NGC said, "The attendance plan tailored by Anviz for us has received unanimous praise from all employees." "It reduced more than 85% of the labor costs spent on worker attendance management and saved the company nearly 60,000 dirhams per month."
Installers JTI Brandbeveiliging was contracted to help make safety a number-one priority at a pioneering food manufacturer in The Netherlands. They achieved this by choosing Hochiki Europe’s marketing pioneering fire detection system, Latitude, alongside waterproof devices from the ESP range. This comprehensive solution ensures the highest level of fire protection throughout the facility, giving the food manufacturer peace of mind and allowing them to focus on what they do best: producing delicious food. Kervo Kervo is a specialist in the high-quality cultivation and processing of fruit in the Netherlands. Since 1980 morello cherries have been grown in the Vossen family’s orchards in Roggel, The Netherlands. The family was one of the first growers in the region to use mechanical harvesting in the ’80s, fast forward 43 years later and Kervo currently runs operations across Europe and the UK and is proud of its reputation for offering the finest quality fruit to bakeries and fresh food processors. Fire protection systems Complexities of this project were that during food production significant amounts of steam were generated JTI Brandbeveiliging was founded in 2009 and is trusted by its customers for advice, installations, repairs, and maintenance of fire protection systems across the region. The team, led by Luciën van Eldijk was commissioned in 2022 to design and fit the fire safety system that would be integrated into Kervo's new manufacturing plant in Neer. One of the complexities of this project was that during food production, and particularly during the cleaning processes, significant amounts of steam are generated, thus causing false alarms. Latitude fire safety system Lucien explains how he and the team navigated this issue, “In food production sites like this, the machinery needs to remain clean throughout the entire process. This means there is a lot of steam and water present, which, unfortunately, can trigger false alarms." "We needed to install devices that could negate this issue, Hochiki’s waterproof call points, sounders, and sensors were the perfect solution. They worked seamlessly with the Latitude fire safety system from Hochiki.” Fire detection devices and systems Latitude, which is BOSEC-approved, a requirement for fire detection devices and systems in The Netherlands, has a powerful network-wide cause-and-effect capability. The system can support 5000 entries, with up to 20,000 inputs and 20,000 outputs across the network. Benefits of Latitude The new building at Kervo is a huge facility making the Latitude system the best solution The new building at Kervo is a huge facility, at over 40 meters in height it required over 2.5km of cabling and hundreds of fire detection devices to help make the building secure, making the Latitude system the best solution. “Due to the nature of this project, there have been some technical aspects where we have needed to seek advice, but the team at Hochiki has been very helpful in working with us to create the best solution for our customer." Easy to install with high standards "We choose Hochiki products and systems because they are reliable, they are easy to install and, most importantly, meet the high standards and regulations required by the laws of The Netherlands, we would recommend Hochiki products for this reason.” Hochiki’s analog addressable range (ESP intelligent) together with the Latitude system are EN54 Part 13 certified and with the BOSEC certification also in place, they provide the best complete and compliant fire detection system for businesses across the Belgium region as well as bordering countries such as Luxemburg, the Netherlands, and Germany.
Banking premises require a robust security infrastructure to safeguard sensitive financial information, customer data, and valuable assets. When a pioneering investment bank in Finland needed to enhance the protection of its archive room, it turned to PACOM’s cutting-edge VIGIL CORE security management platform. An archive room A bank’s archive room is a designated location, often in a basement, which is designed for the storage and preservation of critical documents, customer records, historical financial information, legal agreements, and other important paperwork. As a repository for a wide range of sensitive materials, an archive room plays a crucial role in maintaining the integrity of a bank's records. Regulatory requirements Given the sensitive nature of the stored documents, access must be restricted to designated personnel only Banks are subject to stringent regulatory requirements to ensure the security and privacy of customer data, so organizing documents in an archive room allows them to efficiently manage and retrieve information when needed, facilitating internal audits, regulatory compliance checks, and responding to customer inquiries. Given the sensitive nature of the stored documents, access must be restricted to designated personnel only to protect against unauthorized handling or removal. As such, these spaces are typically equipped with advanced security measures. Northern star To mitigate any emerging risks and threats, banks need to employ an ongoing program of security infrastructure upgrades. When a pioneering investment bank in Finland needed to improve the security of an archive room in one of its locations in Helsinki, it asked for recommendations from Securitas Technology – a PACOM value-added reseller for over 25 years. VIGIL CORE When we were asked to suggest ways to maximize the integrity of our client’s archive room, we researched" Mikko Seppänen, product manager at Securitas Technology, takes up the story and explains, "As a world-pioneering provider of integrated security solutions that employs approximately 13,000 people across the globe, we have experience working with a wide range of technologies. We operate extensively within the financial sector, so understand that nothing can be left to chance and only the best will do." "When we were asked to suggest ways to maximize the integrity of our client’s archive room, we researched the best possible option, which we decided was PACOM’s VIGIL CORE integrated security management platform." Reach for the sky Intelligent, user-friendly, and highly cost-effective, VIGIL CORE is a cloud-based software solution that offers the flexibility, scalability, affordability, and functionality demanded by organizations. It has been designed to redefine what’s possible in security integration management, without any legacy restrictions, and can deliver valuable business intelligence, operational insights, and efficiencies. "End users are now able to harness the power of the cloud through VIGIL CORE," comments Brad McMullen, PACOM’s general manager of security products and solutions. Customizable dashboard It can also scale up and down as required and provides existing PACOM users with an opportunity to migrate" "VIGIL CORE is a true game-changer and a great fit for customers with single sites, hundreds of sites, or large campus environments. Its fully customizable dashboard can be accessed via any internet-connected desktop PC or smartphone." "It can also scale up and down as required and provides existing PACOM users with an opportunity to migrate to it quickly and easily." All for one and one for all Limiting access to sensitive areas within the bank is vital and different levels of access can be assigned based on job roles. In archive rooms, access control systems are often integrated with other security technologies. Intrusion detection systems detect unauthorized access or entry attempts, while video surveillance systems are strategically placed to monitor entry points and critical areas, serving both as a deterrent and a means of recording any suspicious activities. Alarm systems can be linked to access control systems to trigger alerts in the event of unauthorized access attempts and configure transactional logs. Features and benefits Our customer needed the system to be up and running very quickly and we were very impressed with how easy it was" Securitas Technology’s Mikko Seppänen states, "This is the first time VIGIL CORE has been installed in Finland, so for us it provided a great opportunity to find out more about its features and benefits. Our customer needed the system to be up and running very quickly and we were very impressed with how easy it was to deploy." "The archive room is quite small, so we integrated the access control and intrusion detection systems on the same panel, and there is the potential to expand the system by adding doors and cameras as required. The integration of security systems is the way forward and it’s clear that VIGIL CORE has great potential across many vertical sectors and organizations of all sizes." Under control The administration of access control systems involves careful management and oversight. With VIGIL CORE system administrators can configure access levels, assign credentials, and regularly review and update security settings helping to ensure that the administrator accounts are always controlled correctly. Automatic software and firmware installations Doing this in a standardized manner takes the burden of managing the cybersecurity of the system To ensure that the bank’s security infrastructure is fully up to date, VIGIL CORE can carry out automatic software and firmware installations to allow it to benefit from the latest security features and enhancements. Doing this in a standardized manner takes the burden of managing the cybersecurity of the system off of the end user while helping to ensure regulatory compliance through built-in operational features and documentation. Securitas Technology can also carry out remote diagnostics, troubleshooting, and maintenance when needed. Statement of account Having been successfully implemented within the customer’s defined timeframe, a bank spokesperson concludes, "A safe and secure archive room is vital for the continuity and stability of a bank." "It not only supports day-to-day operations but also acts as a safeguard against unforeseen events such as legal disputes, regulatory investigations, or audits." Reliability and accountability "We take this incredibly seriously, which is why we trusted Securitas Technology to configure the most appropriate solution for our needs." "We are delighted with the VIGIL CORE integrated security management platform – it reinforces the integrity of the bank and establishes a foundation of reliability and accountability in the eyes of both customers and regulatory authorities."
Metrasens, a provider of advanced detection systems for security and safety applications announced its collaboration with Moore Public Schools (MPS), Oklahoma's fourth-largest public school district. Together, they aim to bolster safety measures across the district by deploying Metrasens Ultra detection systems, ensuring a secure environment for extracurricular events at 35 campus sites and various large venues. Safety and Security Committed to maintaining the highest safety and security standards, MPS consistently evaluates and updates its protocols. The district, known for its proactive approach, embraces new initiatives and technologies to enhance existing security measures. Building on a successful pilot of Metrasens Ultra detectors in the previous academic year, MPS officially integrated them at the start of the 2023-2024 school year. Metrasens detection systems The decision to choose Metrasens was influenced by the unmatched reliability and durability In alignment with their ongoing commitment to safety, several schools within the district have already incorporated Metrasens detection systems. The decision to choose Metrasens was influenced by the unmatched reliability and durability of its detectors, which seamlessly align with the district's overarching safety goals, whether implemented district-wide or at individual campuses. Following a rigorous evaluation process of various detector options, Metrasens stood out with its comprehensive product offerings and exceptional service. The company provided on-location assistance and training, earning high praise from the district. Reliable solutions Dustin Horstkoetter, MPS Safety, and Security Director, expressed his satisfaction, stating, "The reliability and quality of Metrasens solutions are incomparable." "We appreciate the partnership we have with Metrasens and the client care and technical support they can provide a district of our size." State-of-the-art sensor technology Metrasens Ultra utilizes state-of-the-art sensor technology to swiftly and accurately identify potential threats, including concealed weapons. Its unique flexibility for both indoor and outdoor use, coupled with portability that allows easy movement within and between facilities without physical contact, set it apart from competitors. MPS criteria We are thrilled to play an integral part in helping MPS achieve its objective of accurately identifying prohibited threat items" Metrasens Ultra met key MPS criteria, including non-threatening design, portability, flexibility, ease of use, battery power option, weather resistance, zonal indication, and accuracy. "We are thrilled to play an integral part in helping MPS achieve their objective to accurately identify prohibited threat items before entry into their venues," said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. Safe and positive experience "MPS is utilizing the Metrasens Ultra to screen patrons before entering middle school and high school events, including football and basketball games, cheerleading competitions, graduations, and school board meetings." "We remain committed to supporting all of their security initiatives to ensure a safe and positive experience for all participants in these venues."
Seznam, also known as Seznam.cz, is one of the largest internet providers and search engines in Czechia. It operates more than 25 different services under associated brands including email, search, advertising, a contact directory, and an app, with millions of unique visitors per month. To provide these services it operates two data centers; Nagoja, which takes up an area of approximately 1,200 square meters, and Kokura, which has recently been expanded with a new data hall. AI-powered cameras Hanwha Vision cameras replaced existing CCTV infrastructure in Kokura, which had been installed in 2013 and required an upgrade to provide a more seamless, consistent experience for operators. The new data hall, along with Nagoja, uses Hanwha Vision devices including XNF-8010RV, XNO-8080R, and XNO-C9083R cameras, which come with AI video analytics. The choice of Hanwha Vision was based on the successful implementation of its cameras in past Seznam data centers, along with its proven cybersecurity credentials, AI analytics, and the ability to integrate with current infrastructure and be rolled out in phases. Covering a wide, high-risk area Operators need to maintain vigilance over a wide, potentially busy area that contains sensitive data With two data halls in each data center location comprising 200 racks, operators need to maintain vigilance over a wide, potentially busy area that contains sensitive data that demands robust protection. To do so, 121 cameras were installed at Nagoja and 84 in Kokura, where a central control room is situated to manage the entire estate. The camera supports perimeter protection for greater security. The power of video AI analytics Given the potential financial and reputational costs of a data breach, Seznam’s data centers must be fully protected at all times. This means using cyber-resilient video cameras that reduce the risk of a breach as far as possible. Likewise, operational continuity is crucial, so operators need to be able to respond swiftly to any emergencies such as potential fire or flooding. Reduces false alarms AI analytics in the systems are employed to reduce false alarms, allowing operators to respond AI analytics in the systems are employed to reduce false alarms, allowing operators to respond to only those events that require their attention, and reducing fatigue from false alarms caused by wildlife, tree branches moving in the wind, and other events that do not merit action, but cause distraction. Flickering lights from servers in data centers can also trigger false alarms, something that AI cameras can reduce. XNF-8010RV features The XNF-8010RV features loitering detection, people counting, and queue management to support access control in the data centers. It also has audio detection and sound classification to alert operators to shouting, screaming, glass breaking, and more. XNO-C9083R features Operators can monitor inside the data centers plus outside the buildings to monitor people Similarly, the XNO-C9083R features accurate object detection and classification to reduce false alarms, along with effective forensic search to help operators find relevant footage for investigations. Operators can monitor inside the data centers plus outside the buildings to monitor people as they enter and exit the area, and ensure that no unauthorized individuals enter restricted areas. Ensuring no cybersecurity vulnerabilities Data centers can be attractive targets for malicious actors, so reducing potential vulnerabilities in their CCTV infrastructure is vital. Hanwha Vision devices come with several cybersecurity trust marks that highlight the company’s ongoing commitment to securing its cameras and data. This includes National Defense Authorization Act (NDAA) compliance, which means Hanwha Vision meets an extremely high level of security and due diligence put in place for US federal agencies. Certifications and approvals The company has already announced its preparedness for the forthcoming CRA and NIS2 Hanwha Vision is one of the few manufacturers in the video industry that has achieved the UL Cybersecurity Assurance Program (UL CAP) certification for its products. Hanwha Vision’s information security system has also been ISO 27001 certified, while the company has already announced its preparedness for the forthcoming Cyber Resilience Act (CRA) and Network and Information Security Directive 2nd Edition (NIS2). Threats and vulnerabilities monitoring To combat evolving threats, Hanwha Vision has also invested in a unique security response team. The S-CERT team (Security Vulnerability Response Centre) continuously monitors for new threats and vulnerabilities, giving customers peace of mind that their CCTV system is as protected as possible. Finally, as a CVE® Numbering Authority (CNA), Hanwha Vision is authorized to identify, define, and catalog publicly reported cybersecurity vulnerabilities for the benefit of users, partners, and the wider information technology and cybersecurity communities. For Seznam, the resilience of its data centers is not negotiable, as the services it provides across Czechia depend on it. Hanwha Vision is proud to be playing its part in keeping Czechia online.
An IDIS end-to-end retail branch network solution has been adopted across all Konyalı Saat’s 40 store locations in Türkiye as well as at the leading retailer’s warehouse and workshop where high-value watches are repaired, serviced, and calibrated. Konyalı Saat is one of Türkiye’s independent retail chains in the luxury watches and jewelry sector, with 40 stores selling a wide selection of top brand Swiss-made timepieces, silver and gold accessories with precious gems as well as a range of designer sunglasses. Affordable IDIS solution Systems integrator Secom specified the powerful yet affordable IDIS solution to meet Konyalı Saat’s wide-ranging surveillance and business intelligence needs. To ensure that all their retail outlets were being run as optimally and securely as possible, Konyali Saat required centralized video management with point-of-sale (POS) integration and to develop new efficiencies using AI-powered video analytics integrated with their wider retail enterprise resource planning (ERP) software. Improve profitability and product management Complete HD coverage of each store, without blind spots, was efficiently achieved The aim was to boost profitability from strengthened loss prevention as well as improving product management and marketing operations from video data. Complete HD coverage of each store, without blind spots, was efficiently achieved using a single, NDAA-compliant 12MP IDIS Super Fisheye Camera, plus either one or two 2MP IDIS 2.8mm fixed lens dome cameras, depending on each store’s layout. Comprehensive domain awareness The fisheye provides comprehensive domain awareness, providing the same coverage as three or more fixed lens cameras, while the domes located at entrances capture video to support people counting and other analysis functions. These AI capabilities are provided by an IDIS AI Box for Retail (DV-1304), a powerful plug-in video analytics device that can transform IDIS surveillance solutions with functions including people counting, queue management, heat & zone mapping, and occupancy monitoring. Simple and cost-effective POS integration The footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR An IDIS DP-HE1201 HDMI/VGA Encoder enables simple and cost-effective POS integration, with cash register data overlaid on video footage and time synched with all cameras, allowing suspicious activity or sales anomalies to be investigated quickly and easily while providing a time-stamped visual audit trail. The footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR, and the system is operated in each branch using the cost-free IDIS Center VMS, as well as being controlled and managed centrally at Konyalı Saats’ headquarters with IDIS Solution Suite (ISS) Expert. IDIS end-to-end solution The IDIS end-to-end solution is allowing Konyalı Saat to analyze sales turnover and conversion rates with visitor numbers by day, month, and week, making it possible to increase and boost sales by accurately evaluating store performance including marketing campaigns, product management, and staff efficiency more accurately than ever before. Yunus Bürge, Information Technology Manager for Konyalı Saat, reports, “We have been deeply impressed with every aspect of the IDIS solution, from the quality and performance of the fisheye cameras to the added value provided by the AI Retail Box including simple integration of video data with our POS." Tailored solution The project with Konyalı Saat demonstrates that IDIS end-to-end solutions for retail can be tailored" "IDIS technology is perfectly suited to the demands of high-end retail environments.” The chain has recently extended its portfolio with Longines-branded stores, and the owner has ambitious plans to expand further, with four new outlets scheduled to be opened in the next half year and more to follow. Koray Ozyildirim, IDIS Türkiye Country Manager, added, “The project with Konyalı Saat demonstrates IDIS end-to-end solutions for retail can be tailored to meet the needs of stores and retail branch networks of any type and scale." Cost-effective surveillance technology "The IDIS single source model gives retailers a choice of cost-effective surveillance technology to tackle challenges such as shrink and safety." "Combined with integration options and highly accurate, AI-powered video analytics, we are giving retailers the ability to achieve a rapid return on investment and an enhanced customer experience that positively impacts the bottom line.”
Round table discussion
Technology offers a range of tools to bolster security at public events, including before, during, and after. This year, the 2024 Summer Olympics in Paris will draw the attention of the world, requiring the best protection available for the venues, the athletes, and the attendees. Other happenings such as the FIFA World Cup, the Super Bowl, the Tour de France, and the U.S. NBA Finals are momentous events that challenge security and law enforcement personnel to keep them safe. We asked this week’s Expert Panel Roundtable: How is technology contributing to security in the arena of public events?
Edge devices play an important role in the Internet of Things (IoT) by enabling real-time data analysis, faster decision-making, and improved operational efficiency across various industries. In the physical security industry, applying artificial intelligence (AI) capabilities to edge devices expands the possibilities, and edge devices offer complementary functionality to support movement to the cloud. We asked this week’s Expert Panel Roundtable: What are the latest developments for edge devices?
As the new year dawns, it's a good time for the security industry to look ahead to 2024. We asked this week's Expert Panel Roundtable: What will be the biggest surprise for security in the year ahead?
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadGunshot Detection
Download