Safeguard Airports with Professional Surveillance Strength
Infinova is dedicated to providing surveillance and protection for critical infrastructures, such as airports, ports, dams, oil, gas and power plants. The airport solutions are also able to integrate with existing third-party video systems. Airports benefiting from our professional surveillance solutions include: 70 Airports in India 26 Airports in Saudi Arabia 4 Airports in Turkey Kuwait International Airport Barajas Airport Madrid, Spain
World Headquarters:
51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd.
Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India.
Landline and Fax: +91-20-6819-8700, Email: Teamindia@infinova.com Infinova Middle East (Kuwait):
Office # 13, 5th Floor, Deema Tower, Mirqab, Kuwait
Landline and Fax: +965-2247-5678, Email: Sales-ME@infinova.com
MEDIA PARTNER
From the Editor’s Desk
(100 pages including 4 for cover) Volume IV • Issue 4 • November 2019
®
ISO 9001-2015 CERTIFIED
Dear Readers, Greetings from SecurityLink India! The sense of ambiguity and improbability ceases with the endorsement of the Nuclear Power Corporation of India Ltd (NPCIL) that one of their computers was attacked and infected by malware. Although NPCIL has not named the plant – but the mumble that the Kudankulam Nuclear Power Plant (KNPP) was under a malware attack emanated from a social media report. The tweet was posted by a cyber threat intelligence analyst who has also worked with the government and global security teams. At first instance, the authorities negated the news and underscored such infection was just not possible in their premise, but the claim turned untrue. Albeit, the consequences whatsoever are minimal. The victim was only an administrative computer and the virus could not accede to the critical internal network of the plant. Some of the security researchers are said to have suggested the malware as a version of Dtrack, a backdoor trojan developed by the Lazarus Group – a North Korea’s elite hacking unit. In a recent spyware row, WhatsApp has confirmed that various eminent Indian personalities were among those who were globally spied by unnamed entities using an Israeli spyware called Pegasus. Over a hundred Indian journalists, human rights activists, lawyers and senior government officials among over thousand WhatsApp users were targeted across nearly 20 nations of the globe. They were spied for a two-week period in April 2019 before the National General Elections in India. The news has led to a furore over breach of citizens’ privacy, and the stakeholders are in tussle. WhatsApp episode is phasing through the usual conduct of passing the bucks among involved partakers, including the government. But time has long been up for honest, concerted efforts of security and technology experts, and the policymakers to evolve resilient and scalable systems – all by technology, laws and strong execution thereof. KNPP stated that their totally isolated network could not be accessed by any outside network from any part of the globe. Hence there was no question of it being hacked. They emphasized that ‘the critical internal network’ was isolated from the administrative one, and by implication, the Internet. This physical isolation is technically called an ‘air gap.’ However, experts suggest that this security strategy is no longer but quite vulnerable. Ideally, in this age of IoT – nothing is invincible. The Russian antivirus maker Kaspersky analyzed Dtrack and indicated ‘no big deal.’ However, they suggested that the hackers need at least partial control over the internal network to launch an attack. These occurrences authenticate a number of security issues at targets such as weak network security and password policies, lack of traffic monitoring, lackluster laws of the land etc. Technology is indispensable and networked environment is the prime necessity of the time. These paradigms of technology abuses, along with various others raising heads now and then, manifest the expanse and severity of risks and vulnerabilities that the technology users, irrespective of their stature, are subjected to. Modern India is in the era of digitization and digitalization and cyber space is at the core. A robust cyber immunity system is the prerequisite – let us play our role honestly, pledge to contribute our true bit and accomplish a fortified scalable cyberspace. Till we meet next month, stay safe and happy reading! With warm regards,
Santosh Pathak Mob: +91 9968172237
Editor-in-Chief Santosh Pathak Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Divya Wadhwa Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
National Roundup
NOVEMBER 2019
CONTENTS NATIONAL ROUNDUP 16
Musings of the Thought Leader
18
OSAC DS Run 2019
20 2nd Leg of Hikvision Expo 21
Secureye Innovative NVR Kit
22
CP PLUS Augments Make in India
23
New India Manager for Milestone
24
Forces Network Helps Military to Corporate
30
Prama Hikvision Partners with PACC 2019 – Dubai
31
GLOBUS Infocom Participates in IISE 2019
32
TCIEXPRESS Opts for Matrix T&A Solution
34
HID Global at SmartCard Expo 2019
35
nShield HSM Achieves BIS Certification
25
Hikvision at Automation Expo
36
Value Point-Cisco CSEC in Bengaluru
26
Axis’ IR PTZ Network Camera
38
Athenta Offers Infrastructure Platform
28
Videonetics Conferred with NSSCOM Award
39
Prama Hikvision at ReTechCon 2019
29
Gartner Predicts IT Spending of Indian Bank & Securities
40
Printronix ODV-2D Barcode Verification Solution in India
white paper
Trends in Modern Video Surveillance
62
Feature Articles
10
ACS – A time to move with the times
42
Frictionless Future for Face Recognition
80
Business Potential of Network Audio
82
SecurityLink India ■ November 2019
National Roundup
150 SecurityLink India â– November 2019
11
National Roundup
NOVEMBER 2019
CONTENTS Application/ case studies 46
Hikvision – Construction Site Protection
54
47
LonTrend ATEX Secures Oil Refinery in South Asia
Industrial Park Benefits from Advanced False Alarm Solution
55
The City of Bologna Chooses Wisenet
48
2020 Formula 1 Grand Prix with IDIS Video Tech
57
Las Vegas Marijuana Facility Relies on 3xLOGIC
49
Genetec Helps Investigators Close Cases Faster
58
Brussels Metro Glides into the Future with Extreme
50
Chiang Mai Upgrades Security with Bosch Systems
59
Sovereign Safe Controls Access with Matrix
52
Vanderbilt Secures Remote Workplaces
60
53
Delta Barrier Stops Intruder at Naval Air Station
UK Universities Adopts SafeZone Solution
61
Identiv Makes Products More Intelligent
International updates
Product showcase
12
68-79 84-94
SecurityLink India ■ November 2019
National Roundup
57
SecurityLink India â– November 2019
13
Video
National Roundup
Anil Puri, CMD, APS Group
The Musings of an Industry Thought Leader
A thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, and one who has mastered the art of strategic and tactical thinking to the core. He has been using this combination to seed new ideas and to lead them to their implementation on ground. This has been a consistent feature of his career. Here he writes about the information security and significance of inclusion of security ab initio in planning to digitalize the company processes and services.
T
he digital transformation is the
improve speed to market, security’s
greater potential for damage since
fourth industrial revolution and
role is confined to post mortem i.e.,
most of these devices are involved
has resulted into rapid evolution of the
the knock-on impact on risk and se-
in critical business activities. Large
technologies like IoT, AI, Blockchain,
curity. The thrust for giving value to
number of companies are moving
Chatbots, Machine Learning and vir-
the customer takes centre-stage and
most of their data from on-site to
tual reality in all domains of business-
core security functions are left out of
host their servers into cloud environ-
es. The digital transformation (DX)
the orbit. The data breach in security
ment. The technology developers and
is front of mind for many CMDs and
less digitization leaves the companies
hackers are at war with each other to
CEOs but too often security is left be-
more vulnerable.
breakthrough their layer of protec-
hind. DX is all about digitizing process-
The advent of these technologies
tions. AI enabled cyber attack, called
es and services to make the business-
is causing industry as a whole to
a Polymorphic Attack has posed a big
es more agile and ensure operational
re-imagine traditional business mod-
challenge which can morph to avoid
efficiency. DX projects often fail since
els and innovate new ways to lever-
detection by traditional cyber securi-
they involve security at belated stage,
age data for growth. While the digi-
ty solutions.
or not at all. To initiate a project, com-
tal transformation presents a range
Conclusively, digital businesses
panies need to bring together people,
of opportunities to the industry, it
are moving at a faster pace than tra-
processes and technology in planning
also brings huge challenges with it
ditional businesses and traditional
and strategy phase for interface with
– prominent ones are ever evolving
security approaches. Hence, there is a
technologies like AI, data analytics
security needs and roles. Kicking off
need for a wholesome approach to in-
and IoT to ensure that information se-
information age’s digital transforma-
clude security in the mainframe right
curity is also kept into the loop.
tion has presented an infinite poten-
from the very beginning – conceptual
As IT and businesses fast track
tial to hackers in the form of expand-
stage to final implementation will pay
initiatives like Agile and DevOps to
ed attack surface thereby creating
rich dividends.
16
SecurityLink India ■ November 2019
National Roundup
www.capsi.in
I’LL NEVER BE OFF GUARD WHEN I TAKE UP GUARD. There’s one thing that you’ll never catch me doing, that is, letting my guard down. So, when I take up guard, be assured that nothing will distract me.
WE TAKE A STAND WHEN WE STAND SecurityLink India ■ November 2019
17
National Roundup
Diplomatic Security Run 2019 An Initiative of OSAC New Delhi Chapter
T
he Overseas Security Advisory Council (OSAC) New Delhi Chapter, US Embassy has been working towards fostering the public-private partnership between the US government, USA MNCs and local regional stakeholders. In continuation thereof, post a successful corporate social responsibility (CSR) run organised in 2016, the Council of OSAC New Delhi organised a Diplomatic Security (DS) Run on 19 October 2019 as an inclusiveness in diversity initiative at the USA embassy under the guidance of Gregary Levin, Senior Regional Security Officer (SRSO), US Embassy, and his office. This was also in line with the vision of Edgard D. Kagan, Deputy Chief of Mission (DCM), US Embassy to bolster US-India ties with the aim to work together for a better and fitter planet. Additionally this run does complement Indian Prime Minister Narendra Modi’s campaign for a fitter India. The CSR activity involved inviting around a hundred of underprivileged children from grades VI to XII belonging to
18
Today, our Deputy Chief of Mission Edgard Kagan kicked-off the @ OSACState Fun Run at the US Embassy in New Delhi. Congratulations to all participants for taking a healthy step forward and strengthening the #USIndiaDosti Kenneth I. Juster U.S. Ambassador to India partnership - #FitIndiaMovement a small government school based out of a remote village at a place called Jhajjar in Haryana. The school is adopted and supported by the event sponsor Peregrine which is a part of the Tenon Group under the leadership of their MD – Manjit Rajain. The run also had active participation of the faculty members of the Amity International University and their MBA students along with the OSAC members, their families and US officials who joined the DS Run over 3 and 5km formats. The daybreak run route around the diplomatic area surrounding the American Embassy was engulfed in a sea of purple T-shirts. Over 550 participants including the school children outshone everyone in stamina as well as enthusiasm and interacted freely with the SRSO Gregary Levin. The run followed community bonding over a healthy breakfast. The DS Run was a well stitched event hosted by the US Embassy and OSAC Delhi Chapter in partnership with Peregrine to support the mission of fitness and healthy collaboration.
SecurityLink India ■ November 2019
National Roundup
SecurityLink India â– November 2019
19
National Roundup
2nd Leg of Hikvision Expo Organized at Hyderabad, Bengaluru, Coimbatore and Kochi 20 Policemen Honoured with Bravery Awards
P
rama Hikvision successfully organized the second leg of Hikvision Expo in Hyderabad (14 September), Bengaluru (17 September), Coimbatore (19 September) and Kochi (21 September). In this phase, the ‘Bravery Awards’ were presented to 20 policemen at Hyderabad (5 Policemen), Bengaluru (10 Policemen) and Kochi (5 Policemen) for their exemplary services. Ashish P. Dhakan, MD and CEO, Prama Hikvision India Pvt. Ltd., said, “We are happy to honour the policemen in Hyderabad, Bengaluru and Kochi for their exemplary service by presenting the Bravery Awards. We are committed to our vision of making citizen’s security a top priority. The awards are a step forward in inspiring the police professionals to go beyond their call of duty and enable a secure environment for the citizens across the country. The Bravery Awards truly reiterate our vision of pursuing excellence in security technology
implementation in India, and encourage us to further set higher standards in security and surveillance industry through breakthrough solutions.” He further said, “Hikvision’s team of experts presented the best-in-class technologies and product innovations through technical sessions during these Expos. We also unveiled the latest products, applications and innovative solutions including artificial intelligence, AI cloud, big data and IoT. We got overwhelming response to our latest range of IP cameras, PIR cameras, access control products, video door phones, Ezviz cameras, face recognition terminals and swing gates, smart pole, ECS (emergency call switch) etc., at the event.” The Hikvision Expo in Hyderabad was presided by Tarun Joshi, Joint Commissioner of Police, Hyderabad city. In his keynote address Mr. Joshi mentioned that police gets great support from the
Hikvision Expo & Bravery Awards at Bengaluru
20
SecurityLink India ■ November 2019
CCTVs installed at various points in the city to curb crimes. The 5 police personnel of Hyderabad Police who received the award for their exemplary service and bravery on the line of duty are P. Radha Kishan Rao, Deputy Commissioner of Police, Task Force; S. Chaitanya Kumar, Additional Deputy Commissioner of Police, Task Force; Narmadha Chapalamadugu, Additional Deputy Commissioner of Police, (in-charge of SHE teams and Bharosa); L. Raja Venkat Reddy, Inspector of police (IT Cell); and Bhupathi Vikram Deva Raju, P.R.O. – Commissioner of Police, Hyderabad. The Hikvision Expo in Bengaluru was presided by Shashi Kumar, Deputy Commissioner of Police, North Bengaluru. In his brief speech Mr. Kumar recollected how a lady police officer Devika Devi saved the lives of people during floods. He said that after installation of CCTV in Bengaluru city the
National Roundup
crime rate has come down. He appreciated the efforts made by Hikvision in bringing the latest video surveillance and security technologies through the R&D effort. The recipients of ‘Bravery Awards’ at Bengaluru are Prashanth M., Sub-Inspector; Shivaswamy C. B., Sub-Inspector; Vinod Jiragale, Sub-Inspector; Devika Devi, Sub-Inspector; Neminath Thakai, Sub-inspector; Shivamjurthy N. G., Asst. Sub-Inspector of Police; Shivashankara H. K., Head Constable; Ananthraju A, Head Constable; Siddharamanna P., Police Constable; and Purushottama V., Police Constable. The Kochi Hikvision Expo was in-
augurated by Mr. Phillip, Additional Commissioner of Police who praised Hikvision for conducting such an event in Kochi, and thanked them for presenting Bravery Awards in recognition of the exemplary services by the policemen. The Awards were presented to Rahul R. Nair, District Police Chief; Sojan M. J., Additional Superintendent of Police; N. R. Jayraj, Dy. S. P.; P.A. Faisal, Inspector of police, and Subhash Chandran, CPO 12173. The Hikvision Expo at Coimbatore city was also concluded successfully with good response from the security professional community.
Hikvision Expo & Bravery Awards at Hyderabad
Hikvision Expo is organized with the core objective of promoting security technology awareness among the security professionals, citizens and channel partners. As a part of their pan-India initiative, Hikvision Expo at Hyderabad, Bengaluru, Coimbatore and Kochi invited all the key stakeholders of security ecosystem partners. It provided the latest security and surveillance technology updates by experts in special interactive sessions and live demonstrations.
introduces Innovative 4CH LCD NVR Kit You are under CCTV surveillance
S
ecureye, one of the leading brand in the surveillance and security domain launches its new 4CH LCD (1920 x1080p) Wi-Fi security camera system (NVR kit) for both commercial and general (residential) consumers. Keeping in mind the technological evolutions in the industry, the company is innovating and upscaling its series of products – according to the feedbacks and demands of the growing consumers. This 11.6 inch LCD monitor supports 2.0MP HD outdoor/ indoor CCTV cameras. It also comes with massive built-in hard disk which supports maximum storage up to 2TB, which makes it stand out from the others in the market. The key benefit of this NVR kit is that – it can be simply installed by plug and play without hurting or interfering the interior. A ding dong bell which comes with the kit can be installed 25mts away from the system, the LCD NVR becomes active from standby mode as anybody presses the bell. It has an advanced intelligent Humanoid mode which can access any moving object above 3ft height. It turns LED light of the camera automatically on, and the high-quality color video starts getting captured. There is a great shift in security and surveillance space and the technology has evolved manifolds throughout the decades. Manish Agarwal, Director, Secureye said, “We have developed clever ways to keep our house and property secure. Even the cave dweller has primitive ways to keep their dwellings safe and secure – possibly placing a wild ‘pet’ animal near the mouth of the cave. Today, we can choose from a plethora of home security systems that are a far cry from some type of mammoth guarding a cave. “Fueled by the infra growth in both commercial and residential space the security and surveillance market is going to see a lot of traction in the demand for surveillance equipment. The video surveillance market, growing at 10.5% CAGR is already over Rs.5000 cr. in India and I think it’s not going stop right here. In the years to come it will grow manifold and will bring new opportunities in this sector.” SecurityLink India ■ November 2019
21
National Roundup
CP PLUS Augments Make in India Capacity to Heighten Export ●● With state-of-art indigenous Make in India manufacturing facility, CP Plus is looking at India as an export hub for catering to the Middle East, South East Asia & North American markets to set, expand & grow Made in India export business. ●● To create thousands of job opportunities in production unit, components development, PCB making, quality control, electronic system design and manufacturing & R&D set-up.
C
P PLUS intends to boost the export of indigenously made products. The brand has increased the production capacity of its state-of-the-art Make in India manufacturing facility, under the JV company, AIL Dixon Technologies Pvt. Ltd. at Tirupati, Andhra Pradesh, India. With this capacity expansion, CP Plus looks at setting up increased export volume to many fold to the Middle East, South East Asia, and North American markets initially. Under National Policy on Electronics (NPE) 2019, CP PLUS is further enhancing its facilities aiming at exports, with 100% localization. CP PLUS is one amongst the pio-
neers starting domestic CCTV production facility in the country. The investment in the facility will create thousands of job opportunities in various verticals like components development, PCB making, electronic system design and manufacturing, quality control, and logistics. Additionally, the R&D team at
Through this step, we stand with the government’s flagship program ‘Make in India.’ Our products are designed keeping in mind the needs of the businesses. The market for advanced security surveillance systems is growing at a rapid pace, and with this initiative we will be able to cater to the domestic market at large. At CP PLUS, we are constantly evolving to meet the dynamic needs of the businesses and will continue to innovate for our consumers. Our network expansion is consistent to provide better reach and services – Aditya Khemka CEO & MD, CP PLUS India 22
SecurityLink India ■ November 2019
CP PLUS is already working on its copyrights, patent and IPR for indigenous solutions being developed for the Indian market. The manufacturing facility is situated near the Tirupati Airport; spread over 20 acres of land, employing over 2000 individuals. The plant is one of the most modern facilities in this part of the world with an annual manufacturing capacity of over 15 million units. The investment will further give a boost to component level development and related infrastructure around. Yogesh Dutta, Chief Operating Officer, CP PLUS said, CP PLUS is taking a number of steps such as creating new capacities, establishing new capabilities to enjoy the cost advantage, extending the product portfolio, increasing the price spread of product range. The company is further improving product reliability, bringing down production costs,
National Roundup
consolidating the distribution system, strengthening reach, ensuring training across product lines and AMP solutions. Moreover, CP PLUS is constantly upgrading customer service, widening and deepening the brand’s equity and overall streamlining the seamless operations. The company has also contributed to some of the prestigious projects for mass surveillance. In the recently held Kumbh Mela and Allahabad smart city HMS, state-of-theart solutions were installed by CP PLUS that provided live alerts on camera working live and recording.
systems appoints
Ritesh Deokar as New Country Manager for India M
ilestone Systems has appointed Ritesh I am very excited to come to a leading Deokar as the Country Manager of India. The appointment is a strategically important move global company like Milestone Systems, at for the company, adding valuable experience and a time when there is so much happening in expertise which complement Milestone Systems’ the video management and surveillance inambitious expansion plans in the region. dustry in India. There is enormous potenRitesh joins the company from a senior mantial for Milestone Systems’ open platform agement position at Larsen & Toubro Infotech VMS solution and my extensive contacts (LTI), where he was responsible for global alliances. Prior to that, he was employed as national across the IT and security markets here will certainly give us alliance manager at Wipro Limited, and has extensome great scope to forge new alliances, build new solutions sive experience working within the ICT sector in and really take the company forward across the region India. His diverse background in both technology – Ritesh Deokar and security will be of significance to Milestone Country Manager for India, Milestone System Systems’ growth in the region. Jordan Cullis, Director for APAC at Milestone Systems said, “The fact that Ritesh brings a converged security and technology skill set to the company fits perfectly with our needs. Video management has evolved far past the point where it exists purely as a standalone technology, and to fully harness the power of an open VMS platform like Milestone Systems, our leaders need to understand and work with the myriad of technologies that integrate with our solutions.” Ritesh received his MBA from Nagpur University, and is fluent in four languages – Hindi, English, Kannada and Marathi. He will be based in Bengaluru. Milestone Systems has committed to an ambitious growth strategy in the region, backed by a global plan to increase their innovation capacity by 45 percent. SecurityLink India ■ November 2019
23
National Roundup
Forces Network Helps Military Personnel Transition to a Corporate Career
F
orces Network, a professional network of the military veterans in corporate, conducted a full day Military to Corporate (M2C) Transition Workshop at Holiday Inn, Aerocity, New Delhi on 20 October 2019. GR Reddy the Founder of Husys, India’s first publicly listed HR company, gave a wonderful talk on the ‘opportunities for veterans in the MSME sector.’ He had flown in from Hyderabad especially for this session. In a post event interaction he said that he was pleasantly surprised to such an energetic and positive community and looked forward to an enduring association with them. CV Writing is felt to be the weakest link in the job hunt process for the veterans, and therefore, there was a great amount of stress laid on CV writing in this workshop. With their past experience and learning Forces Network trainers have reduced this activity to a system based on a framework created by them. Not only was the framework shared with the participants but the CV makeover of several participants was
demonstrated in the workshop. Nearly two hours were devoted to this activity with the participants made to recreate their CV from scratch using the framework duly assisted by the trainers. In addition, a live mock interview was conducted in front of the participants. The interview panellists, who were practising industry professionals and veterans, shared their feedback which was found to be extremely insightful and valuable by the attendees. Salary negotiation aspects were also covered in detail by an HR professional. Mindset resetting is also an important part of the M2C transition. With that in view a session was devoted to this aspect wherein a clinical Psychologist Sqn Ldr Meena Arora (Retd) conducted a few Neuro Linguistic Programming (NLP) exercises – which were very well received. The seminar was attended by close to 100 people. The participants were excited after the workshop. They felt empowered and more confident, and expressed optimism towards their second career in the civil. Most past participants
Forces Network is an online community of military veteran officers in the corporate which today has grown into a vibrant global community with more than 5000 members worldwide. The Network was founded in 2007. This 11 years old network, with members spread across the globe, firmly believes that veterans have much more to offer to the industry and the society than what the current opportunities being made available to them. There is a reorientation required for the military personnel before they can rejoin the civilian workforce
Col Iqbal Singh (Retd) Founder Forces Network 24
SecurityLink India ■ November 2019
National Roundup
CV Writing exercise in progress
GR Reddy, Founder of Husys addressing the participants
have reported accelerated learning as well as faster realization of their aspirational goals. The workshop concluded with an hourlong mentoring session where selected trainers mentored the ment-
ees in small groups of 4-6 people on a round table. They encouraged the mentees to ask any questions. The mentees found the session to be extremely helpful and cleared a lot of ‘cobwebs’ from their minds.
Showcases
Latest Innovative Products & Solutions in Automation Expo P
rama Hikvision, India’s leading security and surveillance solution provider, participated in the 14th edition of Automation Expo 2019 to showcase its innovative solutions for the fast growing automation sector. The automation show, recently held at Bombay Exhibition Centre, Mumbai, attracted a record number of exhibitors from over two dozen countries. Commenting on the participation, Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd., said, “At the Automation India Expo, we displayed Hikvision’s innovative solutions in the machine vision system category including area scan camera, line scan camera, 3D camera, smart camera, vision box, FA lens, light source and software. These solutions are relevant to industry segments including semiconductor, medical and pharma, auto parts, drinking/ food, electronic connector, printing, solar cells, logistics and 3C products.” The exhibition had on display a vast array of products and innovations from global leaders in the field of industrial automation, now entering the era of Industrial Internet of Things (IIoT). The show was inaugurated in the presence of the Chief Guest – Naushad Forbes, Co-Chairman Forbes Marshall Group, and other dignitaries. The exhibition had the concurrent events like CEO Summit, Industrial Internet of things (IIoT) Conference and Safety Automation Conclave. The four-day event had on display state-of-the-art products and cutting edge technologies from the field of process automation and control systems, factory automation, industrial automation, field instrumentation, smart sensors and controllers, robotics and machine automation, motors and drives, software solutions, bus technologies, wireless technologies, building automation, automation in hydraulics and pneumatics, automation in renewable energy, and safety and security systems. Hikvision booth at the Automation Expo got good response from relevant visitors and delegates. SecurityLink India ■ November 2019
25
National Roundup
Axis’ IR-powered PTZ Network Camera for Optimum Surveillance in Harsh Environments A
xis Communications has introduced the AXIS Q6215-LE PTZ network camera to meet the increasing demand for more heavy-duty PTZ cameras with built-in IR (Infrared) illumination. These PTZ network cameras are ideal for 24/7 open-area surveillance in airports, harbours and highways. Its robust design can withstand the toughest weather conditions including wind speeds up to 245km/h (150mph). AXIS Q6215-LE is a reliable and robust camera, specially designed with high precision pan, tilt and zoom capabilities with longrange IR to cover wide and long-distance surveillance up to 400m (1300ft). Its long-range OptimizedIR enables the cameras to automatically adjust to the camera zoom and recognise and identify targets in poor light or complete darkness. These PTZ cameras are compliant to MIL-STD-810G standard, ensuring reliable operation in extreme and harsh weather conditions and perform in wind, snow and rain. With vandal-resistant IK10-rated casing and IP66/ IP68 ratings, they guarantee a resistant housing to both harsh weather conditions and impacts.
The upgraded edition of our PTZ network camera series will help our customers ensure safety even in the most challenging conditions, whether it’s poor light, weather or extreme terrain. The cameras’ outstanding image quality gives operators the best possible chance of identifying people, objects and vehicles, in any harsh environment – Sudhindra Holla Sales Director, Axis Communications, India and SAARC 26
The flexible design allows it to be mounted facing up or down depending on the needs. It includes an installation plate with sliders/ lever that moves horizontally or vertically to control a variable for safe and easy installation. Furthermore, with the built-in wiper that comes along with the camera, it is easy to get quality images even in snow and rain. This high-end camera series features light sensitive sensors for sharp and clear images. This has built in analytics for intelligent and smart detection which allows customers to monitor multi-site premises with efficient security solutions. Key features include: ●● OptimizedIR 400m (1300ft). ●● ½” sensor for high light sensitivity and dynamic. ●● Compliant with MIL-STD-810G and NEMA TS-2. ●● HDTV 1080p resolution, WDR, Lightfinder and 30x optical zoom. ●● AXIS Guard Suite analytics included. AXIS Q6215-LE features very light-sensitive ½” inch sensor, WDR and Lightfinder for sharp, clear images even when there’s both dark and light areas in the scene. It also offers Axis’ Zipstream technology to save bandwidth and storage by up to 50% – without sacrificing quality. Axis offers intelligent security solutions that enable a smarter, safer world. As the market leader in network video, Axis is driving the industry by continually launching innovative network products based on an open platform – delivering high value to customers through a global partner network. Axis has long-term relationships with partners and provides them with knowledge and ground-breaking network products in existing and new markets.
SecurityLink India ■ November 2019
National Roundup
With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.
Soft Facility Management
Hard Facility Management
Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.
Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.
Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.
www.sisindia.com SecurityLink India ■ November 2019
A 5000 crore Indian multinational company
27
National Roundup
Wins
NASSCOM Technology Excellence Award 2019 V
ideonetics won prestigious NASSCOM Technology Excellence Award 2019 in Artificial Intelligence & Machine Learning Rising Star category. The award was presented at the 6th edition of NASSCOM Annual Technology Conference (NATC) 2019, recently held in Gurgaon. The NASSCOM Technology Award recognizes contributions of organizations and individuals bringing innovative solution, excellence and case studies under the theme of ‘Industrialization of Disruptive Technologies.’
We are thankful to NASSCOM for acknowledging our technology and honoring our innovation with this award. I am immensely proud that our Intelligent Traffic Management Solution of No Helmet and Triple Riding Detection System received various renowned accolades in the country and abroad. After having deployed in various cities, this indigenous solution is being recognized for its capability and scalability to reduce traffic violations, bring traffic discipline, reduce road accidents and manage over traffic in an efficient way. We will continue to invest in R&D to generate Indian Intellectual Properties with a mission to create local solutions for local problems – Dr. Tinku Acharya Fellow IEEE, MD & Founder, Videonetics
Powered by AI & DL platform DeeperLook™, Videonetics intelligent traffic management system (ITMS) comprising ‘no helmet and triple riding detection system’ was adjudged as the Rising Star winner after surpassing rigorous evaluations by industry renowned judging panel. Videonetics ITMS acts as a true decision support system for traffic planners as well as law enforcement agencies for analyzing vehicle movement on roads and bringing traffic discipline and enhancing road safety. The ultra-powerful AI & DL powered ITMS suite encompasses red light violation 28
Avinash Trivedi, VP, Business Development, Videonetics Technology receiving the Award
detection, over speed detection, vehicle moving wrong way, no helmet & triple riding detection, detection of use of cellphone while driving, no seat belt detection, parking violation and much more. Based on Indian deep learning framework, Videonetics solution tracks in real time those two-wheeler riders who are violating traffic laws by ‘not’ wearing helmet and/ or by triple riding on the road. Once the solution detects two-wheeler offenders with vehicle number plate, the system issues e-challan along with proof of incident to their residential address – all in a transparent manner and with the audit trail of all transactions with evidence. The solution aims to bring down road accidents and enforce traffic discipline amongst two-wheeler riders who put their lives to risk. Speaking at the occasion, Debjani Ghosh, President, NASSCOM said, “We were extremely impressed with the quality and quantity of transformative solutions we received from startups for these awards this year. There were several remarkable innovation ideas that will address several business issues we face today and improve the ease of business operations in the industry. Businesses today call for creativity and a creatively capable workforce to deliver a minimum viable product to the user. We congratulate the winners and hope to see many more such innovative solutions in the future.” The two-day action-packed NATC attracted a congregation of more than three hundred delegates, decision makers, stalwarts from government, healthcare, hospitality, critical infrastructure, education and many more.
SecurityLink India ■ November 2019
National Roundup
Gartner Predicts Indian Banking and Securities IT Spending Will Grow 9% in 2020 Analysts to Discuss Latest Industry Trends at Gartner IT Symposium/ Xpo 2019, November 11-14, in Goa, India
B
anking and securities sector in India continues to increase its investments in digital business. Its spending on IT in India will total $11 billion in 2020, an increase of 9.1% from 2019, according to the latest forecast by Gartner, Inc. Banking and securities organizations are investing in emerging digital technologies such as artificial intelligence (AI) and blockchain, not only to create new product offerings but also to respond to evolving customer demands. “As an example, the transition to a cashless society aided by newer digital payment channels is creating opportunities for new digital technology investments in the sector,” said Ali Merji, Senior Research Director at Gartner. Respondents to the 2019 global Gartner CIO Survey identified AI and machine learning as the number one game changing technology at 27% followed by data analytics, including predictive analytics at 20%. “CIOs in this sector continue to adopt digital technologies that will improve existing products and services. Technologies such as biometric authentication, machine learning, chatbots are increasingly preferred by CIOs to deliver an enhanced user experience and enable digitalization of the sector,” added Mr. Merji.
Biometrics and automation boost IT spending
A
ccording to Gartner’s ‘Hype Cycle for Digital Banking Transformation 2019,’ biometric technology will impact up to 20% of banking organizations in the next two to five years. “In India, biometric technology adoption saw a boost after the introduction of Aadhaar, a unique 12-digit identification number that links citizens’ bank accounts to their biometric data and mobile numbers,” continued Mr. Merji. Biometric authentication such as touch ID is a common way of using passwordless authentication and is widely deployed in mobile banking.
“Biometrics eliminates the hassle of remembering passwords and makes the banking experience more secure and seamless. This is one of the key factors that influenced 83% of surveyed global CIOs in the banking and securities sector to indicate that they will continue investing in biometrics with either the same level of investment or by going beyond the current level in the next two years,” said Mr. Merji, “Seven in 10 Indian financial services firms are actively experimenting with biometrics or have already deployed it in their organization in some capacity.” According to the 2019 Gartner CIO survey, technology leaders in banking place a higher priority on legacy modernization than they in other industries. While user-facing digitalization efforts are critical to delivering a complete digital experience to customers, digitalization of internal processes is necessary to support this initiative. Of the total technology investments being made in the Indian banking sector, 23% are for digitalization of internal services. This investment is expected to grow by 9% over the next two years. “One of the critical challenges that troubles Indian banking and securities CIOs is connecting legacy digital systems to modern IT setups without interrupting the flow of data,” concluded Mr. Merji, “In a bank, customer data moves across multiple departments for even the simplest of processes such as opening a new bank account. Automation of these back-office processes can reduce the response time, ensure data continuity and secure data transfers, and at the same time deliver an enhanced user experience.” Additional advice on how to drive business performance will be presented during Gartner IT Symposium/ Xpo 2019, the world’s most important gathering of CIOs and other IT executives. IT executives rely on Gartner IT Symposium/ Xpo to gain insight into how their organizations can use IT to overcome business challenges and improve operational efficiency.
SecurityLink India ■ November 2019
29
National Roundup
Prama Hikvision Partners with PACC 2019 – Dubai Evangelizes Innovative Security Technologies & Solutions
P
rama Hikvision, India’s leading security and surveillance solution provider has showcased their latest innovative security technologies and solutions at the recently held 7th edition of Project heads, Architects & Consultants Conclave (PACC) 2019 in Dubai, organized by Fire and Security Association of India (FSAI). They participated as the presenting as well as awards partner in the event.
and Consultants community to join hands in providing the best-in-class solutions,” commented Ashish P. Dhakan, MD & CEO, Prama Hikvision India, “PACC 2019 turned out to be a perfect platform for Hikvision to showcase innovative technologies and solutions.” There was thought provoking line up of presentations and panel discussions during the 3-day event. At the PACC awards night, Gagan Lamba, Vice President, Non-government Business, Prama Hikvision India Pvt. Ltd. gave the partner’s presentation on Hikvision’s ColorVu technology which was received by all with keen interest. On the next day he opened the sessions with a presentation on the ‘Latest trends in e-surveillance’ which was followed by the panel discussion on ‘Artificial Intelligence for Security Solutions,’ where Ashish Gujarathi, AVP, Non CCTV Products, Prama
Prama Hikvision Partners with PACC 2019 – Dubai
A. L. Narasimhan, Vice President, Strategic Business Alliances, Prama Hikvision India Pvt. Ltd. said, “We are implementing our Make in India roadmap with a long term commitment. Our manufacturing facility is India’s largest facility in terms of production output and technology prowess. We at Hikvision are committed to the ‘Surakshit Bharat’ vision. Our leadership in transformative technologies like AI, deep learning, big data and IoT will add value to our products and solutions. We are glad to partner with PACC 2019, Dubai to propagate our vision.” “Hikvision has partnered with PACC 2019 – Dubai to evangelize the latest innovative security technologies. We are here to share Hikvision’s next generation technology solutions and latest innovative products with the industry leaders and technology experts. Together with FSAI, we at Hikvision strive to promote the adaptation of latest security technologies and solutions based on AI, Deep Learning Big Data and Robotics. In line with FSAI’s motto to make Surakshit Bharat, Hikvision invites Project heads, Architects 30
A.L. Narasimhan, VP, Strategic Business Alliances, Prama Hikvision India receiving the felicitation from Pujya Bramhavihari Swamiji, Akshardham at PACC 2019 – Dubai
Hikvision India Pvt. Ltd. elaborated on Hikvision’s artificial intelligence applications and security solutions. Hikvision also showcased its latest products and solutions at its booth during the PACC event,. Besides Pankaj Dharkar, Chairman, PACC 2019 and International President – FSAI, K.P. Dominic, National
SecurityLink India ■ November 2019
National Roundup
President – FSAI, and other members and office bearers of FSAI, PACC 2019 was graced by various dignitaries including Sanjay Pant, Director and Head, Civil engineering, Bureau of Indian Standards and D. Sivanandhan, Former Commissioner of Police, Mumbai, Director General of Police, Maharashtra who were conferred with the Life Time Achievement Awards. The event was attended by over 600 delegates, which included top bureaucrats, renowned ar-
chitects, consultants, finest technocrats, accomplished fire safety and security professionals across India and other countries. PACC 2019 concluded successfully with insightful discussions on the global security technology trends and best practices. The event also saw and heard the motivational speakers like Pujya Bramhavihari Swamiji, Akshardham, and Jaya Rao on ‘Vedanta Vision.’
GLOBUS Infocom Participates in IISE 2019 Minister of Defence, Rajnath Singh visits Globus Infocom Booth
G
LOBUS Infocom, a ‘Make in India’ brand and one of the most innovatory organizations that provides advanced technological solutions, participated in the 22nd India International Security Expo 2019 held from 3 to 5 October 2019 in Pragati Maidan, New Delhi to showcase their innovative products in the field of security and surveillance.
The Minister said, “India cannot remain dependent on imported weapons for long and we need to align with the country’s plans to become a superpower.” IISE is a business platform offering opportunities for forging partnerships, joint ventures, B2B, and showcase of capabilities, products and services in defence and home
Kiran Dham with Rajnath Singh, Minister of Defence
Rajnath Singh looking at the Globus displays
Rajnath Singh, Minister of Defense, Government of India who visited the expo dropped in the Globus Infocom booth and saw their displays. He discussed with Kiran Dham, CEO – Globus Infcom about the defence and homeland security products displayed and more. Expressing her views, Kiran said, “We are honoured to have hosted Mr. Rajnath Singh at the India International Security Expo, and I am delighted for his gracious presence at the Globus Infocom display in particular. He asked about the surveillance products that we manufacture, and also appreciated the work and high end technology that we are offering in India.”
land security by India as well as foreign companies and much more. Globus Infocom is one of the most trusted organizations with key focus on providing highly advanced, cost-effective and reliable technological solutions in the field of education technology, digital signage and display, and security and surveillance. It’s one of those Make in India brands which have its own highly equipped manufacturing facility. With the widest range of product offerings designed to cater to 21st century requirements, it has got the complete range of products registered on GeM (Government e-Market).
SecurityLink India ■ November 2019
31
National Roundup
TCIEXPRESS opts for Matrix T&A Solution To Increase Productivity and Quick Salary Processing
T
CIEXPRESS is a customer-oriented, multi-technology transport system in the Indian and International markets. It pursues value-based policies to satisfy the aspirations of society, customers, vendors, employees, shareholders and the transport industry. Speed is the essence of all the services of TCIEXPRESS whether through land or air, anywhere in India and the world.
central place was a very tedious task for them. They led to complex computation of salary based on the absent-present report. They required timely and error-free payroll processing to improve overall productivity. Besides, they were also facing challenges over various matters like manual paperwork, lack of productivity and discipline, remote access of all the locations for time-attendance and payment process etc.
Challenges
Solution
CIEXPRESS is actively engaged at 500 locations across India. To manage entire attendance, diverse shifts, and leave policies for the various locations and numerous workers at a
fter a comprehensive discussion, Matrix offered COSEC VYOM for people mobility management for their 3000 employees at 500 different locations. COSEC VYOM is a cloud-based
T
32
A
SecurityLink India ■ November 2019
time-attendance system that addresses solutions to the outlined issues of productivity and efficiency. It provides ubiquitous, cost-effective, secure and on-demand network access. Moreover, Matrix time-attendance solution is integrated with HR1 and HRMS software for easy salary processing and speedy HR process of TCIEXPRESS.
Result ●● ●● ●● ●●
Quick salary processing. Improves productivity. Reduce paperwork. Secure and on-demand network access. ●● Eliminates server cost, infrastructure cost, and maintenance cost.
National Roundup
www.capsi.in
EVEN DURING MY OFF TIME, I’LL BE THERE FOR YOU ANY TIME. Sure, some days I will be off duty. But whenever you need me, I’ll be there for you any time.
WE TAKE A STAND WHEN WE STAND SecurityLink India ■ November 2019
33
National Roundup
HID Global Unveils Latest Solutions at
SmartCard Expo 2019
India to become a major emerging market target for HID Global in 2020
H
ID Global® showcased its latest secured identity solutions at the recently held Smart Cards Expo 2019 in Delhi. HID Global for the first time in India unveiled its latest ID card retransfer printer, HID® FARGO® HDP6600 high definition printer/ encoder with breakthrough speed as well as GreenCircle® certification and the HID FARGO® Connect™, an industry’s first cloud-based solution that simplifies and streamlines the issuance of ID cards as well as credentials. HID Global also featured its OMNIKEY® readers, HID® Lumidigm® V-series fingerprint sensors and modules, iCLASS SE® and HID® Digital Persona single fingerprint modules and readers that help with tracking, meeting room
bookings, monitoring of time-lines and attendance. The company conducted live demonstrations of its identity solutions on all three days of the expo. “India is a very important emerging market for HID Global and events like Smart Cards Expo offer us the perfect opportunity to showcase our latest products. Through such platforms, we can tap into the various market opportunities and continue to expand our market in Asia,” said Lalit Agarwal, Sales Head, South Asia Secure Issuance, HID Global.
●●
●●
Products displayed at the SmartCard Expo 2019
●● Secured card personalization solutions: HID® FARGO® HDP6600 is a
●●
●●
34
SecurityLink India ■ November 2019
high definition printer/ encoder designed to save customers time, money and energy by cutting in half the time it takes to print the first ID card while doubling overall throughput as compared to many alternatives. Powerful cloud printing solution: HID® FARGO® Connect is a revolutionary cloud-based card issuance solution that takes seamless on-boarding and credential issuance to a new level. Contact, contactless & multi-interface readers: OMNIKEY® readers enable strong authentication to computer, network or cloud. These readers can support CCID driver and keyboard wedge mode; and are designed to support contact and contactless cards. Integrating mobility and connectivity: iCLASS SE® allow integrators to design third-party solutions that support mobility via near field communications (NFC) or bluetooth smart, alongside a full range of card technologies. The module’s dual frequency capability allows the simultaneous use of both high and low frequency credentials on the same reader for mixed credential applications. Superior biometric performance: HID® Lumidigm® V-series fingerprint sensors and modules combine convenient as well as reliable biometric authentication with va-
National Roundup
riety of security features including strong liveness detection, data encryption and tamper resistance to provide an exceptional user experience while eliminating fraud and protecting identities. ●● Fast, reliable & flexible finger-
print readers: HID® Digital Persona single fingerprint modules and readers are compact optical or silicon reader that can meet both FIPS 201 PIV and mobile ID FAP 30 standards. Designed to satisfy the high-volume requirements of
large-scale civil ID and commercial authentication applications, these readers are available with a software development kit (SDK) that provides flexible APIs to enable fast integration with a broad range of applications.
nShield HSM achieves BIS Certification nShield Connect XC hardware security module (HSM) receives approval from India’s stringent national standards body
n
Cipher Security, an Entrust Datacard company and provider of trust, integrity and control for business-critical information and applications, announces that its nShield Connect XC hardware security module (HSM) is now certified by the Bureau of Indian Standards (BIS). Organizations in India now can protect their sensitive data, network communications and enterprise infrastructure from cyberattacks with a BIS-approved, high-assurance security foundation. India is one of the countries with the world’s highest HSM usage (54% against the global average of 47%), according to the 2019 Global Encryption Trends Study from the Ponemon Institute, driven by organizations embracing the cloud and new digital initiatives such as the internet of things (IoT), blockchain and digital payments. That number is expected to grow as the country embarks on its Digital India initiative, continues to roll out the Aadhaar biometric ID system, and furthers its smart cities mission. nShield HSMs are hardened, tamper-resistant appliances that perform functions including encryption, digital signing, and cryptographic key generation and protection. With their comprehensive capabilities, nShield HSMs support an extensive range of applications, including certificate authorities and code signing. As the national standards body of India, the BIS sets parameters for ensuring the quality, safety and reliability of products entering the Indian market, and is mandatory for many IT products, including HSMs. By earning BIS certification for nShield Connect XC HSMs, nCipher reaffirms its position as an HSM market leader, committed to helping customers meet compliance needs around the world. Over 1,000 organizations rely on nCipher HSMs, including 5 of the top 10 Fortune 100 companies. “nCipher has long championed best practices and industry standards. Achieving BIS certification demonstrates our commitment to the Indian market and to the highest security standards and compliance requirements,” said Philip Schreiber, Regional Director, Middle East, Africa and South Asia at nCipher Security, “We are pleased that the BIS has certified nCipher’s ability to meet its high cybersecurity standards.” nCipher nShield HSMs are also certified to FIPS-140-2 level 3 – a standard defined by the US National Institute of Standards and Technology and the most widely adopted security benchmark for cryptographic solutions in government and commercial enterprises, and the international Common Criteria EAL4+. SecurityLink India ■ November 2019
35
National Roundup
Value Point in Partnership with Cisco Opens its Cyber Security Experience Centre in Bengaluru ●● Value Point to grow its digital transformation @ 30% with this new initiative and to focus on enterprise, SMBs and Government sectors. ●● With Cisco security solutions at its campus, Value Point reinforces the need for an intelligent proactive strategy for cyber security across enterprises. ●● CSEC will help improve business operations and drive an enhanced customer experience.
V
alue Point Systems – A Digital Transformation Catalyst has recently launched a state-of-the-art Cyber Security Experience Centre (CSEC) powered by Cisco in Bengaluru. The new experience center inaugurated by Sameer Garde, President, Cisco India & SAARC, will be showcasing Cisco solutions and allied managed services that enable Value Point customers to build and manage cyber security platforms specific to their business requirements. CSEC will further highlight simulated real-time scenarios specific to various verticals or customers, and also enable its customers to get both advanced and hands-on understanding of the entire gamut of Cisco’s security solutions. Speaking at the inauguration, R S Shanbhag, Chairman and CEO, Value Point Systems said, “As Value Point is moving ahead at a much quicker pace in partnering and supporting customers to swiftly follow the respective digital roadmaps and adopt latest technologies, we play a key role in helping them build capabilities in cyber securities. To ensure that our customers efficiently address the challenges of today’s and future requirement of digitization, we are leveraging Cisco’s expertise for security 36
solutions and have showcased them at the new CSEC.” Today, with the increasing volume, frequency, complexity, severity and impact of cyber-attacks across networks, applications and endpoints, the cyber security market is growing exponentially across the globe. Organizations are gearing up to adopt best practices to address advanced cyber threats and vulnerabilities. Vishak Raman, Director, Security Business, CISCO – India & SAARC said, “The security portfolio is getting into a platform theory extending across network, cloud and endpoint. There is now a need for strong customer experience to understand the power of this integration which led to the genesis of the Value Point’s Cybersecurity Experience Centre. Simulation of the entire Cisco security portfolio’s live working is showcased and customers appreciate the power of integration where they can see attack detection and remediation.” He added, “Cisco’s cybersecurity business is US$3.4 billion globally and is growing more than 17% as of last year. There has been a 70% conversion from customers with standalone system opting for integrated platform. Secondly ELAs (Enterprise License Agreements) SecurityLink India ■ November 2019
has gone up by 30%. Thirdly, time to detect an attack has reduced significantly, from 10.5 hours to 3.5 hours.” Ashok Prabhu, Chief Executive – Sales, Value Point Systems remarked, “CSEC is unique as it is designed based on industry vertical case studies, enabling customers not only to simulate real-time solutions across verticals and use cases, but also to showcase to their customer’s specific requirements.” CSEC exhibits use cases on network visibility & security, optimal security over digital network, and secured enhanced protection across entities in the enterprise, banking and retail/ e-commerce verticals. Going forward, CSEC, both on-premise and remote, will continue to add verticals and use cases portfolio based on customer feedback. Speaking at the inauguration, Sameer Garde said, “As security threats become more complex and persistent, they pose a serious, ongoing challenge. Value Point’s Security Experience Center showcases how customers can prepare themselves to combat new-age cyber threats. We are excited about this initiative and committed to helping our customers secure their digital businesses.”
National Roundup
SecurityLink India â– November 2019
Media Partner
37
National Roundup
Athenta Technologies offers State-of-the-Art Infrastructure Platform to Improve Customers Profitability
A
thenta Technologies, a leading product company specializing in integrated infrastructure management business is championing to connecting non-IT and IT Infrastructure entities for end to end monitoring, management and control. By the help of Athenta solutions, the companies can now address and keep an immaculate vigil so that the equipment performs as per their expectations and SLA ensuring high-end performance. The company offers state-of-the-art next-generation products for comprehensively and cohesively managing all aspect of the infrastructure – IT, building, industrial controls and energy. It helps optimize operational expenses, enhance customer experience, improve profitability, and reduce your carbon footprint in a cost-efficient manner. Athenta has also developed innovative solutions across every class of infrastructure management – IT and networks, energy and SCADA – based on their ground breaking AES platform that provides a unified environment to manage all classes of infrastructure. It holistically enables effective communication between the disparate subsystems and devices for proactively alerting the operations staff on any performance degradations or change in status. This is done while instantly making them aware of the cause of the degradation so that the equipment or the system could be changed or repaired. 38
The products enable the customers to monitor and manage their infrastructure whether it’s facility, IT compute or operations, in real-time. They have an ‘open framework,’ to integrate with any vendor equipment and devices, or any third-party tools or applications. It has both northbound and southbound gateway integration capabilities. This facility allows the administrator to have seamless data sharing to build a collaborative decision-making system by integrating with any third-party system, existing in the customer premises. Athenta’s solution has an inbuilt device certification mechanism which would allow adding new equipment in the environment, without worrying about its manageability in sync with the other equipment. It also provides web-based consoles, which will headend all the proposed safety and security system. The integration enables viewing of all the systems through icons on the software. Upon selection of each icon, the screen for the respective system appears on the ICMS Workstation. SecurityLink India ■ November 2019
The products have a smart software-embedded hardware which are easy to handle using simple ‘UI,’ also called ‘HawkEYE.’ It monitors and controls various infrastructure elements seamlessly through a single unified framework which can include – servers, networks, communication backbone, applications, databases, storages, wireless, CCTV, transformers, breakers, energy, fire – safety and security, pumps, AFC, DG’s etc. Athenta Appliance provides ‘manager of managers’ view that enables distributed environments to be managed with ease on single platform and on a single Windows.
Key functionalities managed by Athenta
●● Centralized monitoring and reporting of the energy utilities, safety and security equipment. ●● Integrated helpdesk/ trouble ticketing system with the problem and resolution management. ●● Efficient technology management to ensure optimum productivity of resources – cutting edge man and machine interface. ●● To ensure that all safety and security devices are ready to handle any emergency. ●● Complete fault management system with the support of topology view and aid for root cause identifications. ●● An integrated fault and performance management system.
National Roundup
Prama Hikvision Showcases AI Solutions at Retail Technology Conclave 2019
P
rama Hikvision participated in the recently held Retail Technology Conclave (ReTechCon) 2019 in Mumbai to showcase its artificial intelligence solution for retail application based on advance video analytics. They also took part in the conference called ‘Future Focus: Rethinking Retail with RPA, AI & ML’ held during the conclave. The theme for the two-day conclave hosted by the Panel Discussion at ReTechCon 2019 Retailers Association of India (RAI) was ‘Technology-driven leadership – the alleaning and machine leaning algorithm cess in retail business.” gorithm of Success.’ “Hikvision’s AI based smart retail during a panel discussion on ‘Future The latest products and AI based solution equipped with deep learning Focus: Rethinking Retail with RPA, AI solutions showcased included facial recalgorithms were showcased at ReTech- & ML.’ He further explained how RPA, ognition, gender analysis, footfall count, Con 2019. Many Retailers were keen to AI & ML technologies are an extension heat map analysis, SKU analysis, queue know how Prama Hikvision’s research of existing technology and leverage management, VIP greetings on digital and development effort is helping the re- to retailers for coping up on cut throat signage, CCTV integration with POS, tail business operation through retail AI competition where margins are going to packet tracking, invoice reading, integratbased solutions. We got a good response be thinner and customer expectation in- ed solution for CCTV, intrusion and fire, from the retailers community to do proof creasing day by day. With the example loss prevention solution, access control, of concept (PoC) for Hikvision AI prod- of Hikvision’s robotic automation and time & attendance, Hikvision’s consumer uct range. There is a lot of interest in deep AI based solution, he explained how product range, amazon alexa integrated learning technology and business intel- technology can increase the operational ipc range and central monitoring, and ligence functions for retail support in- efficiency and be useful to provide per- command and control system. cluding people-counting, heat mapping, sonalized service to customers. He said, The event was the preferred platqueue detection and face recognition,” “Current trends and technology-driven form for the release of several products said Ashish Dhakan, MD & CEO, Prama leadership can become algorithm of suc- and a report by RAI and ValueFirst titled Hikvision India Pvt. Ltd. ‘Technology driven leadership K. K. Dakhara, Vertiin Retail,’ that helps in uncal Head – Retail, Logistics, derstanding the state of retail Warehouse, Gems & Jeweland supply chain in the Indian lery, Prama Hikvision India marketing context. For Prama Pvt. Ltd., gave insights about Hikvision, Retail Technology futuristic solution on retail Conclave 2019 proved to be a technology based on robotic suitable platform for showcasprocess automation (RPA), aring the cutting-edge retail artiPrama Hikvision India Booth at ReTechCon 2019 tificial intelligence (AI), deep ficial intelligence solutions. SecurityLink India ■ November 2019
39
National Roundup
Printronix Auto ID Announces ODV-2D Barcode Printer/ Verification Solution in India P
rintronix Auto ID, a leading global player in enterprise-grade industrial printing solutions announced its popular ODV-2D printer/ barcode verification solution with three major upgrades.
Combining verification & validation
T
he ODV-2D can verify and validate barcodes as they are printed. For added accuracy, data printed on the label is validated to match the data sent from the host, and the barcode image is verified based on ISO standards. This is the only integrated solution on the market that prints, verifies and validates barcodes. This upgrade comes standard with the new release and can be added at no cost to the existing ODV-2D printers.
New reporting options
P
rintronix has expanded its compatibility with third-party applications to capture ODV grading reports, enabling a full closed-loop barcode printing solution. This option allows companies that already use a third-party application to easily integrate ODV-2D reporting
Field kit
P
rintronix is now offering a field kit that allows companies to transform their existing T8000 printers into an ODV-2D solution. The ODV2D prints labels, validates and verifies the content, over-strikes labels with rejected barcodes and reprints new labels. Additionally, it can provide detailed grading reports for every barcode printed and then be exported to a standard database file. Field kits can be installed on any T8000 (4 inch) printer by an ODV-2D certified partners. 40
into their existing process. However, where the third-party applications are not required, companies can continue to use the Auto ID Data Manager, one of the many applications within Printronix PrintNet Enterprise software suite, to capture detailed reports of every grade and barcode printed. SecurityLink India ■ November 2019
“When we introduced the ODV-2D 18 months ago we immediately captured the attention of the compliance and regulatory markets not only due to the 1D and 2D barcode verification capability, but also because of its ability to seamlessly integrate into production environments,” said Andy Edwards, Director of Product Management, “We will continue to invest in the technology and the latest version adds several enhancements that increase the versatility, expand the application scope, and optimize the installation process.” With the introduction of the integrated ODV-2D, Printronix has eliminated the need for companies to piece together their own solution from separate printers and scanners. Built on the ultra-reliable T8000 printer platform, the ODV-2D offers robust printer performance integrated with advanced barcode verification and validation technology plus a full suite of thermal printer language emulations and features that allow it to integrate easily into any environment. As companies struggle to meet industry requirements for barcode compliance, many businesses are turning to barcode verification solutions to eliminate refused shipments and costly fines, as well as meet regulatory printing requirements. The ODV-2D provides a comprehensive and affordable solution for this market.
National Roundup
www.capsi.in
CLEAN AND GREEN, I’LL STAND FOR MY NATION’S DREAM. You can count on me when it comes to securing your property. But you can also count on me when it comes to keeping every inch of the nation neat and clean.
WE TAKE A STAND WHEN WE STAND SecurityLink India ■ November 2019
41
feature
Access Control Systems Its Time to Move with the Times! Prasad Patil, Director, MIPL & Chairman, SECONA
An access control system (ACS) is an ultra-critical component in the chain of electronic security – however in India, even many large organizations do not give access control the credit that is due. This article enumerates ten must-have features that any modern access control system should possess
W
hile designing security systems, we are especially attracted to projects which consist of access control systems (ACS) – because only the discerning customer considers access control as a ‘security requirement’ rather than a ‘time & attendance’ requirement. In many premises, the convenience of recording attendance is given precedence to the necessity of preventing unauthorized entry at
42
all times. This leads to the continued use of obsolete access control technology, making the entire campus vulnerable to intrusion, albeit unknowingly. Due to the lack of clear understanding of and expectation from an ACS, vendors often make the most of the situation, installing systems that have gaping loopholes. The entry and movement of persons and/ or vehicles in a campus is of the utmost criticality for any security manager and a sound ACS must be the first step towards managing the same. Surveillance cameras may be the most visible element within security systems; however, they are reactive (mostly used after an incident has happened) – whereas an ACS has the ability to prevent that very incident. Since all security systems are now IP or IP based, ACSs have also gravitated towards Internet Protocol. This is a great news for both the security and network administrators; however, it does open up possible vulnerabilities, especially if there is an intersection of the data and security networks. Security managers have to be tuned into the IT security demands of their organizations and have to ensure that their ACS over IP poses no risks of virtual intrusion. Access control is a complex domain using multiple
SecurityLink India ■ November 2019
feature
technologies – cards, readers, controllers, software, and the IT elements. Hence, it is best left to experts – however, here I lay down ten techno-functional parameters that must be considered when one decides to implement or upgrade to, a state-of-the-art ACS. While broadly any ACS can be judged by its adherence to these parameters, there are site-specific conditions that one must look into, to increase the efficacy.
your campus – and hence seamless integration of the visitor management system with the ACS is strongly required. Without intruding into the privacy of the visitor, a visitor management system should be able to clearly define what is expected of the visitor in your campus and what is the protocol when those expectations are not fulfilled. Ultimately, it is the campus!
1. Integration
2. Card vs. biometric
ntegrability with other systems is the first parameter to consider while designing an ACS. The first integration point for any ACS should be with the fire/ smoke detection system. This is mandated by law. Unfortunately, ‘mandated by law’ is not a very strong phrase in India! This has led to tragic accidents in many organizations, retail environments and homes, but the learning is still not evident. Further, organizations do not have a clear standard operative procedure (SOP) in terms of the modalities and eventualities of such integration. Another integration point that can unlock the true potential of security systems is between video surveillance and access control. Though, modern video surveillance systems do have standard integration protocols with ACS (and vice versa) – these protocols must be harnessed to deliver better situational awareness. Many other integration touch points with ACSs are already being practiced – such as the one with T&A and ERP systems (which we will not delve into). However, one element of tight integration to be considered is with visitor management systems. As I never fail to repeat, the visitor management system really manages all the unknowns in
rankly there is no comparison at all – biometric ACSs are more secure, reliable and authentic than mere card based ACSs. However, this is a decision that involves change management and process re-engineering, which at times is difficult to achieve in brown-field projects. If card based ACS is to be used, multi technology smart card readers should be considered. It’s surprising to know that many organizations are still using proximity cards and readers, which have been proven to be eminently hackable. The decision of the card itself is an important one as it literally is the key to your premises. Smart contactless card platforms such as MiFare, DesFIRE and iCLass SE offer significantly higher security and encryption standards.
I
F
3. Card formats
O
rganisations must ensure that they get completely involved in the important job of defining specific access card-bit formats. We have noticed that for the sake of manageability, security managers leave the task of card bit format definition to vendors, without perceiving the risk of vendor lock-in.
4. Information security
S
ince ACSs have now become completely IP based, they have to be essentially treated as IT systems – and all the information security standards that the organization adheres to, have to be satisfied. Access data has to be treated with highest confidentiality standards. ACSs must quickly adopt the IP v6 protocol and use high encryption standards (min 128bit AES). Similarly, the IT elements such as the operating system, databases, processing and storage should all conform to the latest available versions to guarantee better support and security.
SecurityLink India ■ November 2019
43
feature
5. Reporting, alarms & alerts
biometric systems becoming better (especially face recognition), organisations may have to find a way to use them in managing visitor access, without disrupting their existing access control platform.
A
n ACS cannot be treated as a static system – it must have the capability to evolve as per the organisation’s growth. The software becomes critical in this sense, and hence it should have the ability to scale up, to be customized, and to be tuned to the growth requirements. This includes demands for varying report requirements that security managers will have for administrative management. Similarly, workflow based alerts and alarms are now a necessary feature for large campuses with a vertical security hierarchy.
6. Anti-duplication
B
iometric ACSs are the best to negate any chances for false entry. Even biometric ACSs do require de-duplication to ensure complete identification. Card based ACS are prone to counterfeiting and hence, a robust card definition with two factor authentication in case of escalated risk perception will help organisations defeat this threat. Employees must also be sensitized to this threat and card inventory has to be reconciled at all times.
7. Visitor management
W
e have touched upon visitor management earlier – but it deserves a separate mention, because of its importance. Managing visitors, their visit times and patterns, and generating visitors’ white and black lists is an important job in security management. A tight and seamless integration of the visitor management system with ACS will help security managers breathe a bit easy. Also going forward, with
8. Standards
T
here are international standards already in place for ACSs such as IEC 60839 that deals with alarms and electronic access control systems. Other standards that a sound ACS should comply with relate to cyber security and information security (ISO 27001), component safety (UL), and privacy regulations such as GDPR. Specific organisations may have their own business standards that they would like to comply with.
9. Physical barriers
P
hysical barriers – turnstiles, flap or swing barriers, boom barriers, EM locks etc. – are as important as the electronic access control components. When designing an ACS, adequate care has to be ensured in installing physical access barriers that have been rigorously tested and have a good operational life. The fail-safe and fail lock mechanisms must be tested before the barriers are operationalized. Also, when installing EM locks, integration with the fire alarm system must be ensured.
10. Audits
O
nce an ACS is installed, it is useful to conduct periodic audits (at least annually) by undertaking penetration testing – logical and physical – so that the entire system stays true to the principles that it was initially designed. By engaging third party auditors, audits can present an honest scenario which can be utilized to plug loopholes and tighten procedures. In summary, good access control systems are critical security systems and if well designed they can prevent security incidents and provide proactive security intelligence. In tandem with consistent operating procedures, an ACS can be a great ally to the security manager.
44
SecurityLink India ■ November 2019
feature
SecurityLink India â– November 2019
45
Application/ case study
Forward Securities Utilizes PIR-Equipped Cameras to Secure Valuable Building Site Materials (Construction Site Protection)
H
ikvision’s Turbo HD PIR equipped camera range has a dramatic impact on an installer’s business. It allows him to more efficiently monitor and secure construction sites and other valuable locations during vulnerable out of hours’ periods. Paul Hookings, Managing Director of Hampshire based security installation firm Forward Securities had a problem. His company had built a solid reputation for – amongst a variety of other services – securing building sites, notably for the important materials and equipment left overnight and unattended in the site compound. “Building site compounds can include any number of super valuable and enticing materials for potential thieves ranging from diesel, copper, tools and cabling – right down to bricks, breeze blocks, agricultural fuel, road diesel, and even the metal gates,” Hookings explained, “Thousands and thousands of pounds worth of stuff is stored there overnight.” To monitor these compounds for intruders, Forward Securities was using traditional PIRs – passive infrared detectors – to raise an alert when the compound perimeter was breached. “The problem had to do with the PIRs,” Hookings added, “On critical sites like these where there’s a lot of activity during working hours, people are able to move those PIRs in the daytime when they’re off; and as night time comes, they return and rob the place without being picked up by the detectors, and then move the PIR back to where it was kept previously. Now it’s down to the security company,
46
who end up scratching their heads, thinking – why didn’t that go off?” As a result, Hookings was on the lookout for a solution, something which would counter that potential for tampering and provide a more effective deterrent to potential thieves. He noticed that Hikvision had released a new range of Turbo HD PIR cameras. “These are lovely little products,” he added, “When Hikvision brought them out, I binned our separate PIRs. With a PIR camera, during the armed period, if someone moves into its field of view, there’s an alarm, covers it up, it goes into alarm, and if someone moves it into another direction, it goes into alarm. So I’ve binned the products we were using previously and now I exclusively use Hikvision.” The Turbo HD PIR camera range uses advanced video surveillance technologies to improve alarm accuracy and prevent intrusions. Video verification of alarms means a rapid response from a manned guarding service can be achieved. The camera’s built-in PIR detector captures infrared light given off by the human bodies and distinguishes it from other visual ‘noise.’ It can be ‘double knocked’ with Hikvision’s Turbo HD K series DVR’s motion detection to reduce false alarms caused by moving targets without human body IR emission. This way, filtering false alarms reduces storage space and costs, and it also means more efficient post event footage search. The camera also produces a flashing white strobe light that serves as a warning signal to stop intruders. The white light serves as supplemental lighting, enabling the camera to capture clear images of suspects as evidence when the alarm is triggered, even in the extremely dark environments – such as the construction site compounds. This is certainly Hookings’ experience. “When we have an alarm triggered on one of our sites, we basically get a guaranteed guarding response,” Hookings commented,
SecurityLink India ■ November 2019
application/ case study
“Because the combination of PIR detection and video serves as a proof that the assailants are there. It’s a confirmed signal going to the monitoring station, and as a result we always get people apprehended.” The model Forward Securities preferred to use is DS-2CE12H0T-PIRL, a 5MP PIR bullet camera referred to as the ‘PIRL’. They offer 2560x1944 pixel resolution, smart infrared illumination up to 20m, and Hikvision’s own ‘up the coax’ technology, which allows cameras to be controlled over a coaxial cable from the DVR and also to transmit the alarm signal to DVR. They’re also IP67-rated for external use, so they’re tough and suitable for the sorts of environments like construction sites where they’re most needed. As an example of how he uses the Hikvision PIRL cameras, Hookings pointed to the example of one specific construction site currently being protected by Forward Securities. “We’re securing the main compound along with any remote sites,” he said, “We use six PIRL cameras as well as additional 4K Hikvision cameras running analytics and thermal cameras; and they all sit on the same server, recording to a Hikvision Hybrid DVR, with alarms and images sent to our monitoring station.” Other site setups can include an audio warning system, particularly for very high value equipment. “That’s another place we’d use a PIRL,” he continued, “If someone, out of hours, walks up or even climbs the fence of the compound, the monitoring station is alerted by the PIRL camera, and they can immediately broadcast an audio warning, real time and live. That’s transmitted through the Hikvision DVR to an amplifier and speakers. “If the intruders persist despite the warning, we then get a guarding response. It’s not just big construction sites where the Turbo HD PIR cameras are effective, I do use them on other high value projects as well. “Ultimately, the Turbo HD PIRL cameras are incredibly effective. They pick up suspicious activity including thefts and attempted thefts, three to four times a week across all of our sites. That means they’re actively helping to prevent the thefts of materials worth hundreds of thousands, sometimes millions of pounds.” – Submitted by Prama Hikvision India
LonTrend ATEX Housing Successfully Secured Chained Oil Refinery in South Asia C
onstructed with explosion proof AISI 304 material (SS316L optional) and fully complying with ATEX regulations, LonTrend TSAX1730 is an IP68 robust Ex-housing that recently upgraded Bosch NBN-71027 as a compact ATEX camera to carry out severe refinery project in South Asia. Due to harsh environment condition and limited cabling infrastructure, LonTrend customized 25mm holes on joint bracket to facilitate Ex-cables passing through wall bracket to hind in square poles. In South Asia where the subtropical climate is usually hot and humid, TSAX1730 is specially inbuilt with air circulation components powered by PoE system to stabilize camera’s
working capacity. Until now, TSAX1730 has been successfully specified in a series of oil & gas projects worldwide. With large internal usable space of 105x330 (Øx L) mm, TSAX1730 is capable to hold any brand’s box/ bullet camera with zero compatibility issues. Its innovative Hi-PoE design makes installation simple and efficient. Specialized in industrial precision, LonTrend Corporation succeeds its culture and mission. Anticipating and exceeding customers’ expectations, it is leading the way in die-cast security devices with cutting edge innovations, superior performance and the broadest selection.
SecurityLink India ■ November 2019
47
Application/ case study
Famous Netherlands Racing Circuit Lines up for 2020 Formula 1 Grand Prix with Idis Video Tech IDIS Solution Suite video management software puts Circuit Zandvoort in pole position
A
n upgrade of surveillance, using the latest video technology from IDIS, has put Circuit Zandvoort in pole position as host venue for the 2020 Formula 1 Grand Prix in the Netherlands. As well as wider improvements to the track, a top priority at the circuit was a complete overhaul of the video monitoring capability to meet the requirements of Formula 1. For track manager Niek Oude Luttikhuis, a key objective was to rapidly implement a solution that would be
48
much easier than the previous system to use, maintain and adapt in the future. To achieve this, he brought together a team including IDIS – Korea’s largest surveillance manufacturer. Significantly improving security and safety surveillance of the track, their solution will also let the Formula 1 organisers temporarily receive functional authorised access of video data for the duration of the competition. At the heart of Circuit Zandvoort’s new system is IDIS’s server-crunching,
SecurityLink India ■ November 2019
64 channel DS-IR300 NVR technology, pre-loaded with IDIS Solution Suite video management software (VMS). This allows all the track’s existing cameras to be easily integrated and operated alongside the latest IDIS 5MP speed dome PTZs and 12MP bullet cameras. It also delivers impressive new functionality, including ultra-high-definition monitoring capability using IDIS Smart UX Controls. The system now provides real-time image capture of the highest quality, with no lag, ghost-shadowing or stuttering of images, even when cars travelling at high speed are displayed. Images on the racing control room video wall are now crisp and clear, and looking ahead, the IDIS Solution Suite VMS will make it easier to sustain this high standard by allowing cost-efficient, remote firmware updates and system maintenance. Circuit Zandvoort will also now be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS. This protects against video data loss due to a wide range of potential fault conditions such as network instability or power failure.
application/ case study
New Clearance Camera Registry Facilitates It ensures that recordings are automatically updated without the need for engineer call-outs, and with no risk of gaps in recordings while the fault is resolved. The entire upgrade was completed while the original system continued to run in parallel – confired the track manager. This meant there was no interruption to surveillance during implementation, which was vitally important as the track is in almost continuous use. “There is fantastic mutual communication between IDIS and the different suppliers – they think ahead and complement each other,” said Mr. Luttikhuis, “And from the start IDIS demonstrated a deep understanding of the security and operational requirements of our circuit and a passion for motor racing.” With the new system operational as promised, in the control room a rotating team of 10 people work with the IDIS Solution Suite VMS, with minimal training required to use all its features and functions – including easy search and retrieval, and silky-smooth control of the ultra-high-definition (UHD) PTZ cameras for tracking in real-time. Authorisation levels can be set, giving each individual specific user rights, and during the Grand Prix itself the Formula 1 organisers will also be given access to the system. If necessary, this will also include the ability to view and retrieve footage on mobile devices via the IDIS Mobile app – helping the 2020 Formula 1 Grand Prix to run smoothly behind the scenes.
Video Sharing between Businesses & Public Safety Agencies Helps investigators resolve incidents and close cases faster
G
enetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence has recently announced the new camera registry module for Genetec Clearance™, a digital evidence management system that facilitates collaboration between public safety agencies, corporate security departments, businesses, and the public. Video evidence is an invaluable tool to help investigators review events and solve crimes. However, the process of retrieving recorded evidence from surveillance cameras deployed by cities and private businesses located nearby an incident is cumbersome and time-consuming. This can lead to delays in an investigation and increase the risk of evidence being missed. The new camera registry module in Genetec Clearance™ simplifies the video request process and improves collaboration between businesses and public safety agencies. Organizations can share a registry of the cameras they’ve deployed – including surveillance cameras, body cameras, and on-board recorders from different manufacturers – to allow authorized users to rapidly identify cameras of interest and request video to assist in an investigation. The ability for administrators to customize request forms and their required approval workflow also ensures protocols are followed when releasing video to a requesting party. Once a request is approved, encrypted recordings can automatically be sent to an authorized investigation, while also maintaining the chain of evidence. Genetec Clearance supports a variety of video codecs so recipients can easily review recordings from a web browser without having to download and install a separate video player. “The Genetec Clearance camera registry allows organizations to reduce the time to fulfill access requests and share video evidence between stakeholders operating across different systems, departments, and jurisdictions,” said Erick Ceresato, Genetec Product Manager, “The technology allows organizations to maximize the use of their staffing and provides investigators faster access to evidence to help enhance their response, and focus on public safety within their communities.” SecurityLink India ■ November 2019
49
Application/ case study
Chiang Mai City Upgrades Security with Bosch Video Systems Bringing an ancient city into the 21st century
L
ush, tropical forests neighbouring a bustling metropolitan area – this is the lure of Chiang Mai, growing this home up to more than 1.7 million local and international inhabitants. With a rising tourism market and a digital innovator culture, the city’s population and economy have been revitalized.
With this influx, however, came growing pains
A
s the city continued to expand, the existing security system didn’t match the requirements anymore. It didn’t provide coverage to critical areas, and was unreliable in challenging weather conditions (such as heavy rain and
high temperatures). Legal and traffic violations were left unsolved because of the missing evidence. An ancient city built for just a few hundred citizens now had to house hundreds of thousands – as well as the car and foot traffic that followed. The ten cameras per road used to be sufficient – until ten more roads needed to be built. Further pressure was felt as more housing sprung up near the center, and the streets and sidewalks congested further. The Chiang Mai Municipality knew an overhaul was needed.
Reliable security with clear images
T
he existing camera and surveillance systems did not offer adequate cover to monitor the streets, and Chiang
50
SecurityLink India ■ November 2019
application/ case study
Reclaiming confidence
T
he overall effect of the city surveillance project is wide-reaching. The camera performance has been critical in monitoring the city even in the most challenging weather. Accurate data is now available for each safety zone, allowing for on-going improvements to roadways and infrastructure across the municipality. The police is now able to investigate much more effectively in case of crimes or traffic violations, due to clear images and intelligent video system analytics that can provide surveillance footage Mai Municipality hoped for a reliable, innovative security system that would address these challenges as well as easily integrate with the existing infrastructure. Bosch recommended a multi-phase roll out of security products across Chiang Mai. Together with Northern Systems Corporation Co., Ltd, a surveillance system was designed specifically for the unique requirements of the city. Over 400 5-megapixel-resolution cameras were installed at strategic locations, particularly in high foot and road traffic areas and high-risk road junctions. These cameras returned crystal clear images back to a central CCTV controller lab in all weather conditions, from heavy rain to extreme heat. The reliability of the system means ongoing maintenance costs are minimal.
ď ˝ We needed cameras that could capture clear images, such as license plates, even in bad weather or low light conditions. Together with Bosch, we designed an entire city surveillance system that met all of our precise requirements ď ž
Yunyong Buranapim Managing Director, Northern Systems Corporation Co., Ltd. at any time with high quality images that are able to detect faces or license plates. The new surveillance network now detects accidents and determines the severity of each case so the appropriate emergency service is quickly dispatched. Through intelligent traffic monitoring, responders can view in real-time if a road is congested, allowing for immediate re-routing of emergency services to shorten response time. Chiang Mai now offers both residents and tourists a greater peace of mind when living, working and travelling throughout the city. The technology of instant camera surveillance provides a modern solution to the all-too-familiar problems experienced by this historical region of the world.
SecurityLink India â– November 2019
51
Application/ case study
Securing Remote Workplaces
Increasing Connectivity with Innovative Technology
T
he most common vertical markets that immediately come to mind when security is thought about are the areas such as retail, education, hospitality and banking. However there are also less common, more complicated environments that demand just as much attention as remote workplaces. The more conventional facilities such as stores, schools and banks, typically possess robust resources on site to operate their security systems. But what happens when an organization needs to secure a facility or group of people in an offshore or rural location? Remote workplaces present unique challenges when it comes to implementing and maintaining a security solution, but today’s innovative technology can help.
Remote monitoring
A
nother benefit of the cloud is the ability to monitor activity and alarms from any location and at any time. This is particularly paramount for workplaces that are difficult or take a significant amount of time to access. In the event of an incident, security personnel can be alerted immediately via their smartphone, facilitating a quick and efficient response. Security solutions that specialize in remote monitoring make it easy for security personnel in rural areas to save time and money while ensuring the safety of people within the facility.
The cloud
O
ne of the most beneficial features of the cloud is that it enables users to stay connected at all times, which is especially important for remote workplaces where constant communication is necessary but takes place between great distances. And because these entities have a tendency to lack a large IT department, the cloud is ideal as it allows security teams to shift the maintenance and storage of data to an integrator. For example, at a small, rural healthcare facility where security technology is limited, security personnel can ensure both facility protection and patient data privacy through the use of cloud-based services.
52
Access control and intrusion systems
G
one are the days where physically securing a building requires personnel on site to manually lock the doors. The latest intelligent access control and intrusion technology that leverages the cloud and remote monitoring makes security simple for remote workplaces. Vanderbilt’s ACT365, for example, enables remote site managers complete control to control access and view video from any location and centrally report any vulnerabilities or updates. Vanderbilt’s SPC Connect, designed for installers to monitor, manage and maintain SPC panels remotely from any location using internet access, allows installers to offer a support service for clients without the need to physically visit the site. The increasing security threats that organizations face on a daily basis demand that comprehensive solutions are
SecurityLink India ■ November 2019
application/ case study
in place to identify risks before it’s too late – and this goes for facilities of all kinds. Remote workplaces face a unique challenge in that they can be tricky to access, but the good news is that the cloud has opened the door to new possibilities for these locations. By connecting access control and intrusion systems to offshore or rural environments, users can take advantage of remote monitoring and enhanced communication, which leads to improved safety and overall operations.
Delta Barrier Stops Yet Another Intruder at Naval Air Station – Corpus Christi 8 months later, delta MP5000 portable barrier does its job again
O
n Monday, October 7, 2019 at approximately 7am, a Delta MP5000 portable barrier stopped a stolen Dodge Ram pick-up truck at an entrance gate of the Naval Air Station – Corpus Christi. The stolen car was chased by the local police onto the base. At that point, the Air Station announced that an unauthorized person was on base and the facility immediately would go under lockdown with all gates secured to all traffic. Having taken flight after the truck was stopped by the barrier, the intruder was quickly apprehended within the hour and taken into custody by the Bureau of Alcohol, Tobacco, Firearms and Explosives. “This is the second attempted intrusion into the Naval Air Station – Corpus Christi in eight months,” explained Greg Hamm, Vice President of Sales and Marketing, Delta, “On February 14, a Delta MP5000 portable barrier stopped a stolen Ford Edge crossover SUV at the north gate. The trespasser had driven across the base to escape but crashed into the Delta unit and erupted into flames. The driver was shot and killed.” Delta’s totally selfcontained MP5000 mobile deployable vehicle crash barriers now carry an ASTM rating as high as M50, able to stop and disable a 15,000lb (66.7kN) G.V.W. vehicle moving at 50mph (80.4kph). They tow into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. Once the event is over, procedures are reversed and the barriers are towed away. SecurityLink India ■ November 2019
53
Application/ case study
Industrial Park Benefits from Revolutionary False Alarm Solution ust one MxPro addressable fire panel and Advanced’s leading false alarm management solution, AlarmCalm, has been used to protect every unit in a UK business park from false alarms and improve fire protection. Rawmec Industrial Park is home to nearly 100 businesses, with light industrial spaces from 2,480 to 7,000sqft. The new system was installed following a recent fire in one of the manufacturing units, after which it
J
AlarmCalm is available as standard on Advanced’s MxPro 5 multi-protocol panels, and delivers unprecedented control of verification times and investigation delays by dividing site up into virtual false alarm building areas that can be points, rooms, floors or whole buildings. The optional AlarmCalm Button allows trained occupants to verify if they believe a local fire signal is a false alarm, helping to radically reduce false alarm incidents.
was decreed that a new site-wide fire alarm system was required. Installers CRE8 Electrical Solutions approached IGPA Services Limited who designed, supplied and commissioned a system that included a single Advanced MxPro 5 panel in the main reception, with an AlarmCalm Button intelligent loop device in each unit, allowing occupants to delay a full alert when an erroneous incident occurs.
Lambros Nicolaou, Design Manager/ G.M for IGPA Services Limited, explained, “There are several units where false alarms are likely, including a vehicle repairers and other manufacturing facilities. Following the recent fire, the insurers and fire services told the park owners that a single, integrated system was required. As a long-time Advanced partner, MxPro panels were the obvious choice for us as they offer the
54
SecurityLink India ■ November 2019
quality and reliability needed for a light industrial environment, but the budget wouldn’t stretch to a networked panel in each unit, so we needed to provide a solution suitable for the building layout and business practices. “After further consideration we concluded that using a single-loop MxPro 5 system, with an AlarmCalm Button in each unit will provide a cost-effective solution that offers peace of mind to all tenants and their employees, while also fulfilling the stipulated requirements.” The fire system is programmed using a set of cause and effects so that activation of a single detector within a unit will only trigger the sounders in that specific area (alrm zone). If the alert is genuine, the occupants can simply evacuate and allow the full alert to go ahead (the added bonus of activating a local manual call point would also initiate a full evacuation); but if it is false or unwanted (i.e., caused by steam or car exhaust fumes), each unit has 60 seconds in which to press the AlarmCalm Button and avoid a site wide evacuation alert. If the cause of a confirmed false alarm is taking time to clear, a further two minute window can be activated by utilising the AlarmCalm feature, but if more than one detector is triggered at any point the system automatically goes to full alert. Amanda Hope, UK Business Development Manager for Advanced commented, “While AlarmCalm can work on any MxPro 5-based system, the AlarmCalm Button was originally de-
application/ case study
veloped with residential buildings, such as hospitals or hotels, in mind. This system meets the requirements of Rawmec Industrial Park by using the AlarmCalm Button in an innovative new way. “Using the single-panel MxPro 5 system, each factory unit is programmed as an individual building area with its own false alarm management strategy. The detectors and panels can do much of the work on their own, using cause and effect programming, while the optional AlarmCalm Button provides further peace of mind to the occupants of each unit and across the site.” MxPro 5 is the fire industry’s leading multiprotocol panel, offering high performance fire detection and alarm control across multi-panel networks
and multiple sites. Approved to EN54 2, 4 and 13, MxPro 5 panels can be used in single loop, single panel format or easily configured into high speed, 200-panel networks covering huge areas. Advanced’s legendary ease of installation and configuration make MxPro customisable to almost any application. Harriet Sullivan, spokesperson for Kechto Holdings Ltd, Owners of Raw-
mec Industrial Park commented, “We’ve been very impressed with the solution devised by IGPA Services Limited which also supplied and commissioned the system manufactured by Advanced. The MxPro panel is both reliable and intuitive to operate, while the use of the AlarmCalm Button in the units was a highly innovative solution to the requirement for a cost-effective system to cover the whole site.”
The City of Bologna Chooses Wisenet T
he city of Bologna has chosen Wisenet video surveillance cameras to help it create a smart traffic management system. Bologna is the seventh most populous city in Italy. It is at the centre of a metropolitan area of approximately one million people with a diverse range of travelling requirements within a very large area. The City of Bologna has always invested in traffic control and monitoring systems with the aim to make travel easier and faster for its citizens. An example of this is a centralised traffic light management system which has been in oper-
ation since 2013 and has helped reduce travel times within the urban area.
The challenge
T
he City of Bologna wanted to invest in a video surveillance solution which would allow the monitoring of 12 vehicle access gates to the city in order to provide authorities with reliable real-time information about urban mobility. The purpose was to provide a tool to allow authorities to take strategic planning measures and optimally redistribute the traffic load on the road network. SecurityLink India ■ November 2019
Wisenet solutions
A
fter extensive research, which included the evaluation of a wide range of possible solutions, a decision was made to procure a total of 89 Wisenet cameras manufactured by Hanwha Techwin. The implemented solution consists of cameras dedicated to vehicle counting and classification, and ANPR cameras which have been installed on strategic gates. The cameras monitor both directions of travel to allow local authorities to study the most important and strategic vehicle access flows to the city. 55
Application/ case study
This is made possible thanks to the latest generation of Wisenet cameras. By integrating high image quality and advanced video algorithms, Wisenet ‘intelligent’ cameras are able to enhance the value of video surveillance by supporting mobility and security in Smart Cities.
erators detect illegally parked vehicles and other traffic infringements. Effective with all European numberplate formats, the application has more than a 95% recognition accuracy in whatever may be the environmental conditions, even when vehicles are moving at speeds of up to 150km/h.
the Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins for different applications such as numberplate recognition, vehicle counting/ classification and real time automatic incident detection. Completing the camera line-up are 41 Wisenet SNP-L6233RH 2 megapixel 23x IR PTZ dome cameras which have been carefully located at major road junctions throughout the city, in order to allow control room operators to zoom in to see close up detail of any incidents.
Success
“
24 of the cameras installed are Wisenet XNO-6120R/ TD bullet cameras equipped with Traffic Data, an edge based application developed in cooperation with Sprinx Technologies which facilitates the collection of statistical data about vehicle flow. By tracking the vehicles moving in a camera field of view, the application is able to provide information on vehicle counts, classification and average speed. 24 of the other cameras installed are Wisenet XNO-6120R/ FNPs. These feature roadway licence plate recognition application which is able to help the local authority’s control room op56
The Wisenet XNO-6120R is a 2 megapixel bullet camera which is able to capture high definition images with the help of a 12x optical zoom, digital image stabilisation with built-in Gyro sensor, a defog feature and built-in IR illumination. Part of the Wisenet X camera series, the XNO-6120R features the world’s best wide dynamic range (WDR), which performs at up to 150dB to produce clear images from scenes that contain a challenging mix of bright and dark areas and normally result in overexposed or underexposed images. The processing power of the Wisenet 5 chipset incorporated into SecurityLink India ■ November 2019
We are delighted with how easy it has been to successfully integrate the Wisenet cameras with our existing video management platform and our other supervision monitoring systems,” said Alberto Nuzzo, Head of Office ‘Digital Infrastructure and Telecommunications,’ at Comune di Bologna, when commenting on the success of the traffic management solution, “The data captured by the traffic data and ANPR applications running onboard the cameras, is allowing us to far better manage the existing levels of traffic, whilst also helping us capture and store valuable data which we will be able to analyse to assist us to plan for the future. “Our control room operators have been particularly impressed with the exceptional clarity of the images captured by the cameras and the data analytics capabilities of the system, which are enabling them to accurately visually verify what may be occurring and quickly take appropriate action.”
application/ case study
Las Vegas Marijuana Facility Relies on 3xLOGIC infinias Access Control H
arris Tec, the integration partner of 3xLOGIC has reported the successful installation of a 3xLOGIC infinias access control system for their customer – a Las Vegas based marijuana facility. Harris Tec is a relatively new company and is helmed by Justin Harris, who has been in the security industry for several years. Harris said, “Our customer does both local cultivation of marijuana plants, as well marijuana production, which means marijuana by-products. Cultivation and production are in two separate parts of the facility and require two separate licenses.” On November 8, 2016, Nevada voters approved Question 2, which legalizes, regulates, and taxes recreational marijuana throughout the state, and allows adults age 21 or older to possess up to one ounce of marijuana and grow up to
six plants beginning on January 1, 2017. Marijuana is largely a cash business and with high-value inventory also on premise, security is of utmost concern for such an entity. The facility is approximately 30,000 square feet in size, and the infinias system manages access for eight doors and an inventory cage. Except for one exterior door, all other managed doors are on the interior. “I’ve been installing infinias for about five years, and I love the system,” commented Harris, “I like the system’s flexibility, we have it programmed to create a man trap at the main entrance, only one door can be opened at a time. We also can do lock down with the system automatically halting all ingress and egress. “My staff initially aren’t experts in all things access control and they man-
SecurityLink India ■ November 2019
age this system very well, they’re able to leverage all the system’s capabilities. By closely managing the interior doors, we are making sure the 40+ employees are going only where they are explicitly approved to go. “With infinias, my customer has real peace of mind. It’s not practical to give out keys to the facility, so we have to implement electronic access control. And in this business, there is a good amount of turnover, so it’s essential we are able to program badges both on and off immediately.” The end user’s employees are organized into several different groups, each with different access privileges in terms of day and time and location. Harris Tec is the Managed Services Provider (MSP) for the end user. They perform day-to-day system management, troubleshoot any issues, make all changes to schedules and groups, and turn cards on and off. System-generated reports are used for trouble-shooting and on-site security staff manage doors with an app installed on a tablet. “When I’m asked if the system can do this or do that, I tell my employees, ‘Never say no,’ because this system can do virtually anything. You just have to use it and quickly you’ll understand the tremendous flexibility and capabilities you have,” concluded Harris. 57
Application/ case study
Brussels Metro Glides into the Future with
Extreme Networks’ Automated Solutions Urban transit company deploys automated solutions to improve traveler experience; network capacity to increase by an estimated 33%
T
he Brussels Metro is nearly a 24x7x365 operation, running over one million metro, tram and bus journeys every day for commuters, visitors and residents, and continues to grow. With operability reaching its peak, the Brussels Intercommunal Transport Company (STIB) deployed autonomous network solutions from Extreme Networks, Inc. to unlock new efficiencies and increase network capacity by 33%, and ultimately better serve its passengers. To deliver on STIB’s vision – the ‘Mission Critical Network’ – Extreme Networks designed a converged IP network infrastructure based on Extreme Elements™, including Extreme Fabric Connect™ technology, Extreme Management Center™ software, and Extreme Analytics™. Today, STIB has automated
control of Brussels Metro traffic via a converged IP network, allowing for real-time monitoring of rail conditions, extended passenger services and reduced network downtime. Specific new capabilities include:
Real automated control of network traffic
E
xtreme Management Center software provides a path to real-time automated control of the network, endto-end. By utilising automation to offload routine tasks traditionally carried out manually, STIB is empowered to unlock efficiencies in the organisation’s day-to-day operations, increasing current and future capacity across the Brussels Metro environment.
Extensive IP-based video surveillance network
N
early 15,000 high-definition, IPbased video surveillance cameras are now supported by the network, keeping passengers and staff on the transit system safe and secure. Making use of Extreme’s Fabric Connect network virtualisation technology, STIB now has the flexibility to quickly and easily provision additional services where needed for optimal efficiency.
Manual & automated management of the transit system
I
ntegrating manual and automated management of the transit system was key to achieving increased passenger capacity. Optimising system availability, incorporating system and service resilience, and enhancing network visibility enable STIB to maintain critical human oversight and minimise the potential for human error. With a sub-second failover of links and/ or associated switching systems, Extreme Fabric Connect also gives Brussels Metro a far more robust and resilient network than competitive alternatives.
Unrivalled networking simplicity
B
y eliminating traditional PIM layered protocol stacks and replacing them with a simplified ISIS
58
SecurityLink India ■ November 2019
application/ case study
routing/ IGMP snooping combination, Extreme Fabric Connect Multicast is simple to implement and operate, less error prone and fast to converge when adverse network conditions occur. With it, STIB benefits from the optimum blend of network reliability, efficiency and ease of use. Throughout the entire process of installation, implementation and testing, Extreme worked in close partnership with ProData Systems to ensure that the solution put in place would meet specific requirements of their business today, and position STIB advantageously for the challenges and initiatives of tomorrow. John Morrison, SVP EMEA, Extreme Networks said, “A flexible, resilient and self-driving network is the foundation upon which the smart city of the future will be built on. We have worked with Brussels Metro to put a network in place that doesn’t just help resolve its current challenges by driving efficiencies and increasing capacity, but it also lays the groundwork for the metro system to meet the demands of the smart city of the future.” Pierre-André Rulmont, VP, Information Systems, STIB said, “The metro system in Brussels is the lifeblood of the city. Without it, public life would grind to a standstill. We needed a new mission critical network solution that would help us identify new efficiencies and automate manual processes. In Extreme Networks, we found a trusted and reliable partner that has helped us turn our vision of a smart, automated and efficient metro network into a reality.”
Sovereign Safe Controls Access to their Safety Deposit Vault through Efficient Matrix Security Solutions
S
overeign Safe provides deposit facilities that truly push the global standards of the safe deposit industry. With the very latest modular high compression steel vaults constructed and installed by specialist manufacturers, state-of-theart biometric access with complete audit trail from electronic alarmed lockers, Sovereign stands unrivalled as a leader amongst any high security facility anywhere in the world. No high street bank nor any safe deposit centre can match their credentials and the extraordinary security levels they have achieved.
Challenges
P
eople across the country have been targeted for their valuables, not only on the streets but also in their homes. Challenges were to offer a complete peace of mind by delivering highest-level of security and access permission through various levels of security check (e.g., card and biometric palm vein reader).
Solution
M
atrix solved these challenges by providing COSEC PANEL LITE, VEGA, PVR, PATH series, and ARC DC100P. Matrix access control solution helps boost security along with barriers and door controllers. Offered solution is designed to address security concerns in a professional and systematic method without compromising hospitality and productivity. It allows enrolling visitor’s fingerprint/ palm vein reader/ RFID card to provide the visitor access to restricted area as per below criteria: ●● 2-person rule: This is enforced by requiring the presence of at least two authorized persons. ●● Route based access: This allows users to access the authorised route only. ●● Anti-pass back: This restricts entry to a secured area second time without first leaving it. SecurityLink India ■ November 2019
59
Application/ case study
New Wave of UK Universities Adopts SafeZone Solution SafeZone solution seen as must-have security technology to attract students
A
new wave of UK universities is adopting CriticalArc’s SafeZone® service for improved campus security, including the University of Greenwich, University of South Wales, University of East Anglia, University of Manchester and University of Central Lancashire. With more than 25% of universities now using SafeZone across the UK, it has grown from being an innovative technology deployed by pioneering institutions to a mainstream must-have solution for the higher education sector. SafeZone addresses key challenges for universities by enabling students and staff to quickly and easily reach their campus safety and security teams, and by allowing first responders to respond to calls for assistance up to 50% faster. It improves the safety, security and
60
well being of students and staff, on campus and off, and raises security team preparedness for a full range of events they may face, including major incidents. SafeZone enhances student satisfaction as well as student well being and is now helping universities to succeed globally as they work to attract and retain students with safer and more welcoming learning environments. Through its advanced command and control software, SafeZone OmniGuard enhances team efficiency, with real-time situational awareness making it easier for command teams to see and coordinate resources to address incident hotspots. Safezone also supports heatmapping to enable patrol pattern optimization and improves workplace health and safety, serving as a powerful lone worker solution.
SecurityLink India ■ November 2019
Announcing the latest wave of adoptions, CriticalArc confirms that it is also expanding its team with the appointment of two new customer success managers. They will work closely with users to spread best practice, provide support, and help deliver maximum benefits from SafeZone. Sean Edge takes on this important role for CriticalArc in the UK while Karl Palma will be working with customers in Australia – confirmed Darren Chalmers-Stevens, Managing Director EMEA and APAC for CriticalArc. “With the number of SafeZone users now expanding rapidly, we are investing not only in developing the technology and its capabilities but in delivering and sustaining high level customer support for our growing network of users,” he said. In tandem with its success in the higher education sector, SafeZone is also being adopted increasingly in other key areas including implementations in critical infrastructure, transportation, utilities, government and healthcare, with rapidly developing markets in the US, Australia and globally.
application/ case study
Identiv Makes Products More Intelligent Allows Consumers to Engage, Track and Authenticate in IoT Identiv and Les Bouchages Delage expand partnership and connect consumers to the IoT with a simple tap of customized NFC-enabled wine and spirit bottle closures
I
dentiv, Inc. expanded its partnership with Les Bouchages Delage to deliver Internet of Things (IoT) ready solutions for near field communication (NFC) connected bottles in the wine and spirit industry. Identiv and Les Bouchages Delage originally partnered while collaborating on an intelligent NFC bottle cap for a luxury cognac brand. Now, the two companies are expanding their partnership by equipping a wide variety of Les Bouchages Delage cap designs with Identiv’s NFC technology. While partnering on the luxury cognac project, Identiv and Les Bouchages Delage incorporated a contactless NFC tag into the cork stopper of all decanters. By tapping their mobile device to the cork, consumers are able to register their purchase and become a member of a private club providing exclusive content, unique experiences, and personalized services. The expanded partnership between the two companies will now apply the same intelligent technology to a greater selection of Les Bouchages Delage bottle caps. Identiv has developed a custom NFC tag design that fulfils a variety of unique bottle cap requirements, including high-performance in complex metal environments, maximum durability and readability by both Apple® iOS and Android™ mobile devices at a small tag size, and 100% tested, secured, encoded, and locked variable data.
As an expert in closure design and production, Les Bouchages Delage has provided the most reliable industrial production process for tag embedding, ensuring maximum radio frequency identification (RFID) performance and luxury-brand quality control. “Forty billion devices will be connected to the IoT by 2020,” said Stephane Ardiley, Identiv Director of Product Management, “Identiv’s expanded partnership with Les Bouchages Delage meets the increasing demands of consumers in this NFC-enabled world; people expect to connect to products in new ways, and through this partnership, we’re strengthening our commitment to consumer engagement, asset tracking, and authentication in the IoT.” SecurityLink India ■ November 2019
“We saw a tremendous response to the intelligent corks in the luxury cognac project,” said Christian Delage, Les Bouchages Delage CEO, “Les Bouchages Delage is expanding its partnership with Identiv to apply this same intelligent technology to our complete line of customizable bottle caps to meet the increasing consumer demand for IoT-connected products. Identiv’s tag designs meet each unique requirement in the wine and spirits industry and the team shares our vision for truly trustworthy product authentication.” Identiv’s complete portfolio of NFC-enabled solutions features a catalog of transponders compatible with NFC Forum, created for contactless transactions and connecting electronic devices with a simple tap-and-go model. 61
white paper
Trends in
Modern Video Surveillance Anand Chakravarti Area Vice President – MEA and APAC, Pivot3
Current Practices, Priorities & Purchase Drivers
V
ideo surveillance is a fact of modern day life and an integral part of most security operations. In developed areas, video surveillance seems so ubiquitous that it can almost be surprising when there is no video record that relates to an event of interest.
From the first use of closed caption video – Germany capturing the firing of V-2 rockets during World War II – to today’s mobile, tiny drone cameras, the steady and staggering march of technology has seen the use and purpose of video surveillance changing over the years. What started as live monitoring evolved as systems, and storage solutions has evolved to be as much, if not more, about investigations where captured footage was analyzed for clues or proof. The potential of artificial intelligence enhances both live-monitoring and investigative purposes of video surveillance, and the market for video surveillance equipment continues its steep slope upward. Technology research firm IHS Markit estimated 10 million surveillance cameras were shipped in 2006. The number of new cameras shipped topped 100 million in 2016 and was more than 130 million in 2018. In this environment, Security Management magazine, together with Pivot3, a leading provider of intelligent infrastructure solutions for video surveillance, surveyed the security sector to gain an understanding of the current practice and trends in video surveillance.
KEY FINDINGS The primary reason organizations record surveillance video is to deter crime, with 84 percent citing this as a purpose for video recording. Operational monitoring (73%) and forensic investigation (65%) were also cited by most respondents, with improving customer service, at 26 percent, lagging far behind. Respondents to the survey were equally split, half saying video surveillance downtime had a major impact, and half saying it had only a minor impact. However, digging into those numbers, those who know the most about how video is used in an organization tell a different story. More than 90 percent of end users who are involved in the purchasing of video surveillance equipment say that downtime has a major impact on their organizations. Sixty-five percent of respondents reported that one of their top priorities for video surveillance in the next three months was to improve performance, with 65% also reporting that they were looking to upgrade their cameras. Of those who knew how their organization stored and managed video data, just over a quarter reported using enterprise storage (27%). More than two-thirds reported using network video recorders (67%). About half of organizations reported storing 100 terabytes or less of video data, and 10 percent reported storing more than 10 times that amount, or more than a petabyte of video data. Nearly 60 percent of organizations report that they are not currently using or considering cloud storage solutions for video data, with security of the data being the top concern (46%).
62
SecurityLink India ■ November 2019
dent evidence, which could fall under ideo surveillance, with improving ry cited often was compliance with curity professionals as a reason. ondents chose “other” can be seen
Improve Customer Experience
Purpose for recording surveillance video
tegories. For example, a few cited and operational eterring crime, forensic investigation sey, senior monitoring director, corporate security were all cited heavily as reasons to record ething similar, which could fall under video surveillance, with improving customer service not previously worked in security for seen by most security as a reason. Many of the dent evidence, whichprofessionals could fall under when respondents chose ‘other’ can be seen e was areasons tool given primarily for detering ry citedas often was compliance with For examspecialized cases of the broader categories. have a ple, number of cameras that are or something a few cited safeguarding their employees similar, which could fall under deterring crime; others citng in theed main doors, in high-traffic post-incident evidence, which could fall under forensic
D
65%
Forensic Investigation
Deter CrimeOther
Warehouse
White paper
26%
11%
89%
“We have a number of cameras that are designed to capMonitoring ture individuals coming in the main doors, in high-traffic 0 20 40 83% 60 80 areas, and some high-value target areas such as data closInvestigation 73% ets. With the exception of guard staff monitoring video of parking areas, there’s not a lot of active monitoring. Video is Customer Exp. used to investigate a 32% wide variety of claims from accidents to theft to access areas. If something happens, you go back to Other 7%Warehouse the video and it helps to fill out the story of what happened,” commented Steve. 0 20 40 60 80 100 Deter Crime
89%
Another category cited often was compliance Healthcare as suchinvestigation. as data closets. With the Monitoring 83% with standards or regulations. sey, senior director, corporate security deo of parking areas, there’s not a lot Investigation 73%82% Deter Crime previouslyForworked in security for Purpose Do You Record Surveillance Video? investigate aWhat wide variety of claims Customer Exp. 32% Monitoring 82% For a What Do You Record Surveillance Video? e was toolPurpose primarily for detering Deter Crime 84% s. If something happens, you go back Other 7% Investigation 70% have a number of cameras that are Operational Monitoring 73% ere Deter Crime 84% story of what happened.” 0 20 40 60 80 100 Customer Exp. 49% ng Forensicdoors, Investigation in high-traffic g in the main 65% Operational Monitoring Customer Experience Healthcare Other as suchImprove as data closets.26% With the 73% 10% en services company Cargill, has Other 11%which Forensic Investigation 65% 0 20 40 60 80 100 deo of parking areas, there’s not a lot Deter Crime d 82% world, video is increasingly used for 0 20 40 60 80 100 nder Improve Customera Experience investigate wide variety 26%of claims C-Suite Monitoring 82% Global under Asset Security Manager Joel At the large agricultural products and services compas. If something Other happens, you go back 11% Investigation 70% throughout ny Deter Cargill, which has hundreds of locations a post-survey interview, Steve Lindsey, Senior Diwith Crime f physicalInsecurity and operations. 94% the Warehouse world, video is increasingly used for operational monitoring rector, Corporate Security at the University of Phoenix who story of what happened.” Customer Exp. 0 20 40 60 80 100 49% according to Global Asset Security Manager Joel Martin. He previously worked in security for Walmart, noted that video Monitoring p an algorithm where the camera will 88% 89% said, “We’re seeing a convergence of physical security and surveillance was a tool primarily for deterring crime and foOther 10%we’re working to82% low in a certain area,83% and Investigation curitysafety operations. For example, develop an algorensic vest investigation. services company Cargill, which has 73% rithm where the camera will detect if someone is80 not wearing 0 20 40 60 100 udspeaker that will alert the person Customer Exp. 53% 32% world, video is increasingly used for ng Warehouse he area.” Other 7% 6% C-Suite are Global Asset Security Manager Joel 0 20 40 60 80 100 ffic Deter Crime 0 20 40 60 80 100 89% Deter Crime f physical security and operations. 94% Healthcare e cited for recording video surveillance Monitoring 83% MonitoringSecurity Manager/Director88% paan will lot algorithm where the camera 82% mographics, deterring crime, 73% Investigation ms low safety vest in a certain area, and Investigation 82% 82% Deter Crime 89% back g remained the top reasons across 70% Customer Exp. udspeaker that will 32% alert the person Customer Exp. 53% 72% Monitoring otals to the overall results.49% In a few he area.” Other 7%10% Other 6% Investigation 69% mproving customer service rose h has 0 0 20 20 40 80100 100 40 60 60 80 0 20 40 60 80 100 Customer Exp. 23% dsponders for (53%) as well as those in the C-Suite cited surveillance oel for recording video Healthcare SecurityLink India ■ November 2019 63 Security Manager/Director Other 10% rtainment (51%) sectors. ns. 94% mographics, deterring crime, Deter Crime Monitoring
Investigation
Customer Exp. Other
Deter Crime Monitoring
Investigation
Customer Exp. Other
Deter Crime
100
10%
Other
white paper
0
20
40
60
80
100
C-Suite
a yellow safety vest in a certain area, and once detected it sends a signal to a loudspeaker that will alert the person that Deter Crime 94% a safety vest is required while in the area.” When cross-tabulating the purposes cited for recordMonitoring 88% ing video surveillance with organizational and individual demographics – deterring crime, forensics and operational Investigation 82% monitoring remained the top reasons across all segments – at remarkably the overall results. In a few Customer Exp. similar totals to53% segments, the percentage which cited improving customer service rose 50 percent – including C-suite responders Otherabove 6% (53%) as well as those in the healthcare (49%), and sports 0 20 sectors. 40 60 80 100 and entertainment (51%)
The Univeristy of Phoenix’s Lindsey says: “It’s kind of Murphy’s La happen when the cameras were down. So you have to be really v
potential legal issues, as well. “Once deployed there is the expect they in need it suggests negligence on your part.”for more lance certain plants that if the cameras are down
than two hours we have to shut the plant down.” One director of security at a large Texassaid, health The Univeristy of Phoenix’s Lindsey “It’ssystem a kindwith thous ofis Murphy’s Law. If you’re trying“Once to investigate something, considered mission critical. a week we check every came it’s bound to happen when the cameras were down. So ayou replaced. And if it’s down, we have to shroud it. It’s constant iss have to be really vigilant in minimizing your downtime.” He some older systems in some buildings, some of them still running also noted there are potential legal issues, as well. “Once replace cameras, soexpectation we wait forthat failures stick NVRs into them deployed, there is the they and are operational. Failure to repair them when they need it suggests negligence on your part,” he added.
Of End Users Who Say Video Downtime Has a Major Impact
Security Manager/Director
92%
89%
Deter Crime
Are Involved in Video Purchases
72%
Monitoring
69%
Investigation
23%
Customer Exp.
10%
Other
0
20
40
60
80
100
8%
Are Not Involved in Video Purchases
The importance of video to the organization
A
s the purpose and use of video expand beyond original intents, the number of cameras an organization employs has exploded. A single building may have dozens or hundreds of cameras. Inevitably, there are times when cameras go down for technical or mechanical reasons. This downtime has an effect on an organization’s ability to do things like conduct thorough investigations or monitor operations. Respondents to the survey were equally split – half saying video surveillance downtime had a major impact, and half saying it had only a minor impact. However, digging into those numbers, those who know the most about how video is used in an organization tell a different story. More than 90 percent of end users who are involved in the purchasing of video surveillance equipment said that downtime has a major impact on their organizations. “Cameras being down can be very serious,” said Cargill’s Martin, “We have so many operations tied to video surveil64
Page 5
One director of security at a large Texas health system with thousands of cameras noted that having operational cameras is considered mission critical. “Once a week we check every camera. If it’s down, we put a ticket on it to get it repaired or replaced. If it’s down, we have to shroud it. It’s a constant issue. We were an early adopter of camera systems, so we have some older systems in some buildings, some of them still running on DVRs. It can be hard to get doctors’ offices to pay to replace cameras, so we wait for failures and stick NVRs into them when they do.”
Video surveillance priorities
S
urvey respondents were asked to select up to three top video surveillance priorities for the next three months from a variety of choices. ‘Improving performance’ was the
SecurityLink India ■ November 2019
White paper
ties
eo ty that
fact, six nt
g ,” s
es
s,
What are your top video surveillance priorities for three months?
Storing a Massive Amount of Data 65% 41% Storing a Massive Amount of Data Even compressed video 38%files are storage hogs. The
Improving Performance Increasing Ease of Use Accessing Data From Any Device
price of memory storage has and continues to drop,
Enhancing Playback Quality
37%
to thecompressed point that even in the of big data, is Even video filesworld are storage hogs.itThe Lowering Costs 30% rarely of a concern. Forand surveillance video, price ofmuch memory storage has continues to drop, Eliminating 29% Downtime however, it is still a significant factor to consider. to the point that even in the world of big data, it isIt’s Managing at Scale
24%number of bytes it consumes, it’s not just the sheer rarely much of a concern. For surveillance video, Other able to 10% being access it quickly. however, it is still a significant factor to consider. It’s
What are your top video surveillance 0 the10 30 of bytes 40 it consumes, 50 60 it’s70 not just sheer number priorities for 20 three months?
Of those who knew how they stored and managed being able to access it quickly. Improving video, two-thirds that theyof used network nt only selection that was areported top-three choice more than half 65% Performance video recorders (NVRs), just under half (48%) use said of the – in fact, nearly two-thirds (65%) Increasing Ease respondents e. Of those who knew how they stored and managed 41% of Use it was adigital top priority. There were six and other video recorders (DVRs), justchoices, over a and remany Accessing Data video, two-thirds reported that they used network Over the next 12 months, are you looking to upgrade From sponses Any Device ranged from 38% a low of 24 percent for ‘managing at (27%) of reported using enterprise storage ce any quarter components your video surveillance systems? video recorders (NVRs), just under half (48%) use Enhancing scale’ to a high of 41 percent for ‘increasing ease of use.’ Of Playback Quality (SAN or NAS). 37% digital video recorders (DVRs), and just over a
or
om
g at a mart ga
cally
s argill ion
upgrade priorities, many of them said they were replacing their entire video surveillance systems with new ones. A few noted that they were seeking to incorporate more artificial intelligence capabilities. Indeed, analytical capabilities are the exciting new horizon for security directors in charge of the video surveillance system.How “WhatLong I sawDo at the ASIS show in September You Typically is that an operatorRetain can be looking at a video of a suspect, Your Video? identify the suspect, and the system is smart enough to How Long Do You Typically know if the suspect is walking, running or driving a car, 6% Less than 15 Days Your Video? and to know whereRetain the suspect is heading and automatically queue up the next video when the suspect appears in it,” 27% addedMore Lindsey. than 6% Less than 15 Days “As60aDays global company, data privacy has to be on every80 body’s mind, 27% especially if you’re operating in the EU,” MarMore than tin added referencing the European Union’s General Data 60 Days 32% reProtection Regulation, “It has some specific guidelines 15 - 30 Days lated to CCTV. You have to be able to tell people why you’re using it. You have to really understand your camera views. If 32% you can’t explain why they are necessary, you can15be- 30liable, Days and you have to be able to provide access to the data that is collected if someone requests it.”
the nearly 50 respondents who chose ‘other,’ several men30% quarteror (27%) reportedcameras, using enterprise storage tioned adding upgrading which was also what Eliminating The vast majority of organizations save their videos 29% DowntimeCameras (SAN or NAS). many respondents had in mind when answering65% ‘improving Managing at for longer24% than 15 days, with just how long split performance.’ Scale Video Management 47% fairly between 15 to 30 days, 31 totheir 60todays, Overall, when asked they were looking upgrade Systems (VMS) evenly majority ofiforganizations save videos Other The vast 10% cameras, (65%) reported that they and longertwo-thirds than1560days, days. As42% for amount of were. Storage fornearly longer than with justthe how long split 10 20 30 they40intended 50 to60 70 80 Almost0video half (47%) said that upgrade data, almost a quarter thantheir fairly evenly between 15 to 30(24%) days,store 31 toless 60 days, video management system and 42 percent said they intended None of the10 Above terabytes. Almost one-third store 11 to 21% and longer than 60 days. As noted for (32%) thethat amount to upgrade storage. Of those who they of had other
Lowering Costs
100 terabytes whilea10 percent storestore more than 1 video data, almost quarter (24%) less than 6% Other petabyte, withAlmost the rest falling between the 11 two. 10 terabytes. one-third (32%) store to Not Over the surprisingly, next 012 months, are you looking to 50 upgrade of20 firm is30an indicator of how 10size 40 60much 100 terabytes while 10 percent store more than 1 70 any components of your video surveillance systems?
video storage uses: nearly petabyte, withan theorganization rest falling between the half two.(48%) Not of those whosize keep a petabyte of video surprisingly, of more firm isthan an indicator of how much storage come an from organizations with more than video storage organization uses: nearly 65% half (48%) Cameras 100,000 of those employees. who keep more than a petabyte of video Video
You Management 47% Systems (VMS) storage come from organizations with more than o really 100,000 employees. Storage 42% are vide None of the Above
6% 0
10
20
30
40
50
60
70
Storing a massive amount of data
E
ven compressed 36% video files are storage hogs. The price 31 - storage 60 Days has and continues to drop to the of memory point that even in the world of big data, it is rarely much of a concern. For surveillance video, however, it is still a significant factor to consider. It’s not just the sheer number of bytes it consumes but what it’s being able to access quickly. How are you currently storing and
80
managing your video data? How are you currently storing and managing your video data?
67%
eo rk Vid Netwo (NVR) der Recor
48%
ideo igoitrakl V VR) NeDtw N D ( drdeersr RReeccoor raegoe id iseitaSltoV RS) rig AV EnterpD Nerosr(N D Ad Rec(oSr orage rise St ther Enterp N orONAS) (SA
21%
Other
36%
31 - 60 Days
48%
27% 6% 27% 0
80
67%
Other
Page 7 SecurityLink India ■ November 2019
0
10
20
30
40
50
60
70
80
10
20
30
40
50
60
65 70
80
6%
d Attitudes of Cloud Storage white paper
59%) reported that they not use and not video, Of those who knewdo how they stored anddo managed
two-thirds reportedfor that they video used network video recorders tigate using the cloud their storage (NVRs), just under half (48%) use digital video recorders oose why(DVRs), they did not have an interest in and just over a quarter (27%) reported using enterprise storagetopped (SAN or NAS). ecurity concerns” the list by a wide
Do You Use or are You Investigating the Cloud for Video Data Storage? 12% Currently Use
The vast majority of organizations save their videos
nt. Approximately one-quarter of respondents for longer than 15 days, with just how long split fairly ther choices: costand longer evenly bandwidth between 15 to concerns 30 days, 31 (28%), to 60 days,
unt of Data
than 60 days. not know enough about using the cloud (25%), concerns (24%). How Long Do You Typically Retain Your Video? facility security director, the move to the
Lessand than 15 Days oon enough. “I’m hoping to see 6% more more ’s the way27% things are going. I’ve got guys in the More than h screwdrivers. 60 Days I have to have a team just to erent servers. It’s all too constant and cloud iate a lot of that pressure.” 32%
36%
31 - 60 Days
29%
Investigating
59%
Not at this Time
As for the amount of video data, almost a quarter (24%) store less than10 terabytes. Almost one-third (32%) store 11 15 - 30 Days to100 terabytes while 10 percent store more than 1 petabyte, with the rest falling between the two. Not surprisingly, size of the firm is an indicator of how or much video storage an orFor those not using investigating ganization uses – nearly half (48%)why of those who keep more cloud storage, not? than a petabyte of video storage come from organizations more than100,000 employees. Security with Concerns
46%
We have so many opera-
Use and attitudes of cloud storage Bandwidth ost respondents (59%) reported that they do not use Concerns
M
28%
and do not have plans to investigate using the cloud
25%
Cost for Concerns their video storage needs. Asked to choose why they did
not have an interest in using the cloud, ‘security concerns’ tions tied to video surveillance Don’t Know topped the list by a wide margin 25%at 46 percent. ApproxiHow are you currently storing and Enough About It mately one-quarter of respondents chose each of the other in managing certain plants that if the your video data? choices – bandwidth concerns (28%), cost concerns (25%), Management 24% Concerns cameras are down for more do not know enough about using the cloud (25%), and management concerns (24%). than two hours we have to shutEase to Implement 6%facility security director, the move For the large health Concernns to the cloud can’t come soon enough. “I’m hoping to see eo 67% rk Vid the plant down Other more and more11% cloud storage. That’s the way things are goNetwo (NVR) er
d Recor
Joel Martin 48% Global Asset Security Manager, 27% Cargills
l Video Digita VR) s der (D Recor rage ise Sto S) r p r e t En r NA (SAN o
66 her Ot
6%
ing. I’ve got guys in the field on ladders with screwdrivers. I have to have a team just to maintain all the different serv0 10 20 30 40 ers. It’s all too constant and cloud storage would alleviate a lot of that pressure,” added Director of Security at the Texas health system.
SecurityLink India ■ November 2019
50
o
Not at this Time
d
White paper
For those not using or investigating cloud storage, why not?
46%
Security Concerns Bandwidth Concerns
28%
Cost Concerns
25%
Don’t Know Enough About It
25%
Management Concerns
24%
Ease to Implement Concernns
6% 11%
Other
0
10
20
30
Conclusion
A
s evidenced by the extensive survey of security professionals, the demand for and importance of video surveillance to commercial, government and institutional users is at an all-time high. The survey responses clearly showed that system downtime and data loss result in significant financial, operational and/ or regulatory impacts on their organizations. Additionally, the continuous advancements in technology such as artificial intelligence and ultra-high resolution cameras are driving the need for ever-increasing performance, storage and scalability as needs change over time.
40
This evolution of technology and the value of video puts tremendous strain on the compute, storage and networking infrastructure underlying all of these systems, making them more vulnerable to major hardware failures that lead to downtime and data loss and increase an organizations’ overall risk; and unfortunately the vast majority of IT infrastructure technology was not designed to handle the unique nuances of large-scale video surveillance applications. Pivot3 has developed patented solutions that take advantage of the most innovative and disruptive IT datacenter technology – hyper-converged infrastructure – and adapt them specifically for mission-critical video surveillance deployments. The result is highly advanced enterprise-class infrastructure that virtually eliminates downtime and data loss during major hardware failures, and 50 maximizes performance and scalability specifically for video surveillance workloads. All of this value – that cannot be realistically obtained with standards NVRs – is delivered without the cost, complexity, or need for advanced IT skills required by most enterprise infrastructure solutions.
Methodology
A
single email with a link to an online survey was sent to more than 70,000 security professionals worldwide. The survey was also promoted online and through social channels. A total of 477 people participated in the survey. The questionnaire had 19 questions, though not every participant was asked every question depending on how they had answered previous questions. Page 9
About Pivot3 Pivot3 was founded by several industry veterans of Compaq, VMware, and Adaptec with a vision to simplify the datacenter by collapsing storage, compute and network resources onto a powerful, easy-to-deploy solution that would reduce cost, operational risks, and ease overall system management. Since shipping our first hyperconverged infrastructure platform in early 2008, we have built best-in-class solutions that have solidified our place as the technology and performance leader for hyperconverged infrastructure. As the only hyperconverged provider with an advanced Intelligence Engine, we enable customers to consolidate multiple, mixed workloads across on-prem, edge and cloud environments and guarantee performance to the applications that power their business. Pivot3 has offices in Austin, Houston, Boulder, Dubai, Mexico City, as well as other offices in the UK and APAC regions. Our global sales, professional services and customer support organizations are deployed in the US and around the globe to meet customer needs wherever and whenever required. With thousands of customers in 66 countries and over 18,000 deployments in healthcare, government, transportation, security, entertainment, education, gaming, retail and more, Pivot3 allows IT to manage complexity at scale through intelligence and automation. SecurityLink India ■ November 2019
67
International Updates
INTERPOL Urges Public to #BECareful of BEC Fraud Public awareness campaign will provide tips to identify possible email scams ●● What would you do if you received an email from your company’s CEO asking you to make an urgent payment? ●● What if a long-time supplier asked you to send all future payments to a new account at a different bank? ●● Would you immediately make the payment or change the banking details? Or would you first double-check through a different channel that the requests were genuine? ●● If you would make the payment, you just might become the next victim of a growing type of fraud – business email compromise, or BEC fraud.
T
hrough a new public awareness campaign recently launched, INTERPOL is encouraging the public to #BECareful about BEC fraud and know the warning signs to avoid falling into the criminals’ trap. BEC fraud – also sometimes called CEO fraud – is a type of social engineering scam where criminals deceive company employees into transferring money to them. They might gain access to the victim’s devices or systems through malware or other security vulnerabilities, and learn enough about the company’s inner working to convincingly impersonate either a high-ranking employee like the CEO or a supplier. INTERPOL’s month-long #BECareful campaign will inform the public about this growing type of fraud and provide information security and 68
prevention tips for how to stay safe. “With more than one billion dollars lost to BEC fraud last year alone, this relatively unknown crime is fast becoming a global phenomenon,” said Craig Jones, INTERPOL’s Director of Cybercrime, “We hope the #BECareful campaign will bring this issue to the forefront by raising public awareness and offering concrete advice to reduce the number of potential victims, with the ultimate goal of keeping money out of the hands of criminals.” The awareness campaign will be conducted primarily via social media, and will focus on three key areas: ●● General information on BEC fraud, how it works and the threat to victims; ●● Advice on how to spot a potenSecurityLink India ■ November 2019
tially fraudulent request and avoid falling prey to the scam; ●● Cybersecurity tips to protect computer systems from intrusion. To gain the widest global reach, INTERPOL has signed on police and financial authorities in around 60 member countries to support the campaign by sharing information on BEC fraud and using the #BECareful hashtag to start a global conversation. A number of private sector companies in the cybersecurity field, international organizations and non-profits are also supporting the campaign by sharing information on BEC cases, as well as on tools available to help members of public protect their systems from this threat. The campaign was launched during the 7th Europol-INTERPOL Cybercrime Conference, The Hague.
International Updates
Launches
Managed Threat Response Service New threat hunting, detection and response offering powered by machine learning and expert analysis to neutralize the most advanced cybersecurity threats
S
ophos has recently introduced the availability of Sophos Managed Threat Response (MTR), a fully managed threat hunting, detection and response service. The re-sellable service provides organizations with a dedicated 24/7 security team to neutralize the most sophisticated and complex threats. These types of threats include active attackers leveraging fileless attacks and administrator tools such as PowerShell to escalate privileges, exfiltrate data and spread laterally, as explained in the Sophos Labs Uncut article on Lemon_Duck PowerShell malware. Attacks like these are difficult to detect since they involve an active adversary using legitimate tools for nefarious purposes, and Sophos MTR helps eliminate this threat. “Cybercriminals are adapting their methods and increasingly launching hybrid attacks that combine automation with interactive human ingenuity to more effectively evade detection. Once they gain a foothold, they’ll employ ‘living off the land’ techniques and other deceptive methods requiring human interaction to discover and disrupt their attacks,” said Joe Levy, Chief Technology Officer at Sophos, “For the most part, other MDR services simply notify customers of potential threats and then leave it up to them to manage things from there.
Sophos MTR not only augments internal teams with additional threat intelligence, unparalleled product expertise, and around-the-clock coverage, but also gives customers the option of having a highly trained team of response experts take targeted actions on their behalf to neutralize even the most sophisticated threats.” Built on Intercept X Advanced with endpoint detection and response (EDR), Sophos MTR fuses machine learning with expert analysis for improved threat hunting and detection, deeper investigation of alerts, and targeted actions to eliminate threats. These innovative capabilities are based on Sophos’ acquisitions of Rook Security and DarkBytes technology. It includes: ●● Expert-led threat hunting: Sophos MTR anticipates attacker behavior and identifies new indicators of attack and compromise. Sophos threat hunters proactively hunt for and validate potential threats and incidents, and investigate casual and adjacent events to discover new threats that previously couldn’t be detected. ●● Advanced adversarial detection: Sophos MTR uses proven investigation techniques to differentiate legitimate behavior from the tactics, techniques and procedures (TTPs) used by attackers. Coupled SecurityLink India ■ November 2019
with enhanced telemetry from Sophos Central, which provides a detailed, full picture of adversary activities as part of the service, the scope and severity of threats can be determined for rapid response. ●● Machine-accelerated human response: A highly trained team of world-class experts generates and applies threat intelligence to confirm threats, and takes action to remotely disrupt, contain and neutralize threats with speed and precision. ●● Asset discovery and prescriptive security health guidance: Sophos MTR provides valuable insights into managed and unmanaged assets, vulnerabilities for better informed impact assessments and threat hunts. Prescriptive and actionable guidance for addressing configuration and architecture weaknesses enables organizations to proactively improve their security posture with hardened defenses. Sophos MTR is customizable with different service tiers and response modes to meet the unique and evolving needs of organizations of all sizes and maturity levels. Unlike many MDR services that focus on monitoring and threat notification, Sophos MTR rapidly escalates and takes action against threats based on an organization’s preferences. 69
International Updates
Idis Global Summit Highlights Developments in Analytics and end-to-end Solutions for Strategic Market Sectors Annual partners’ conference focuses on core video and analytics technologies and milestone implementations
T
he latest advances in video analytics – including improved classification, accuracy and speed – were recently unveiled at a global partners summit of international security and video surveillance professionals, hosted by IDIS in Seoul, South Korea. The three day event, attended by senior executives from leading security distributors from 23 countries, focused on how IDIS is responding to market trends and needs, developing end-to-end solutions including specialist technologies for a range of vertical markets, and pushing forward with improvements to the IDIS deep learning engine, the technology which powers the company’s AI-in-the-Box and IDIS deep learning analytics solutions.
70
The expertise, energy and commitment from all our partners at this year’s summit demonstrates again that collaboration is the best route to success. Together we are giving our customers the most advanced video surveillance solutions, offering industry-best TCO value, ease-of-use and installation, scalability and protection against cyber-security risks
– Joon Jun President of the IDIS Global Business Division
Earlier this year IDLA Version 3.0 was introduced as a service module for up to 80 channels within the IDIS Solution Suite VMS and it set new per-
SecurityLink India ■ November 2019
formance benchmarks by achieving an accuracy of 97-98% and dramatically reduces false alarms. Responding to customer demand for easier, more af-
International Updates
fordable analytics for smaller applications, IDIS also launched its DV-2116 AI-in-the-Box solution. Delegates learned of future enhancements in meta-data searching by class, colour and number, plus the ability to search a specific area of interest. People counting, fall detection and the ability to search by the direction of an object’s movement were also previewed and delegates got advanced notice of a new range of AI-ready 5MP cameras featuring deep learning on-the-edge analytics – due for release next year. The global summit also previewed IDIS’s ambitious video product and technology roadmap for 2020, further building out its end-to-end solutions for core vertical market sectors. Innovations in recording and camera technology, and the growing importance of cybersecurity, extended warranties and the advantages of delivering lower total cost of ownership (TCO) and lower total cost to serve for systems integrators and installers were among key topics discussed at the event. IDIS works closely with its partners and hosts the annual summit as an opportunity to exchange market insights and steer its strategies for product development, technical support and marketing. Partners shared best practice implementations and case studies in core vertical markets including retail, education, logistics and distribution, and hotels. Joon Jun, President of the IDIS Global Business Division, recognised outstanding project implementations and presented special awards for best practice to Alarm Automatika from Croatia and BTCO from Chile. This collaborative approach, focusing on long term partnerships is a key element in the company’s success. It’s a customer-focused model that has seen IDIS grow continuously since 1997 to become Korea’s largest in-country video surveillance manufacturer, with regional operations now expanding across over 50 countries. Concluding the summit, special partner awards were presented by Y. D. Kim, CEO of IDIS, recognising outstanding collaboration and sales growth over the last year. These were given to Alarm Automatica of Croatia, CCTV Center of Spain, EPCOM of Mexico, JES CQTEC of Thailand and Secure Inc of Japan.
Announces
Software Collaboration with Procore T
he Hilti Group, a world-leading manufacturer and provider of construction tools, technology and productivity solutions, is collaborating with Procore, a leading provider of construction management software, to help strengthen digital workflows and drive productivity on job sites. As part of the joint effort, Hilti ON!Track asset management system will become compatible for Procore platform users. The announcement was made during Procore’s Groundbreak 2019, one of the largest construction conferences in the U.S. “Procore is a market leader with Software core to the operations of many of our customers in North America. The way Procore expands ease of use by offering interoperability across users’ software aligns well with Hilti’s goal to provide digital solutions that fit how our customers work,” said Rafael Garcia, Senior Vice President of Marketing at Hilti North America, “This is a first step in establishing a long-standing relationship.” In recent years, Hilti has made major efforts to digitize the construction industry with software solutions. Hilti ON!Track is specifically designed to give contractors visibility into who has their assets. Smartphone scanning and active Bluetooth tags help track items moved between warehouses and job sites. It also enables contractors to proactively manage repairs and inspections, set reminders for maintenance and verify proper training and certifications before assigning certain assets. The API will open data exchange between Hilti ON!Track and Procore, starting with basic project info and expanding over time into further seamless workflows. Procore users appreciate the benefits of reduced duplicate data entry of the same information into multiple spreadsheets or workflows. Customers using both Procore and ON!Track suggest for example that an open item from Procore’s Tasks tool to request a piece of equipment could be checked off once the transfer is scanned and signed within the Hilti ON!Track App. “We are excited to work with trusted names in our industry like Hilti,” said Rusty Reed, Chief Strategy Officer, “Technology usage continues to expand into the field and the integration of Hilti ON!Track and Procore will play a big role in supporting the needs of contractors who use both. We’re glad Hilti will be part of the embedded experience moving forward.”
SecurityLink India ■ November 2019
71
International Updates
FM Global Opens New US$16 Million Electrical Hazards Laboratory to Prevent Businesses from Going BOOM
F
M Global, one of the world’s largest commercial property insurers, has opened a US$16 million electrical hazards and gas detection laboratory at its world renowned 1,600 acre (648 hectare) research campus in West Glocester, R.I., USA, following nearly two years of construction. Fireballs, explosions, combustible and toxic gas leaks and short circuits – industrial property hazards that can derail a business – are now daily occurrences inside of the specialized laboratory. The new facility is designed specifically for testing industrial grade electrical and gas detection equipment with greater precision and certifying those products that are explosion proof, flame-
72
proof and suitable for use in hazardous locations under extreme conditions. To handle such extreme testing, the laboratory has such features as: ●● Two fortified concrete explosion bunkers with up to 2-foot (0.6-m) thick walls complete with military-grade blast doors strong enough to withstand the equivalent of detonating 4 pounds of TNT. ●● Labs that can replicate some of the most corrosive and damaging environments on the planet. ●● A test site that can handle the most toxic and combustible gases found in industry. “As industries and operations evolve, so can their electrical hazards,” said Brion Callori, Senior Vice Presi-
SecurityLink India ■ November 2019
dent, Engineering and Research, “For those companies who operate in hazardous environments, explosions caused by electrical equipment can put a company out of business. There is no margin for error. This laboratory will help FM Global and its clients be well positioned to address such hazards.” Callori noted, “No other organization has built a laboratory quite like this before,” adding that the capabilities will help expedite the certification of FM Approved electrical equipment that industries depend upon so manufacturers can get them to market faster and to where those products will do the most good to protect property. The electrical hazards and gas detection laboratory will be operated by FM Approvals, an internationally recognized testing organization. The facility greatly expands the capabilities of the FM Global research campus, where for more than 50 years, scientists and engineers have been replicating warehouse-size fires, the effects of hurricane force wind storms and dust explosions to help the world’s top companies remain resilient by preventing losses before they occur. Established nearly two centuries ago, FM Global is a mutual insurance company whose capital, scientific research capability and engineering expertise are solely dedicated to property risk management and the resilience of its client-owners.
International Updates
&
Announce
Strategic Alliance to Offer All-In-One Data Security and Protection from Cyber-Attacks ●● Global alliance marks the industry’s first means to assure mitigation of cyber-attacks through complete, multi-layered data security and protection. ●● Joint solution uniquely combines threat prevention technologies with onsite and offsite business continuity capabilities for an all-in-one solution that can be deployed in 15 minutes.
A
rcserve, LLC, world’s leading data protection provider, has recently announced a global alliance with Sophos, a leading player in network and endpoint security, to provide organizations with dedicated protection for backed up data against cyberthreats. Through this collaboration, organizations can now employ the only market solution that integrates anti-ransomware and other threat prevention technologies such as deep learning AI for both known and unknown malware, and award-winning disaster recovery and high availability capabilities for prevention against data loss. Together, the new solution delivers a multi-layered approach to prevent, protect, and immunize backup data from cyber-attacks. A report issued by Cybersecurity Ventures predicts the global cost of ransomware to reach $11.5 billion USD in 2019 and $20 billion USD by 2021, with an attack on businesses every 14 seconds by the end of this year. With cybercriminals continuously taking advantage of enterprises to turn profits, this alliance will provide organiza-
tions with a two-pronged approach to cyber readiness and IT resilience. By combining both cybersecurity and data protection capabilities into a single offering, businesses will have a comprehensive solution that fully covers all their infrastructure needs. The joint solution will be delivered via Arcserve’s award-winning Appliance Series, the only turnkey self-contained appliances for disaster recovery and application availability. Powered by Arcserve Unified Data Protection (UDP), the Arcserve Appliance Series combines flash-accelerated de-duplicated storage, robust server processing, and high-speed networking with highly redundant hardware and cloud services. Arcserve Appliances will integrate Sophos Intercept X Advanced for server, award-winning endpoint protection with artificial intelligence, to deliver a comprehensive protect-in-depth approach to accelerate data, system and application resiliency. “Increasingly cybercriminals are targeting backup systems as a way to increase the odds that compromised SecurityLink India ■ November 2019
businesses will make a ransom payment. Having dedicated protection from both malware and the latest exploits ensures the backup data will stand strong against the most advanced threats,” said Francois Depayras, Sophos’ Vice President of OEM Sales and Alliances, “Sophos Intercept X for server provides anti-ransomware, anti-exploit and deep learning technology to provide the highest level of protection. This makes the Arcserve Appliance the most secure solution available in the market.” “Too many organizations are being forced to have the ‘how do we pay ransom’ conversation. We saw a market gap that needed to be filled and Sophos was the natural fit. We know data protection and they know cybersecurity,” said Oussama El-Hilali, CTO for Arcserve, “As threats become more difficult to combat, this alliance is transformative in the industry, taking our cyber protection to the next level and providing partners with the opportunity to educate customers on the unique benefits of an integrated two-pronged defense against cybercrime.” 73
International Updates
NEC Face Recognition Technology Ranks First in NIST Accuracy Testing Advancing the reliability of biometric technology for payments, transportation and other fields in the age of AI
N
EC face recognition technology has recently achieved the highest matching accuracy in the Face Recognition Vendor Test (FRVT) 2018 performed by the U.S. National Institute of Standards and Technology (NIST), with an error rate of 0.5% when registering 12 million people. NEC’s technology ranked No. 1 in NIST testing for the fifth time, following its top placement in the face recognition testing for video in 2017. The high performance of NEC’s technology is reflected in the test results which placed the company significantly ahead of the runner-up. In recent years, the growing convenience of biometric authentication technology, improved security awareness, and the remarkable development of artificial intelligence (AI), have driven companies around the world
74
to begin adopting biometric authentication technology. Specifically, the use of face recognition technology is rapidly expanding across a wide range of fields throughout the world. Face recognition technologies are now being used in areas that require high reliability, convenience and long-term use such as identity verification and national infrastructure, transaction settlements, bank account establishment and passport verification. 49 organizations, including companies from the United States, China, Russia, Europe and Japan participated in the NIST’s FRVT 2018, where the evaluation of face recognition accuracy was performed. These tests are the most rigorous and fair benchmarks implemented by the NIST as each organization is required to submit and be evaluated on programs that were
SecurityLink India ■ November 2019
developed during the same period. By performing multi-stage matching, an impressive search speed of 230 million matchings per second was achieved. Furthermore, leveraging NEC’s deep learning methods to significantly reduce the identification error rate, NEC accurately matched images of a subject taken over a 10 year interval with an error rate that was 4 times lower than the runner-up. Going forward, NEC aims to further expand the scope of this technology’s application to include store transaction settlements; services in public facilities such as buses, railways, airports, city offices and hospitals; and helping to protect and care for children and the elderly. Based on the NEC Group AI and Human Rights Principles established in April of this year, NEC gives top priority to the consider-
International Updates
ation of privacy and respect for human rights when using AI and biometric data. NEC also aims to contribute to further improvements in the usability of biometric identification and video analytics technology including face recognition. “NEC’s portfolio of biometric
identification solutions, ‘Bio-IDiom,’ which includes face recognition technology, is critical to the ways that NEC is helping to build safer and more productive societies as part of the ‘NEC Value Chain Innovation’,” said Hitoshi Imaoka, NEC Fellow at NEC Corporation, “These technologies create new
value by sharing information on the status of communities, things and processes across the entire value chain, and are a meaningful source of growth in our mid-term management plan 2020, and ‘NEC Safer Cities,’ which support the realization of safe, secure, efficient and equal cities.”
BrainChip Awarded New Patent for Artificial Intelligence Dynamic Neural Network B
rainChip, a leading provider of ultra-low power, high performance edge AI technology, has been awarded a new patent for dynamic neural function libraries, a key component of its AI processing chip Akida™. United States Patent number 10,410,117 addresses a dynamic neural network within an AI device. During a learning process, values are generated and stored in the synaptic registers of the AI device to generate a training model. Training models are themselves stored in the dynamic neural function library of the AI device, and the function library can then be used to train another device. The innovation was credited to Peter Van der Made, BrainChip founder and CTO, who has been at the forefront of computer innovation for 40 years. Van der Made is the inventor of a computer immune system at cybersecurity developer vCIS Technology, where he served as CTO and later Chief Scientist when it was acquired by Internet Security Systems and subsequently IBM. Previously, he designed a high resolution, high-speed color graphics accelerator chip for IBM PC graphics. Van der Made is the author of the book Higher Intelligence, which explains the architecture of the brain from a computer science perspective. “This patent addresses efficiency that contributes to how Akida technology excels in speed, accuracy, and ultra-low power consumption,” said Van der Made, “Synapses store values, these thousands of synapses connect to thousands of neurons, and that neural output can be used by another set of neurons – which is closer to the way the human brain processes information.” BrainChip’s intellectual portfolio consists of 11 patents issued or in process, including a foundational patent in the area of Spiking Neural Networks (SNN) that has been cited by leading companies such as IBM, Qualcomm, Samsung, and Hewlett Packard. With the proliferation of intelligence into edge devices, there is a new and growing need for fast, small and power-efficient neural network processors. By performing neural processing and memory accesses on the edge, Akida vastly reduces the computing resources required of the host CPU. This unprecedented efficiency not only delivers faster results, it consumes only a tiny fraction of the power resources of traditional AI processing, reducing the high environmental and economic costs of running hyperscale data centers. Akida is available as a licensable IP technology that can be integrated into ASIC devices and will be available as an integrated SoC, both suitable for applications such as surveillance, advanced driver assistance systems (ADAS), autonomous vehicles (AV), vision guided robotics, drones, augmented and virtual reality (AR/ VR), acoustic analysis, and Industrial Internet-of-Things (IIoT). SecurityLink India ■ November 2019
75
International Updates
Reliance on Information from Banks Hindering Corruption and Money Laundering Investigations
G
overnments are failing to tackle international money laundering and tax fraud because police don’t have the tools to track down the owners of companies suspected of criminal activity, claimed a new report recently published by Transparency International. Analysis of country evaluations issued by global anti-money laundering regulator, the Financial Action Task Force (FATF), shows that poor performance is strongly linked to a reliance on data held by banks. Transparency International argues that FATF should require countries to establish central registers of the real owners of companies. Registers must be public in order to allow better verification of information. FATF requires governments to ensure that authorities can quickly find out who the real or ‘beneficial’ owners of companies registered in their territory are. Of 83 countries assessed by FATF since 2014, only one (Trinidad and Tobago) fully complies with this rule. No country is considered to be ‘highly effective’ in this area. “Almost without fail, anonymous shell companies appear at the center of major cases of corruption, money laundering and tax evasion,” said Maira Martini, an anti-money laundering expert at Transparency International and Author of the Study, “Funds can be transferred between corporate bank accounts within seconds, but identifying who owns companies involved in cross-border corruption cases can take authorities up to a year.” FATF does not specify how information on company ownership should be collected. Transparency International found that in the vast majority of 26 countries analysed in detail, authorities rely on information collected by banks and other reporting entities. This impedes investigations, as authorities often first need to know where the company banks. They may also require a court order, and information held by banks is often unverified. Cross-border ownership and banking structures create additional hurdles, the FATF reports reveal. On the other hand, FATF’s assessment teams found it easier for authorities to access information in countries where there is a central register of company ownership. “Central registers make it much easier for authorities to access the information they need in a timely manner. When these registers are also public, there are more ways of making sure the information available is accurate, as journalists and civil society can identify inaccuracies and cross-reference with other sources,” said Martini. Transparency International urged FATF to revise its recommendations to adopt a multi-pronged approach to beneficial ownership information, with reporting entities and companies themselves being required to maintain accurate and reliable information to compliment central registers. 76
SecurityLink India ■ November 2019
Cloud Infrastructure Vulnerabilities to Increase 50%, but Misconfiguration Still Main Concern Despite the growing number of vulnerabilities in cloud infrastructure services, containers and other products with a prominent role in cloud enablement, cyber hygiene still biggest risk
S
kybox® Security has recently released its 2019 Cloud Trends Report. The report, compiled by the team of security analysts at the Skybox® Research Lab, analyzes vulnerability trends and other risks in cloud infrastructure as a service (IaaS). Its analysis also concerns other technologies relevant to the use of IaaS such as containers, orchestration platforms and devops tools. In addition to analysis findings, the report also provides guidance on best practices to improving cloud security capabilities in light of these trends. Key findings of the report include: ●● Vulnerabilities affecting cloud IaaS solutions likely to increase 50% over 2018 figures.
International Updates
●● Cloud container vulnerabilities have increased by 82% thus far in 2019. ●● Third-party cloud plugins and apps further expanding the attack surface. ●● Misconfigurations the greatest risk to cloud security. “Vulnerabilities within IaaS cloud solutions are naturally going to continue to climb as these services are more widely adopted,” said Skybox Chief Technology Officer Ron Davidson, “Organizations would be wise not to be too distracted by this increase in vulnerability reports. The biggest cloud insecurities don’t exist within the service provider’s infrastructure itself, but in the way those companies implement and manage the technology. Without proper security considerations and oversight, misconfigurations and policy violations may abound. These process-related issues are hiding in plain sight within organizations – and they present the greatest risk.” “Risks within cloud environments are difficult to manage in many organizations simply because the traditional tools, processes and teams are often ill-equipped to handle the volume and velocity of change in cloud environments,” said Amrit Williams, VP of products at Skybox, “Handling the security and management of disparate infrastructures is incredibly complex, so many organizations are being forced to rethink how to maximize the effectiveness of their cloud deployments while maintaining efficiency. This report highlights the need for organizations to try and unify their methodologies across their hybrid infrastructure, while still understanding there are unique challenges with cloud.”
Expanding Partner Ecosystem to Span the Cyber Exposure Lifecycle
T
enable®, Inc., has expanded its Cyber Exposure ecosystem with new and enhanced technology integrations from leading vendors in public cloud infrastructure, SIEM and IT service management solutions. This news follows Tenable’s announcement of new innovations to automatically discover and assess rogue assets across on-premises and cloud environments. Together, they enable customers to manage, measure and reduce cyber risk holistically through greater visibility across the modern attack surface plus integrated security and IT workflows for faster detection and remediation. “We’re methodically expanding our cyber exposure ecosystem with best-of-breed partners to help customers see and understand the totality of their cyber risk wherever it may lurk in their systems, on the Cloud, on-premises, IT, OT or anywhere else,” said Ray Komar, VicePresident of Technical Alliances, Tenable, “We’re working hand-inglove with leading vendors so that customers can analyze their cyber risk, prioritize what to fix first and ultimately build resilient cyber programs that reduce risk to the business.” New and enhanced integrations to help customers address the Cyber Exposure lifecycle include:
IT service management: ServiceNow
T
enable recently enhanced its integration with ServiceNow, adding its vulnerability priority rating (VPR) to ServiceNow security operations, and ITSM integrations to help joint customers prioritize, filter and view vulnerabilities for remediation based on the actual risk they pose to the business. Customers can also sync their vulnerability data up to 400 percent faster by ingesting multiple Tenable vulnerability data streams simultaneously into ServiceNow vulnerability response and the ServiceNow CMDB. The enhanced integration now includes support for ServiceNow Madrid.
Public cloud infrastructure: AWS Security Hub
A
mazon Web Services recently announced the general availability of AWS Security Hub, a service that gives customers a central place to manage security and compliance across an AWS environment. The AWS connector for Tenable.io® is designed to automatically and continuously discover and track asset changes in AWS cloud environments to ensure all instances are known and assessed for exposure with every change. With the life of cloud workloads commonly measured in hours, the AWS connector solves a key challenge of achieving accurate visibility into cyber risk by creating a consolidated view of all cloud-based assets within Tenable.io. This empowers security teams to manage cyber exposure across the entire modern attack surface with a complete picture.
SIEM: IBM QRadar
I
BM has released a new integration with Tenable.io and IBM QRadar to help customers gain comprehensive visibility into enterprise data across on-premises and cloud-based environments. Customers can create reports, schedule scans and identify vulnerabilities and apply analytics to accelerate investigations and reduce the impact of incidents. The Tenable.io integration complements the existing integration with Tenable.sc™ (formerly SecurityCenter). SecurityLink India ■ November 2019
77
International Updates
&
Join
Forces to Offer a Solution for Long-Range Surveillance F
ujifilm and Videotec have announced a new collaboration, integrating top-performance products to supply an innovative solution for accurate long-range surveillance. This solution is ideal for protecting critical infrastructure and transportation networks including airports, harbours, highways, borders and the environment. The combined system incorporates Fujifilm’s new highend SX800 camera into Videotec’s ULISSE MAXI PTZ. Integrating the SX800 camera into the robust and precise ULISSE MAXI positioning unit is simple and fast, resulting in a first-class PTZ IP camera system for monitoring perimeters and extensive outdoor areas. ULISSE MAXI is a powerful full IP PTZ for outdoor video surveillance, which can manage IP cameras with large-size lenses, with easy integration into a network system via ONVIF Profile-S protocol. The sturdy mechanical structure and the powerful motors of the ULISSE MAXI PTZ are designed to guarantee maximum resistance to high operating stress, vibrations and to withstand harsh weather conditions. The unit is equipped with a wiper for removing rain and dust from the front glass. The SX800 camera lens offers an incredible 40x optical zoom that covers a broad range of focal lengths from 20 mm on the wide-angle end to 800 mm on the telephoto end, constantly providing sharp images and detailed close-ups. It is complemented with 1.25x digital zoom to achieve long-range surveillance equivalent to 1000mm in focal length. 78
The new image stabilization system combines optical and electronic stabilization technologies. The built-in image stabilizer accurately compensates for camera movement, typically caused by gusts of wind or structure vibrations. The system is particularly effective when shooting in the ultra-telephoto range, which is susceptible to even the smallest movement. With a highly sensitive sensor and advanced noise reduction, the SX800 can shoot clear footage with minimal noise even in low-light conditions. The advanced de-fog function brings vivid clarity to hazy images caused by light diffusion due to mist and dust. ULISSE MAXI and Fujifilm’s SX800 are a perfect match and will satisfy the growing demand for PTZ cameras equipped with long-range lenses for 360° perimeter protection of remote infrastructures.
SecurityLink India ■ November 2019
International Updates
Acquires
Help Revolutionizing Professional Monitoring New technology builds on ADT’s commitment to reduce false alarms and improve emergency response
A
DT the leading smart home security provider serving residential and business customers, has recently taken another step to enhance its owned and operated professional monitoring services by acquiring I-View Now, a leading video alarm verification service. I-View Now’s verification technology, paired with the core monitoring strengths of ADT, will help reduce false alarms and optimize priority response from emergency services. “ADT is a purpose driven company. We believe everyone deserves to feel safe, which means we are always looking for opportunities to invest in new technologies that keep us at the forefront of security innovation,” said Jim DeVries, President and CEO of ADT. With I-View Now, public safety answering points (PSAPs), like 911 dispatchers, will be able to better confirm whether an alarm is a true emergency by leveraging technology. Video, location, sound, sensor, user, and activity data can now be combined with predictive analytics to provide a comprehensive dashboard of information about what is taking place during an alarm. This critical information allows customers, ADT, and first responders to make better decisions quickly, helping protect lives and property. If a customer is not available to confirm the emergency, they can choose to allow ADT access to additional available
data such as video feeds from within the property to assess the situation remotely. This enables ADT to append an accurate priority signal to the alarm, which first responders can use to determine response time. “Helping to ensure customers’ safety is top priority for ADT, and by integrating I-View Now technology into our current protocols, we can enhance the effectiveness and efficiency of extensive network of ADT owned and operated monitoring centers and help first responders focus on real emergencies,” said Donald Young, CIO and EVP of Field Operations, “I-View Now will function independently under the ADT umbrella, helping to provide both comSecurityLink India ■ November 2019
panies’ current and future customers with the best experience possible.” “Teaming up with ADT will allow our proprietary technology to reach its full potential and provide better information to first responders,” said Larry Folsom, President, I-View Now, “ADT is our ideal partner to help scale up, and together we will help to save more lives.” ADT’s use of I-View Now’s technology is currently in a pilot program in select markets and will be available to current and future ADT customers later in Q4 of 2019. As part of the acquisition, Folsom will report to Young and continue to lead I-View Now, supporting existing and new customers. 79
feature
The Frictionless Future of Face Recognition
The new way for travelers to get from their gate to destination by using their face A Day in the Busy Life of A Traveler in 2020
A
t 5:30 a morning, her smartphone alarm drags Elise from a deep sleep, and into another busy day. The device unlocks when she looks at it with eyes barely open. At a shake of her head, the phone goes to ‘snooze.’ Two snooze cycles later, Elise stumbles to the kitchen where the coffee maker lights up with recognition to brew her favorite coffee. The radio, following suit, tunes to her favorite news program. Grabbing her briefcase, Elise heads out the door and into her car, where recognition software adjusts the driver’s seat position, switches on the radio and adjusts the volume. After a quick visit to the gym, she heads to work. A kiosk recognizes Elise and opens the gate with no fob or key card. Just like the gym earlier, another camera at the entrance identifies Elise and opens the door. Once inside, she takes an elevator that automatically whisks her to her seventh floor office which unlocks at her approach. At lunch, she moves rapidly through the automated cafeteria checkout. Food and beverages are scanned, and Elise uses facial payment to pay the tab with just a glance. Soon after, she’s on her way to the airport for a flight that will take her to meet clients in Tokyo the next day.
The Eyes Have It – Creating an Easy & Personalized Airport Experience
T
oday’s airports have become a painful experience for travelers. In 2020, that’s no longer the case. Once at the airport, Elise checks-in at the kiosk that identifies her through a face scan. Besides checking her in and giving her flight information, the kiosk also ensures Elise is not on a security watch list. She moves to the bag drop site, where another scan matches her bag with her ticket. Next, thanks to face recognition, she easily passes through the security checkpoint, what years earlier had been the most frustrating step in a system of ‘chokepoints.’
Now entering the main terminal, a nearby kiosk recognizes her and displays personalized gate and boarding information. Elise smiles, knowing she has time to relax, grab dinner and shop before the long flight. While shopping for the sweater she forgot at home, a store associate informs her of current promotions that might interest her based on her purchase history and opt-in loyalty program.
The Case for Face Recognition Technology
E
lise’s story takes place in 2020, but the advanced face recognition solutions enabling that future are here today. They create a seamless, frictionless experience for everyday 80
SecurityLink India ■ November 2019
feature
citizens like Elise as they make their way through their day – especially for travelers navigating increasingly busy airports. For businesses undergoing a digital transformation, face recognition technologies can drive increased revenues, simplify transactions, improve operational efficiency and create a paperless environment – all of which, again, improves the customer experience. At the same time, solutions combining surveillance cameras with face recognition software can elevate the level of public safety and security, not just in airports, but throughout society. Enterprises and government agencies can ensure only authorized personnel have access to their facilities, while retailers and entertainment venues can secure their facilities and protect customers. Airports are the melting pot where all these benefits come into play. In 2017 airlines world-wide carried more than 4 billion passengers, and demand for air travel is expected to double over the next 20 years. This will be a challenge for airports, which have to efficiently move people from one point to another, quickly and seamlessly. At the same time, 46 percent of passengers in 2017 still used the main ticket counters when they check in – and had their IDs checked manually – even though self-service options were available. Another 15 percent checked in through kiosks, most of which scan the ID, not the traveler. Queue management is a nightmare. In Europe’s busiest airports, wait times are often disrupted by staff shortages, time of year, or threat levels. At times, they are measured in hours rather than minutes, adding the stress of missed flights, rebooking and long layovers for travelers. Face recognition technology can sharply reduce those wait times, creating a frictionless experience for travelers from home to their final destination. It’s not just an issue of the travelers’ convenience and comfort, but also their safety. Airports are beset by threats, from terrorism to weapons being hidden in baggage. To keep passengers safe, security personnel require accurate verification of the identity of the person picking up the ticket, checking the bag, moving through the security checkpoint and boarding the plane. Face recognition technology is also used to take the accurate identifications and compare them to worldwide watch lists, even alerting security personnel to ensure the safety of passengers. In addition, it ensures accurate and fast verification for biometric air entry and air exit programs, speeding not only airplane boarding but also the customs and immi-
gration processes. In this way, it not only ensures the security of every country and its citizens, it makes these processes fast and hassle-free for travelers.
Touching Down After a StressFree, Relaxing Flight
A
s the plane nears its destination, Elise wakes up and stretches. She orders a beverage and pays – naturally – using the on-board facial payment system. Relaxed, she deplanes in Tokyo and once again finds a frictionless process through the airport. Elise moves into the queue for immigration and customs, where her identity is quickly and accurately verified, enabling her to speed through the line. She now moves to the baggage claim carousel to get her luggage. Despite best efforts by the airlines, bags can be mishandled or stolen. In 2017, 22.7 million bags were mishandled worldwide, and 22 percent of all those were damaged or stolen. Spotting her bag, Elise feels assured it hasn’t been tampered with. Face recognition solutions can match travelers with their bags. The solutions can also monitor baggage claim areas to identify people damaging or stealing luggage, reducing thefts and increasing safety and security. Once at her hotel, Elise checks in via a system that once again quickly verifies her identity and provides her room number. A quick face scan unlocks the door, and along with voice recognition, provides her control of everything in the room from the lights and temperature to the television and radio. As Elise prepares to end her day, she reflects on how effortless her travel was that day – and once again she sets the alarm on her smartphone with only a glance and a ‘good night.’
Foresight is 20-20
T
he world is a busy place that moves quickly and often dares those in it to keep up. Daily life can become a series of obstacles – doors, lines, checkpoints – that conspire to force travelers and everyday citizens to waste precious time standing in queues or punching numbers into keypads. Advanced face recognition solutions like NEC’s NeoFace® Express and other face-based solutions can create frictionless, secure and personalized experiences in the workplace, at retailers, in restaurants, and in crowded public places like airports or entertainment venues.
SecurityLink India ■ November 2019
81
feature
Don’t Miss Out on the
Business Potential of Network Audio I
P network cameras bring many advantages – and while seeing is believing, adding audio to the mix takes security to the next level. Axis’ audio equipment uses an open technology that makes installation easy, helping installers to grow their business. Video surveillance has come a long way. When IP cameras got their big break in the mid-2000s, they changed the game for surveillance. The installer now could connect the cameras to an Internet-based network and get the functionalities that were sci-fi back in the days of analog video cameras and VCR storage. They brought unprecedented flexibility and scalability. The technology has developed to let stakeholders see in low-light conditions, and help them count people or recognize faces, to mention a few examples. There are systems in all sizes, catering to every customer need – from the corner shop to very advanced surveillance systems for large industrial sites. But as a surveillance system installer, one already knew that. What he might not know – and which may be a source
82
of lost revenues – is that he can spice up the offer and grow sales by adding network audio. The installer will benefit from systems that truly deliver the peace of mind that the customers crave, and he doesn’t need any specific competence to take that step.
Increasing customer demands
O
ne company that is reaping these benefits is Securitas Direct Sverige. It is a big full-service security company that installs complete surveillance systems as well as provides intrusion alarms and services. Its security center in Linköping, Sweden, operates 24/7/365. Here, the security operators act with a high level of expertise and with a customer focus, to make sure that they use the right action in case of an incident. Over the years, the company has built a strong relationship with Axis regarding cameras and accessories. “We started using Axis products back in 2010–2011,” says Henrik Larsen, Senior Product Manager at Securitas Direct Sverige, “It was quite natural for us to turn to network video surveil-
SecurityLink India ■ November 2019
feature
lance when it became available. We saw increasing customer demands – first for indoor cameras – but often the customers also needed to protect fenced-in outdoor areas that provided a sort of pre-alarm.”
the morning,” Larsen said, “Without it, the customer might have arrived at the plant at 6 o’clock, finding the gates open, valuable equipment stolen, and damage to their buildings.”
Impressive results
I
I
P cameras connected to a security operations center is a very good solution. The operator can monitor in real-time what is happening, and then call the customer, send a guard, and inform the police. However, Securitas Direct Sverige saw a way to improve this solution. “Quite early, we knew that we needed loudspeakers for live broadcasting of messages to go with the network cameras,” Larsen said. While Securitas Direct Sverige was an early adopter, the integration of network audio in surveillance systems has generally increased sharply in the last 2-3 years. Securitas Direct Sverige’s statistics show that it is effective. Their security center handles an increasing number of interventions. As a result of the threefold solution with security center, cameras and audio, more and more intruders are arrested or deterred from the customers’ premises. As the word spreads about the advantages, more customers want to integrate audio. Today, the majority of Securitas Direct Sverige’s new network surveillance installations include audio and it has helped the company grow.
Voice messages are very effective
L
arsen said that there is practically no limit to the sectors that can benefit from the services combining a security center with IP cameras and audio. In general, businesses that are located remotely and deserted during the day or nighttime are the ones most likely to benefit. Securitas Direct Sverige uses live voice messages where the security operations center gets an alarm if there is an intruder. The operator reviews the video footage including what happened just before and after the alarm was set off. Based on this, the operator acts according to the predetermined action plan. Some companies choose to set up the system so that analytics in the camera triggers a pre-recorded message in the speaker, which is then broadcasted to the intruder. “A personalized live voice message is a strong remote tool that stops intruders in their tracks. The result is that the customer’s business can open as usual in the morning, even if someone broke into their grounds at 3 o’clock in
Easy to get started ntegrating network audio is efficient and well worth the costs, especially compared to the expenses for unplanned downtime, stolen goods or damaged assets. On top of this, one might also have insurance costs and fines for not meeting deadlines. Larsen pointed out that, naturally enough, it takes more expertise to set up the backend of larger, more complicated systems. But in general, the equipment connects automatically to the infrastructure and sends the audio files to the right place in the system. “Quite early, we knew that we needed loudspeakers to go with the network cameras for broadcasting messages,” he added. It’s easy to see if the installation is working as it should be, both during set-up and during operation. The speakers continuously self-test, automatically sending a message to the operator if there is a malfunction. So, by using network audio the operator will get permanent monitoring of the system. He will also save on working hours. Manual tests usually mean that one person in a control room talks into a microphone and another has to be closer to the loudspeaker to check if it works.
Very flexible and user-friendly
M
ost leading video management software today supports audio integration. Axis uses open technology, so it’s easy to integrate the company’s audio equipment into existing surveillance systems, even those supplied by competing brands. Network audio benefits from the user-friendliness of IP-based surveillance systems. For example, it’s easy to divide the system up in zones, and one gets great flexibility in connected various speakers and cameras depending on the customer’s needs. Software updates are regularly available from Axis so that the system can always be updated. Larsen said that the partnership with Axis goes a long way in meeting customer needs. “We meet with Axis several times a year to discuss new products, software and functionality,” he said, “I’m very proud of the work that we do together, helping companies and society, in general, to prevent crime and making people feel safe.”
SecurityLink India ■ November 2019
83
product showcase
AutoVu™ SharpZ3 Next Generation Mobile LPR System with Intel® Movidius™ VPU Technology It goes beyond license plate identification and brings new levels of innovation in vehicle analytics, situational awareness, and accuracy
G
enetec Inc., a leading technology provider of unified security, public safety, operations and business intelligence has unveiled its next generation mobile ALPR (automatic license plate recognition) system at IACP, Chicago, held during October 26-29 2019. Powered by Intel® Movidius™ Myriad™ X VPU (vision processing unit), the new Genetec AutoVu™ SharpZ3 is among the first specialized in-vehicle ALPR systems in the world to use Intel’s latest deep learning and computer vision technology. The deep learning capabilities in the AutoVu SharpZ3 system will enable advanced levels of innovation in in-vehicle analytics, situational awareness and accuracy.
The AutoVu SharpZ3 system is not only able to improve the accuracy of license plate reads in difficult environments (such as bad weather, heavy traffic, and fast speeds) but also able to instantly recognize additional analytics such as vehicle type, color, and more. With future releases, the deep learning capabilities in the AutoVu SharpZ3 will enable cities to use their ALPR equipped vehicles to address other operational issues such as detecting unpermitted road construction, discovering abandoned e-scooters or bikes in unauthorized zones, and more. “AI is driving a powerful digital transformation in cities around the world – enabling them to be more efficient, livable and secure for their citizens. By pushing AI-powered devices and solutions to the edge, forward-thinking companies like Genetec are fulfilling the true promise of IoT in smart cities,” said Jonathan Ballon, Intel Vice President and General Manager, Internet of Things Group. The AutoVu SharpZ3 system also features three optical sensors in the camera to provide additional analytics such as the precise positioning of detected objects, and a modular chassis to allow users to easily add new functionalities in the field without the complication and costs of hardware replacement.
SATATYA NVR3204X H.265 NVR with 4K Decoding
“With the AutoVu SharpZ3, vehicle-based ALPR technology is about to enter a new phase in its evolution, made possible by Intel’s high-performance, low-power, deep learning VPU. By bringing powerful deep learning processing into the device itself, we are no longer limited by the constraints of traditional computer vision techniques or server post processing. The new AutoVu SharpZ3 system will enable cities and law enforcement organizations to go far beyond simple license plate character recognition,” said Stephan Kaiser, General Manager of AutoVu at Genetec. 84
M
atrix NVRs are packed with high end processors to deliver all the functionalities like high resolution recording, playback, simultaneous local and remote monitoring along with storing for higher number of days. Furthermore, these latest NVRs are also backed with an intelligent software to detect threats and send instant notifications for real-time security. All in all, these comprehensive, flexible, reliable, integrated NVRs provide a proficient, persistent and a preventive security solution suitable for enterprises and multi-location offices.
SecurityLink India ■ November 2019
product showcase
Features
●● ●● ●● ●●
Video channels: 32 IP channels. Inbuilt storage slot: 4 SATA ports (10TB each). Raid support: RAID0, RAID1, RAID5, RAID10. Compression technique: H.265 with 512Mbps throughput. ●● Cascading: Monitor cameras connected with up to 20 NVRs without a server. ●● Instant notification: Call responsible person in case of an event and sent SMS/ e-mail with snapshots in real time. ●● Integration: Database level integration with Matrix access control, fire alarm and other third party sensors.
Qmiix Cross-Platform Automation Solution for Digital Transformation
Qmiix currently supports connection to cloud storage services such as Google Drive, Dropbox, and OneDrive, as well as private storage apps on QNAP NAS devices, like File Station. Users can simply create and manage workflows for transferring files from one storage location to another via web browser or Android and iOS applications. Moreover, Qmiix supports messaging applications, including Slack, Line, and Twilio so users can receive notifications about files uploaded to shared folders on NAS devices. Qmiix Agent for QNAP NAS was also released which acts as a bridge between Qmiix and QNAP NAS devices, and it is available for download from QTS App Center.
Q
NAP® Systems, Inc., a leading computing, networking and storage solution innovator, has recently launched Qmiix, a new benchmark automation solution. Qmiix is an integration platform as a service (iPaaS) solution that assists users in automating workflows that require interactions between multiple applications on different platforms. Qmiix allows users to efficiently create automated cross-platform workflows for repetitive tasks. “Communication and interaction between different digital systems is very important in digital transformation,” said Aseem Manmualiya, QNAP Product Manager, “The QNAP vision for Qmiix is that it can serve as a bridge for connecting multiple applications. Once users connect apps or software to Qmiix, they can easily create powerful workflows to automate repetitive tasks and boost productivity.”
XProtect 2019 R3 New Software with Centralized Search
I
n the latest product update of Milestone XProtect 2019 R3 video management software, Milestone Systems introduced several new features and capabilities. These include Centralized Search, a new Driver Framework, Adaptive Streaming and enhanced Device Password Management. With this product update, Milestone Systems continues to pursue ever higher performing software to fulfill
SecurityLink India ■ November 2019
85
product showcase
resolution one is not required, for example when displaying video in the smart client or smart wall in window sizes smaller than a full screen. This will give users smoother viewing and a better user experience, a lower total cost-of-ownership (TCO) due to less hardware needed to decode unnecessary high-resolution video and a better use of bandwidth that can then be utilized for other needs in the organization.
New Device Password Management the market’s rising demands for cost-effective video technology solutions.
Centralized Search
O
ne of the main features of the 2019 R3 release is Search – a new centralized search platform in XProtect Smart Client, making it possible for users to search for everything in one place. Previously, users performed several standalone searches, depending on what data they were searching for. With the new Search tool users can search for motion, alarms, events, bookmarks and other types of data, in one single place enabling rapid and efficient video investigations. Moreover, the new Search platform also smoothly embeds partner integrations and their powerful analytic capabilities via dedicated filtering options. Through specific plug-ins and devices, search criteria such as line-crossing and object-infield will be enabled directly in the Search Tab, saving time and increasing efficiency.
Milestone’s Driver Framework
M
ilestone Systems provides customers with support for more than 8,000 cameras and devices, the widest device support in the industry. In order to allow XProtect device support to grow exponentially with the number of devices in the market, and in order to provide support for new types of devices such as IoT, Milestone Systems introduced Milestone’s Driver Framework. Milestone’s Driver Framework within the Milestone Integration Platform software development kit (SDK) allows devices manufacturers, big or small, to develop their own drivers and provide faster device compatibility and deeper integration that goes beyond the capabilities of ONVIF.
Adaptive Streaming
T
his new feature will enable users to receive lower resolution streams from the recording server when a high
86
T
he new Device Password Management continues XProtect’s focus on ease-of-use and enhanced cybersecurity during setup of new installations, as well as when expanding existing ones. This feature makes it possible for system administrators to manage all devices’ passwords directly from the XProtect Management Client for selected device manufacturers. In the 2019 R3 update we doubled the number of supported device manufacturers and added the option to schedule future password changes according to the cadence in the organizations and their password policies, making device password management fully automatic.
Wisenet WAVE 4.0 VMS
H
anwha Techwin has introduced a significantly updated version of its Wisenet WAVE Video Management Software (VMS) platform. Packed with a long list of new features designed to improve the user experience, interoperability and cyber security, Wisenet WAVE 4.0 has an enhanced system architecture which ensures high availability and supports scalable deployments by allowing up to 100 servers to be merged into a single system.
Operator friendly
W
isenet WAVE 4.0 enables systems registered on WAVE Sync to be merged from an online dashboard, which eliminates the need to configure port-forwarding for remote merges. A comprehensive update of the Wisenet WAVE user interface includes a revamp of the notifications panel which
SecurityLink India ■ November 2019
product showcase
hensive feature set designed for any third-party system or application, including artificial intelligence (AI) and deep learning driven computer vision applications, focused on object recognition and automation. Using the Metadata SDK, developers can create Plugins which take advantage of key new features, including metadata search by attributes, time interval or region of interest, object overlays on live video and playback and camera-specific video analytics settings. Commenting on the launch of WAVE 4.0, Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, said, “The new features are intended to further assist users to achieve maximum benefit from their video surveillance systems, whilst the availability of the SDK ensures that WAVE is future proof in terms of enabling users to take advantage of emerging technologies such as AI.” now includes tabs for motion detection, bookmarks, events and objects, as well as quick and easy ways to search and filter each respective tab. A new ‘Layout-as-an-Action’ feature enables a predefined screen layout to be automatically opened when an event occurs, whilst WAVE 4.0 now offers support for queue management analytics running on Wisenet cameras, as well as shock detection on Wisenet X Plus series cameras and temperature change detection on Wisenet thermal cameras. Management of the latest generation of Wisenet cameras has also been improved, providing the ability for operators to remotely control PTZ and focus functions of Wisenet models equipped with motorised varifocal lenses. Operators can now import offline video files captured by action cameras, wearable cameras and drones. By associating them as a virtual camera, they can be managed in the same way as video captured by any other cameras which are connected to a system.
Enhanced security
F
or high security applications, Wisenet WAVE 4.0 is configurable to ensure the system only uses HTTPS and encrypts video traffic, whilst a password protection option has been added for .nov and .exe formats.
Metadata SDK and plugins
A
new software development kit (SDK) available in support of WAVE 4.0 enables rapid integration of intelligent third-party systems and devices. It includes a compre-
identiFINDER R425 Next-Generation Hand held Radionuclide Identification Device New cubic detector design delivers 360-degree coverage so responders can locate and measure radioactive sources with confidence
F
LIR Systems, Inc. has recently launched the FLIR identiFINDER® R425, the next-generation of its field-trusted R400 handheld radionuclide identification device (RID). The identiFINDER R425 provides responders with increased sensitivity, flexible power management, and advanced communication features that enable them to safely locate and measure radioactive sources with confidence. A new single cubic detector design, sourceless stabilization, advanced heuristics, and hybrid identification techniques enable the FLIR identiFINDER R425 to deliver high-performance detection in all directions. It delivers three times the gamma and two times the neutron sensitivity of currently-fielded systems, so responders can detect radiological threats from farther away and behind heavier shielding. Where other systems can become inoperable in extremely
SecurityLink India ■ November 2019
87
product showcase
communication features including dual USB-C ports, the FLIR web interface and RAD mobile app, and a universal API that enables integration with user deployed networks such as the Mobile Field Kit, ATAC, Sigma Edge, and Safe Environment Gateway. The identiFINDER R425 also has built-in bluetooth and GPS technology. The single-hand operation via three-button control is a familiar interface for existing identiFINDER users, simplifying deployment and training requirements. high gamma fields, the identiFINDER R425 remains fully operational, delivering pinpoint accuracy. “Our next-generation R425 means better detection in all directions and builds on the R400’s successful legacy of identifying and measuring radioactive sources with precision,” said Dennis Barket, Jr., Vice President and General Manager of FLIR Systems’ Detection division, “With more than 25,000 devices deployed, responders trust the accuracy and reliability of FLIR identiFINDER, and the R425 will be a powerful tool for military, homeland security, public safety agencies, and commercial entities around the world that watch over this vital mission area.” At 15% lighter weight than the previous generation RID, the identiFINDER R425 provides ergonomic balance for a variety of scenarios including surveying, emergency response and environmental monitoring. The internal battery delivers 12 hours of use, with power options that include disposable or rechargeable batteries that can be hot-swapped for up to four more hours of extended operations. The system boasts an IP67-rating and features a fully enclosed solid-state detector to withstand harsh environments. When threat detection occurs, rapidly communicating results are critical. Remote data viewing, operation and reach-back are made possible on the R425 through
Ethos Multi-Tech Readers Johnson Controls adds WaveLynx Technologies’ Ethos Multi-Tech Readers to Access Control Portfolio
J
ohnson Controls introduced the Ethos line of multi-tech contactless access readers from WaveLynx Technologies. Ethos readers are equipped with a choice of credential technologies enabling customers to choose migration paths to deploy secure credentials.
WaveLynx Ethos multi-tech contactless access readers feature a modern aesthetic and state-of-the-art feature set. All Ethos readers are capable of reading legacy proximity credentials, MIFARE DESFire® smart card credentials, LEAF enabled smart card credentials and mobile credentials. Ethos readers simultaneously work with old and new creden88
SecurityLink India ■ November 2019
product showcase
tials. WaveLynx Ethos readers are integrated with the Tyco Software House C•CURE 9000 security and event management system, providing 24x7 mission-critical security and safety protection for people, buildings, and assets. All ET-series readers including the ET10 mullion mount, ET20 wall mount and ET25 keypad reader, feature OSDP communication with the patented auto-detect feature. This feature allows the reader to automatically switch from the Wiegand protocol to OSDP when the panel is upgraded to OSDP, with no need to re-wire or re-configure the reader for OSDP functionality. Secure smart cards or mobile credentials can be introduced at any time.
Key features ●● ●● ●● ●● ●● ●● ●●
OSDP auto-detect capable. LEAF Si enabled off the shelf, LEAF Cc ready. MIFARE DESFire® EV2/EV1 compatible. Mobile credential. Tristate LED light bar (red, green, amber) and buzzer. Easy install bracket (patent pending) and wiring system. Accelerometer-based tamper detection.
Updated NICE Investigate DEMS Featuring New Mobile Functionality to Improve Incident Response
N
ICE has recently enhanced its NICE Investigate Digital Evidence Management Solution (DEMS) with a new mobile app to help police officers and detectives streamline investigative work and save time while improving community engagement and incident response. NICE is demonstrating the new mobile capabilities at the recently held IACP Annual Conference and Exposition 2019 at Chicago’s McCormick Place West. Running on the secure Microsoft Azure Government cloud, NICE Investigate is a one-stop solution for automating manual processes around digital evidence collec-
tion, management, analysis and sharing. With the release of NICE Investigate Mobile, NICE is extending these essential capabilities from the desktop to the smartphone, empowering police officers and investigators to work smarter and more efficiently from virtually any location. The ultra-secure mobile app supports two-factor authentication, permitting access by only authorized users and devices. “The faster you can collect evidence, analyze and share it, the faster you can act on it,” said Chris Wooten, Executive Vice President, NICE, “Using NICE Investigate Mobile, investigators can collect, connect to and chase evidence and leads right from their mobile device. Furthermore, because NICE Investigate connects to a broad spectrum of digital evidence repositories, including 911 and 999 audio recordings, it goes beyond traditional mobile DEMS apps to give officers the ability to play back recorded emergency calls in the field, which enhances their situational awareness and ability to respond effectively to incidents.” “With NICE Investigate, our force has already made great strides in improving the efficiency and success rate of investigations,” said Andrew Lohman, Digital Program Manager, North Wales Police, who has been using NICE Investigate since 2018, “We’re especially excited about the incremental time savings and productivity gains we expect the NICE Investigate Mobile app to deliver to our officers. The ability to effortlessly secure CCTV video to upload onscene photos and videos and work cases in the field, will all go a long way toward streamlining our investigative process.” The force, which consists of 1,450 police officers, 250 police community support officers, and 800 additional staff, covers all of North Wales, serving a population of 687,800 people.
SecurityLink India ■ November 2019
89
product showcase
New Alvium 1800 Camera Series
STPay-Topaz Family Solution
Presenting at Embedded VISION Europe
A
llied Vision exhibited at the recently held European Embedded Vision Conference in Stuttgart, and introduced further models of the Alvium 1800 camera series. Two cameras with USB3 vision interface extend the product range of the 1800 camera series, which can be used for both industrial embedded vision and machine vision applications. With a wide range of functions for image correction and optimization as well as various trigger functions, the camera series combines the advantages of classic industrial cameras with the benefits of integrated sensor modules (small size, light weight, low power consumption, low price). The 0.5 Megapixel 1800 U-050 camera is equipped with the ON Semi PYTHON 480 sensor with a global shutter and an optical format of 1/3.6’’. Thanks to the AR0135CS sensor from ON Semi, the Alvium 1800 U-120 offers a resolution of 1.2 megapixels and a frame rate of 52 frames per second. The USB cameras can be easily integrated with the established Vimba Suite on Windows, Linux and Linux ARM platforms. Both cameras are available with different housing variants (closed housing, open housing, bare board) as well as different lens mount options (S-Mount, CS-Mount, C-Mount) from late October on. The USB interface can be located either on the back or on the left side of the case (seen from the sensor). The Alvium 1800 series now includes three models from 0.5 to 5 megapixels, each available as monochrome and color.
90
Next-Gen Payment System-on-Chip with Increased Performance and Protection
S
TMicroelectronics has released the next generation of its STPay system-on-chip (SoC) payment solution, leveraging state-of-the-art technology to increase contactless performance and protection, reduce power demand, and significantly improve the user experience. The new STPay-Topaz family solution comes ready for embedding in smartcards, loaded with payment applications running on certified JavaCard platform, and meeting all required security and payment-scheme certifications. As the first such device manufactured in 40nm Flash technology, it is based on the ST31P450 secure micro-controller with cyber-protection, which includes the latest Arm® SecurCore® SC000™ 32-bit RISC core and cryptographic accelerators to block advanced forms of attack. Support for a wide range of international and domestic payment schemes simplifies product management for card developers, enabling deployment in numerous markets worldwide. These include the global Visa, Mastercard, Amex, Discover, JCB, and CUP payment schemes, as well as domestic schemes including Brazil’s Elo, India’s RuPay, Interac in Canada, BankAxept in Norway, eftpos Payments Australia, and Thai Bankers Association. MIFARE MIFARE Classic®, ® Plus and MIFARE® DESFire® libraries and Calypso® are also proposed as an option, when transportation applets are required along with a banking applet.
SecurityLink India ■ November 2019
product showcase
STPay-Topaz is available as sawn wafers or micro-modules, and in contactless, or dual-interface configurations qualified with a wide range of industry-standard inlay and antenna technologies for easy integration in plastic cards. The STPay ecosystem includes tools, sample scripts, and support by local ST engineers to assist script development, validation, and personalization, ensuring optimum flexibility and fast time to market. Samples of STPay-Topaz-1, the first product of the STPay-Topaz family, are available now. Please contact your local ST sales office for pricing options and sample requests.
FLEXIDOME IP 3000i IR & micro 3000i Extend Smart Video Security to General Surveillance Applications
T
New VARIO2 730nm Illuminator The Wavelength for Driver and Passenger Recognition
he FLEXIDOME IP 3000i IR is built for high quality, 24/7 performance, with a range of reliable surveillance features including essential video analytics, and is designed for easy installation. The compact and minimalist design provides high installation flexibility and offers various mounting options.
Features: IP 3000i IR
●● Outdoor model: IK10 and IP66. ●● Offers 1080p and 5MP resolutions combined with 120dB.
R
aytec launched VARIO2 730nm illuminators, a breakthrough product in the transport sector. The ability to identify drivers and passengers through a windscreen is becoming an increasing demand in transport applications around the world. Capturing a high quality, clear image inside the vehicle requires significantly more light than a typical ANPR/ LPR application. This needs to be considered when choosing the correct wavelength. After testing various wavelengths of light to see how they compare they have identified that 730nm provides the best results and allows identification of the person in the vehicle. Featuring angles from 10 to 120 degrees and advanced security settings, VARIO2 730nm illuminators are the next step in transport applications.
●● ●● ●● ●● ●● ●● ●●
High dynamic range. Frame rate of up to 30 frames per second. AVF lens (3 to 10mm). Built-in IR (up to 30m). Fully configurable H.265 multi-streaming. Easy to install with zoom/ focus lens. Built-in essential video analytics.
Features: IP mirco 3000i
●● The smallest form factor of the full portfolio (micro dome). ●● Indoor model. ●● Offers 1080p and 5MP resolutions combined with 120dB.
SecurityLink India ■ November 2019
91
product showcase
●● ●● ●● ●● ●●
High dynamic range. Fully configurable H.265 multi-streaming. Frame rate of up to 30 frames per second. Fixed lens (2.3 or 2.8mm). Built-in essential video analytics.
Application areas
●● Retail – standalone solutions and for multi-store applications too. ●● Banks and commercial buildings such as offices and shopping malls.
XENSIV-60GHz-Radar-IC Gesture Control Thanks to Infineonradar Technology in Google Pixel 4 Smartphone
and has now been integrated for the first time into a smartphone, so that it can also be controlled by gestures. “With our radar technology devices become ‘context-aware.’ This means that they can finally understand their environment and react much more purposefully,” said Andreas Urschitz, Division President for Power Management and Multimarket at Infineon Technologies AG, “The precise motion detection by the 60 GHz radar chip turns the Google Pixel 4 smartphone into a gesture control system. This is a revolution in the human-machine-interaction. At Infineon, we are furthermore working on the fusion of multiple sensors to simplify interaction and increase the usefulness of the devices.” Infineon’s radar technology has its roots in the automotive sector. Radar sensors have been effectively meas-
W
hether for artificial intelligence, augmented reality or the Internet of Things – 5 billion people worldwide will be using smart devices to sense their environment next year. Infineon Technologies AG has developed a 60 GHz radar chip, which enables a new form of interaction between users and their devices. Using an integrated antenna system, it senses the presence and movement of people and objects with high precision or measures distances and speeds. This chip is the base for Google’s Soli technology 92
SecurityLink India ■ November 2019
product showcase
uring distances, speeds and movements while driving for decades. Infineon has further developed these functions for small devices. The 60 GHz chip is a complete radar system with antennas on a very small area (5x6.5mm2) coupled with low power consumption. It can perceive movements in rooms or measure distances from objects in the millimetre range with utmost precision. With the appropriate software, the motion data is converted into functions, so that control via gestures is possible without touching the device.
Devices and buildings sense their environment as if with human senses
I
nfineon develops sensors and chips which, like the human senses, recognize the environment and process the data obtained. The aim is to enable effortless interaction and at the same time use smart functions that make life easier, safer and greener. The fusion of multiple sensors in a single device creates new solutions that measure and improve air quality or intelligently control burglary protection, for example. In addition to voice-controlled assistants, ‘intelligent’ household appliances or wearables, buildings, so-called smart buildings in particular, are becoming more interactive. Sensors detect the number of people in the rooms or can adjust the need for light sources to improve safety and energy efficiency.
CEM Systems DCM 400 Four-Door Intelligent Encrypted Ip Controller
J
ohnson Controls has released the CEM Systems DCM 400 intelligent four-door encrypted controller which provides a secure and cost-effective solution for bi-directional control of up to four doors. It is designed to directly interface with CEM Systems AC2000 access control system (v10.2 and higher) and Wiegand or CEM Systems approved and supplied open supervised device protocol (OSDP v2), smart card readers.
The DCM 400 four-door intelligent encrypted IP controller has been developed with installers in mind and contains a number of features to improve the ease of installation and maintenance
Using powerful 32-bit processors, the DCM 400 gives full offline verification and decision making at the point of entry, with a local card holder database of up to 500,000 cards and storage of up to 80,000 offline events, to ensure improved communications and response at the door. The DCM 400 has been developed with installers in mind and contains a number of features to improve the ease of installation and maintenance. These include an LCD display and twelve character keypad to allow configuration and troubleshooting directly on the board. A graphical overlay wiring guide and spare network points on the DCM 400 allow for local access to diagnostic web pages. The enclosure has been designed with a removable door for ease of access, an increased number of punch outs (20mm and 25mm) and cable tie points for improved cable management options. Smart power features include automatic detection of 10.5 VDC to 28 VDC power supplies, which simplifies installation without the need for jumper-links or configuration. The DCM 400 dashboard webpage which can be accessed locally and remotely, provides installers with improved troubleshooting, monitoring and configuration of the DCM 400 and any equipment connected to it. The DCM 400 is also a future-proof solution for those that wish to migrate from Wiegand readers to more secure OSDP v2 readers, as both can be supported on the same DCM 400 unit.
SecurityLink India â– November 2019
93
product showcase
Public Safety Network National Footprint for Comprehensive Law Enforcement Partnership Expected to be Reached in 2020
R
ekor Systems, Inc. a leading provider of public safety and vehicle recognition systems, has recently launched the Rekor Public Safety Network (RPSN). Any state or local law enforcement agency participating in the RPSN will be able to access real time data from any part of the network at no cost. The company is initially launching the network by aggregating vehicle data from customers in over 30 states. With thousands of automatic license plate reading cameras currently in service that capture approximately 150 million plate reads per month, the network is expected to be live by the first quarter of 2020. “This network exists to help law enforcement prevent and solve crimes through a shared resource. We don’t think our participants should be charged for accessing information from a network they contribute to, especially when it provides information that has proven its value in solving
94
crimes and closing cases quickly,” said Robert A. Berman, President and CEO, Rekor, “Budget constraints and lack of resources are always an issue where the safety of any community is concerned. We are proud to be part of the solution.” “The Rekor Public Safety Network provides real time license plate reading (LPR), make, model and color alerting for law enforcement use only. We do not implement any facial recognition algorithms and our industry leading technology assists law enforcement in finding specific vehicles, not individuals,” said Rekor Chief Science Officer Matt Hill, “Structured and hosted in an environment that is in conformance with CJIS Security Policy, the network will not accept any paid data from private sources such as those used for vehicle asset recovery. In 2020, the RPSN will be fully compliant with the federal 2019 NDAA law, which bans the use of certain foreign manufactured cameras used in critical infrastructure.” Available to any existing Rekor customer that opts-in, the RSPN uses Rekor’s industry leading mobile and fixed mounted units for ultimate flexibility. Rekor’s software, powered by artificial intelligence (AI) and machine learning, can also be added to existing law enforcement security camera networks to search for law enforcement related hotlists as well as Amber Alerts and registered sex offender motor vehicles. “As an early participant in the Rekor Network, the Westchester County New York Police Department’s Real Time Crime Center (RTCC) has 84 cameras deployed that are capturing 25 million reads per month, resulting in hundreds of hotlist ‘hits’ per month,” said Lt. Brian Hess, Westchester County Police Real Time Crime Unit Head, “When a crime occurs, detectives in the RTTC use Rekor technology to assemble relevant information and share it with our officers in the field. Now, we will not only be sharing it with our officers, but with every law enforcement agency in the RPSN – making this already powerful tool even more effective.”
SecurityLink India ■ November 2019
product showcase
READERS PROFILE
PORTAL VISITS (MONTHLY)
https://www.facebook.com/SecurLinkIndia/ https://twitter.com/SecurityLinkIND https://www.linkedin.com/in/securitylink-india/
SecurityLink India â– November 2019
95
International Updates
96
SecurityLink India â– November 2019
International Updates
SecurityLink India â– November 2019
97
National Roundup
Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)
“Security Link India” payable at New Delhi dated__________
* Please subscribe through admin@securitylinkindia.com
WE ARE UPDATING OUR DATABASE For free listing in Database:
For
Advertisement Contact: editor@securitylinkindia.com
* Send your detail to admin@securitylinkindia.com
Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 98
SecurityLink India ■ November 2019