Magazine July 2018

Page 1

July 2018

Volume II • Issue 12 • Monthly • New Delhi (102 pages including 6 for cover) RNI No. DELENG/2016/68892

REDEFINING SECURITY (India’s Leading Monthly Magazine on Security, Safety & Fire)

Cybersecurity Trends 2018 The Influence of Lens Selection

 Improving Personnel Productivity with Cloud Telephony  The Rise of IT and Integration with ID Management  Reducing Downtime for Surveillance System

` 200/-








Visit us at Secutech India 2018 Date: April 5-7 Booth: # B-1, Hall 1 Venue: Bombay Exhibition Centre, Goregaon-E, Mumbai World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune- 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com



From the Editor’s Desk

(102 pages including 6 for cover) Volume II • Issue 12 • July 2018

®

®

ISO 9001-2015 CERTIFIED

Dear Readers,

Editor-in-Chief Santosh Pathak

Heartiest Greetings from SecurityLink India! The Goods and Services Tax in India that is hailed as one of the most successful accomplishments of the current Government turned one year old on 30 June 2018. Terming GST as a “fitting tribute to the spirit of cooperative federalism,” the Finance Ministry asserts that the first year has progressed remarkably both for the sheer variety of challenges that its implementation has thrown up, and for the willingness and ability of the policy makers and tax administrators to rise up to these challenges and respond befittingly. The imposition of GST regime has echoed a mixed bearing on the service sector. On one hand, it is beneficial in various aspects such as one country one tax mode, seamless flow of credit, avoidance of multi-taxation etc., and on the other it has produced snags in ease of doing business. The Private Security Industry in particular, which is one of the largest employment generating industries in India making a workforce of over 7 million personnel is not going well along with the GST executions. They have shown utter disappointment with the regime and raised strong objections on the GST implementation. Amongst others, the major impediment stems from the fact that GST is due to be deposited on the 20th day of every month while private security agencies receive payments for their respective services after 60 to 90 days; in the interim, however, they are mandated to meet the statutory compliances without fail. The gap between the business module of the private security industry and the imposed GST compliance regulations has created an unpleasant state of affairs for the industry. Central Association of Private Security Industry (CAPSI), the preeminent organisation for private security professionals in India have made several representations with the Government to amiably reach out to a rational reconciliation, but they could not fructify well. Although the delegations at each stage were given a patient hearing, but no assurance towards the rectification of the anomaly has been suggested so far. The industry has decided not to give up and to proceed more pro-actively to counter the indifference. To begin with afresh, CAPSI has recently resolved to stage a nationwide peaceful protest (Dharna) in front of GST offices of the respective states with adequate media coverage in order to make the authorities aware about the seriousness of the issue. We hope, at the end of the day, both the objectives of the GST Act and the interests of the industry are properly maintained. This month we carry an informative article on ‘Cybersecurity Trends 2018’ by TÜV Rheinland, along with various interesting updates from the security and fire-safety industry. We trust you will enjoy studying them. Till we meet next month, stay safe and happy reading! With warm regards,

Santosh Pathak Mob: +91 9968172237 10

Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Vibha Dixit Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)



National Roundup

july 2018

CONTENTS NATIONAL ROUNDUP

• Axis Extended Warranty

• Delta LED Display at Bajaj Auto

• Videonetics Bags IE20 2018 Award

• myGate Partners with Puravankara

21

Honeywell Connected Building Software

27

COM-SUR Helps CXOs Benefit from CCTV

• Hikvision Wins NCN Award

28

CP Plus Secures Kidzania

• Matrix COSEC Standalone ACS

29

Dahua China – India Program

24

Matrix Impact Kolkata

• Vehant KritiScan 6040R

30

• CP Plus H.265 Surveillance Solutions

• FICCI PSIC 2018

20

22

25

• Dahua Roadshows in India

26

White papers Cybersecurity Trends 2018

36

The Influence of Lens Selection

66

FEATURE ARTICLES

12

Improving Personnel Productivity with Cloud Telephony

32

VPNFilter Malware: What is known so far

33

The Rise of IT and Integration with ID Management

47

Need Buy-in from IT on the Next Security Install?

48

Reducing Downtime for Surveillance System

65

SecurityLink India ■ July 2018


National Roundup

SecurityLink India â– July 2018

13


National Roundup

july 2018

CONTENTS Application/ case studies 50

Bosch Secures Romania Football Arena

58

Extreme Serves at Melbourne’s Metro Trains

51

KKB Anadolu Data Center Adopts Matrix Solution

• Gemalto Brings Multi-factor Authentication

52

Hikvision Safeguards Senegal International Airport

53

ISO 9001:2015 Certification for Avigilon

54

Dahua Updates Security at West Midlands Site

55

New AutoVu Allows Sharing of Parking Data

61

56

Vanderbilt Examines Measures at Sporting Events

The Impact of Biometrics in Healthcare

62

Vicon Secures Busy Dog Care Center

59 60

International updates

Product showcase

14

• Assa Abloy Enables Contactless Student IDs • HID Electronic Cover for Passport in Argentina • Sightlogix Thermal Cameras for U.S. Utility

70-81 82-97

SecurityLink India ■ July 2018


National Roundup

SecurityLink India â– July 2018

15





Infinova Wins Recognition for Its Security Expertise Mr. Milind M Borkar, VP Sales (Infinova)—ME, Africa and SAARC, receives award at the Secutech Event for Lifetime Achievement Award from Secona Shield Awards.

ID: Infinovagroup/infinova corporation World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova Middle East (Kuwait): Office # 13, 5th Floor, KFH Bldg # 240, Mirqab, Kuwait Landline and Fax: +965-2247-5678, Email: Sales-ME@infinova.com Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com


National Roundup

Extended Warranty for Range of Network Video Products Five-year Warranty safeguards customer’s investment

A

xis Communications has introduced the AXIS Extended Warranty programme, a service offering for its line of network video products. This warranty covers an additional two years to the initial warranty of three years. It includes all repair, maintenance and replacement of products including cameras, video encoders, video decoders and physical access control products. Integrators and end users will now be able to avail a prolonged warranty to a maximum of five years. “We wanted to ensure that our customers benefit from increased level of support and service after they have purchased Axis products. The Axis Extended Warranty programme gives them additional cover with better choices especially for those with larger installations,” said Sudhindra Holla, Sales Director – India and SAARC at Axis Communications, “Furthermore, this programme reiterates our commitment to quality and our customer first approach.” AXIS’ Extended Warranty opens up new possibilities for system integrators in offering warranty service agreements to end users. The AXIS Extended Warranty is available via all Axis’ distribution channels, and the product must be registered within 6 months of the product being purchased. 20

Videonetics Bags Mayor of London’s India Emerging (IE20) 2018 Award

V

ideonetics has recently been honoured with the prestigious India Emerging Twenty (IE20) 2018 Award by the Mayor of London. Created by London & Partners and launched by the Mayor of London, the IE 20 Programme aims to discover 20 of India’s most innovative and highgrowth companies to help them grow to London.

 It is indeed an honor to receive ‘India Emerging Twenty 2018 Award’ from the Mayor of London and we all are set to lay the foundation for our success in the UK market. This recognition validates our drive for high performance, innovation, differentiation and global scalability  – Dr. Tinku Acharya Fellow IEEE, MD & Founder, Videonetics

Avinash Trivedi, VP, Videonetics (R) receiving the Award

The award was adjudged using a robust rating scale by an esteemed panel of business leaders, venture capitalists and entrepreneurs. By flawlessly surpassing rigorous three-phase evaluations, Videonetics emerged as India’s top 20 emerging enterprises with global aspirations. The 20 winners were chosen from over 300 applications from some of India’s leading business hubs such as Mumbai, Bengaluru and New Delhi. London & Partners has a proven track record of working with over 2,000 international businesses and helping them with their global expansion plans.

SecurityLink India ■ July 2018


National Roundup

New Connected Building Software To Optimize Space Usage & Operational Costs IoT-enabled Honeywell Vector Space Sense connects organizations to actionable insights for better-informed space decisions

H

oneywell has recently introduced Honeywell Vector Space Sense, a software solution that shows where, when and how building spaces are used at any given point in time. As a result, the building operations team can make better-informed real estate and space usage decisions that provide opportunities to optimize costs and promote better building experiences for occupants. “From higher levels of employee productivity to healthier environments that help drive cost savings, Connected Buildings have real benefits for owners, operators and occupants,” said Vimal Kapur, President and Chief Executive Officer, Honeywell Building Technologies, “Honeywell Vector Space Sense is the latest example of how Honeywell is using cutting-edge technology to enable smarter, data-driven buildings that work for their organizations.” Recent studies indicate most offices around the world are underutilized by as much as half of their actual capacity due to factors such as shifting work schedules, mobile technology usage and changing business needs. However, many facility managers lack the comprehensive insights required to take action to address these usage issues. This can lead to overpaying for unused space, wasted energy usage, offtemperature spaces and other inefficiencies that negatively impact an organization’s bottom line. Honeywell Vector Space Sense helps address this issue by gathering and analyzing data from multiple sources throughout a building to

deliver actionable insights that help personnel better utilize, optimize and prioritize building spaces. The facility team can view these insights through detailed, information-rich dashboards and reports incorporating visualization methods like maps, usage profiles, overall trends and other metrics to show where, when and how space is used, along with opportunities to optimize usage and help reduce costs. For example, organizations can gain the necessary insights to repurpose unused spaces for more productive uses, make better-informed decisions about future space investments or divestments, and better align building equipment schedules with actual usage patterns. Honeywell Vector Space Sense is in use at London Health Sciences Centre, a London, Ontario-based hospital network with 15,000 employees that covers 1.9 million square feet and served more than 1 million patients in 2017. The hospital network chose to implement the technology to better understand the use of its clinical and office spaces, following complaints of overcrowding and office expansion requests. With Honeywell Vector Space Sense, the network discovered that overcrowding in certain areas only happened at specific times, while

SecurityLink India ■ July 2018

other spaces often went unused for long periods of time. This information helped inform better space reallocation and scheduling. Backed by a cloud-based infrastructure, Honeywell Vector Space Sense follows a three-step process that starts with gathering space utilization data from multiple sources such as smart lights, bluetooth beacons, mobile apps, and other sensor-connected devices and equipment. The solution then applies analytics to the collected data, using customized algorithms and space utilization models to deliver actionable insights – the third and final step. “Expenses associated with unused building spaces often go unnoticed, simply because it’s so difficult to get an accurate, moment-by-moment view into how building spaces are used, or if they’re being used at all,” said John Rajchert, President, Building Solutions, Honeywell Building Technologies, “Honeywell Vector Space Sense takes the mystery out of space usage through real-time, IoT-enabled insights that give organizations the real picture of where and how people are using spaces, so they can get the most out of their buildings.” 21


National Roundup

Wins Best Surveillance Camera Award at NCN Awards H

ikvision, the world’s leading supplier of innovative video surveillance products and solutions, has won the NCN Award at recently held 11th NCN Innovation Award Night at The Hotel Suryaa, New Delhi. Hikvision was voted for the Most Innovative Products of the Year 2017 in the Best Video Surveillance Camera category. The NCN Awards felicitated the achievers for the year 2017 for their outstanding performance. These awards are presented to recognize the vendors, solution provider and partners for their relentless and sincere efforts towards the growth of the Indian IT industry. “We feel honored to win the Best Surveillance Camera Award at NCN awards. This recognition comes at a time when Hikvision is introducing AI enabled advanced cameras along with Turbo HD 5.0 series cameras in the market. We will continue our onward march with innovative product offerings in the video surveillance and security categories. Hikvision will continue to offer innovative AI based applications and IoT solutions in the Indian market,” remarked Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. The NCN Innovation Awards, the only of their kind at the national level, aim at recognizing ‘Excellence’ on the basis of quantitative as well as qualitative criteria which shall set a benchmark in the industry. This unique initiative is intended to acknowledge achievements of the different players in the IT industry. National Computrade News (NCN) is a leading IT news magazine and one of the most trusted sources for the critical information needs of the IT channel which includes front retailers to large vendors. For this category, the best product in each category is selected on the basis of online voting. The award ceremony has attracted a congregation of more than three hundred guests cutting across verticals of the IT industry including vendor, corporate and channel partners across the nation to celebrate the occasion.

COSEC Standalone Access Control Solution

S

ecurity has become a major concern across the globe. Essentially, this requires restricting unauthorized people from reaching pre-defined areas while ensuring easy access for authorized people. Matrix COSEC standalone access control solution is an ideal solution for SMB and SME units where door controllers are connected to a small panel over Ethernet. Moreover, it does not require any kind of software installation. Standalone access control solution improves security, simplifies installation and enhances reliability required for an ideal access control. Thus, Admin can monitor devices, define policies and generate reports directly from the COSEC PANEL without installing any application software.

Benefits ●● ●● ●● ●● ●● ●● ●● 22

Controls up to 255 doors from a single IP panel. Advance access control features with capacity of 25,000 users. Leverage IP technology. Connect existing third party readers. PoE door controller for powering readers and locks. Standalone operation without server. Scalable for future expansion.

SecurityLink India ■ July 2018


National Roundup

With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.

Soft Facility Management

Hard Facility Management

Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.

Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.

Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.

www.sisindia.com A 5000 crore Indian multinational company

SecurityLink India ■ July 2018

23


National Roundup

Impact Kolkata Exhibits Innovative Telecom and Security Solutions

M

atrix exhibited latest telecom and security solutions at its maiden event Matrix Impact held in Kolkata at the Hotel Radisson. The event was conducted in association with their regional partner Chalissery. Matrix presented its latest PBX, PRASAR UCS – pure IP solution for modern enterprises that supports up to 2,100 IP users from a single box at the event. The product finds its applications in hospitality, multi-location, retail, healthcare and other industry verticals where mobility is the key for productivity. The SIMADO range of GSM Gateways was the limelight for apparent benefits of wireless connectivity and pocket friendly telephony costs. Matrix displayed its hospitality PBX that supports calling activities in hotels from 40 to 3,000 rooms. The PBX offers integration with well-known property management software (PMS) without any middle ware, helping hotelier manage routine operations and create enhanced guest experience. They also exhibited their scalable Gateways which can be deployed in standalone mode and offer easy switch between PRI, GSM, IP and Analog networks from a single chassis.

24

Matrix SPARSH VP710 – Smart Video IP Phone also remained in the spotlight at the event. They further displayed new Extreme series of network video recorder (NVRX) at the event. These high storage NVRs are equipped with 4K decoding capacity and H.265 compression, along with characteristics like cascading (up to 20 NVRs), camera-wise recording retention and database level integration. It also has plenty of other distinct features like high resolution recording, playback, and simultaneous local and remote monitoring along with storage retention for higher number of days. Moreover, these latest NVRs are also backed with intelligent video analytics that helps detect threats and send instant notifications for real-time security. All in all, they provide a proficient, persistent and preventive security solution, suitable for enterprises and multilocation offices. Additionally, they also exhibited their wide range of IP cameras and video management software – SATATYA SAMAS. At the event, Matrix also unfolded its latest range of biometric timeattendance and access control solution. Mobile being the next generation technology in terms of security, SecurityLink India ■ July 2018

Matrix displayed its ‘Your Mobile is Your Identity’ solution. In mobile based access control, user either scans the QR code through his/ her mobile or just twists the mobile to get access using Bluetooth. Using mobile application, a user can mark attendance automatically using GPS or Wi-Fi. To cut down the server cost, Matrix presented its standalone access control solution where one can connect with 255 devices and 25,000 users. Additionally, to enhance the security, Matrix biometric solutions can be integrated with any video surveillance solution. It captures real-time images when any pre-defined event occurs. Furthermore, Matrix showcased access control for data centers – a centralized biometric authentication to datacenters and data racks. “The event was successful to meet its objective. The engagement of system integrators in different applications was highly appreciated. We look forward to have mutual growth while working with these system integrators,” said Ruchir Talati, National Sales Manager, Matrix.


National Roundup

KritiScan™ 6040R 3D X-ray Baggage Scanner

V

ehant Technology has recently launched a new 3D Xray baggage scanner – KritiScan™ 6040R. KritiScan™ 6040R is a dual-energy X-ray baggage scanner to create virtual 3D images which provides an operator with isometric view of the scanned baggage by generating three dimensional image of the object. KritiScan 6040R

Roadshows in Five Cities in India D

ahua Technology organized a series of road shows in five cities namely Rajkot, Calicut, Surat, Pune and Vijayawada across four states in India, in association with its national partner Aditya Infotech. The purpose of roadshows was to spread Dahua’s brand awareness and product knowledge. The shows brought customers and partners together for exchange of thoughts, product demonstrations and networking to further strengthen business and prospects. Commenting on the success of roadshows, Robbin Shen, Managing Director, Dahua Technology India Pvt. Ltd said, “Dahua is always committed to making the world a safe and secure place to live in. Roadshows are the best way to reach out to people and prospective clients who are the ultimate end-users of our products. Our recent roadshows displayed a variety of innovative products and cutting-edge security solutions across verticals in five fast growing cities in India. It brought an interactive experience on our products and services. The existing and future technologies that we have

provides extremely detailed images for enhanced detection capabilities. It is a compact X-ray baggage scanning system ideal for checkpoints and small baggage scanning at high security premises and other baggage scanning applications. “We at Vehant Technologies are committed to the idea of making the world a safer place. Through our vast range of integrated security, surveillance and monitoring products and solutions we offer our clients and customers the most contemporary security solutions” said Ritika Kaul, Marketing Manager, Vehant Technologies.

Features: ●● ●● ●● ●● ●● ●● ●● ●●

Dual energy based virtual 3D imaging. Radiation safe as per AERB India. High density alert feature. Distortion correction through software. Self-diagnosis feature. Central supervisor console (Optional). Threat image projection feature (Optional). Energy saving device (Optional).

showcased helped in creating more awareness and confidence in usage among our present and prospective customers and clients.” The customers were excited to get hands-on experience at the show. Dahua officials interacted with customers and responded to all their queries. These roadshows resulted in enlarging the circle of Dahua brand lovers besides increasing its brand awareness level. SecurityLink India ■ July 2018

25


National Roundup

Fine-pitch LED Display at Bajaj Auto Ltd. Cutting-edge Delta LED Displays highlights Bajaj Auto corporate boardroom

D

elta, a leading provider of video wall solutions, installed its advanced and latest fine pitch indoor LED Displays in the board room of one of India’s most eminent industrial houses, Bajaj Auto Ltd., at its Pune facility. The LED display boasts a pixel pitch size of 1.5mm, well suited for conference rooms as it delivers unmatched visible clarity even at shorter viewing distances. The LED wall measures 3.04m (w)x1.7m(h), and is being used for the purpose of video conferencing, Presentations and others. The display solution known for its exceptional clarity and unmatched visualization of content, is optimized for a wide range of indoor environments including highly lit spaces as well as light-controlled conference rooms.

Vibrant Fine-pitch displays with best in visualization technology

D

elta with its extraordinary understanding of display solutions, assisted Bajaj Auto to transform its boardroom into a space that was not only impressive, extraordinary and functional, but with next-gen technology having vibrant colors and contrast. “Delta delivered its modular solution that potentially eliminates the need for maintenance and serviceability with its advanced design and technology integration. The LED installed is as per our requirement and satisfaction,” commented officials at Bajaj Auto. The state-of-the-art easy to mount LED installed at Bajaj Auto Ltd. seamlessly blends with the design of the office and offers highresolution powerful display, advanced configuration and improved accessibility for the needs of the boardroom environment. The Hi-tech LED display delivers exceptional convenience and sets a new benchmark in technological evolution in corporate arena. The fine pitch LEDs can be scaled to fit any wall size and design. With advantages including low power consumption, longevity, seamless integration, compactness, energy efficiency and ultra-high brightness, the new mainstream display technology is suitable for large auditoriums, cinemas, public display, hospitality and control room applications. The advanced features in Delta’s fine pitch series ensures brighter display with immaculate presentation of details, delivering high contrast, high refresh rate and fast response time making for a visually stunning experience. 26

SecurityLink India ■ July 2018

myGate Partners with Puravankara Group To provide smart security to all new residential projects

m

yGate, India’s leading mobile-based security management has recently partnered with Puravankara Limited, one of India’s leading real estate conglomerates, to provide security solutions for its residential projects across India. This partnership will benefit the residents of the various projects of Puravankara. Today Puravankara has a pan India presence – Bengaluru, Hyderabad, Chennai, Kochi, Coimbatore, Mangaluru, Kolkata, Mumbai, Pune and Goa with an overseas presence in GCC and Sri Lanka. Since its inception in 1975, Puravankara has believed in only one mantra for success, and that is ‘quality.’ This credo combined with uncompromising values, customer-centricity, robust engineering and transparency in business operations, has placed it among the ‘most preferred’ real estate brands in both residential and commercial segments. One of the factors while evaluating the security options was seamless integration with their current security infrastructure without making it difficult for the security guards. Cost effectiveness and a robust IT infrastructure were also key factors in deciding the right solution. myGate’s intelligent security solution provided the seamless combination of pay-as-you-go as well as scalability to suit the developer’s need. myGate is a mobile-app based system that offers comprehensive solutions for gated communities to manage all operations at the entry and exit gates. Residential communities can now ensure authorized and seamless management of domestic help, staff, visitors, delivery trucks, taxicabs and other vehicles.


National Roundup

Since its launch in Bengaluru in 2016, myGate is a leader in the space having been adopted by 1.5 Lakh homes and has secured more than 30 million visits to date. myGate digitizes and automates manual tasks done by security guards. It also offers several advanced capabilities such as eintercom (automatic visitor authentication), child safety alerts, infrastructure-free vehicle management, touchless resident identification, and management reporting amongst many other features. myGate’s intelligent security solution provides the seamless combination of pay-as-you-go as well as scalability to suit the developer’s need. Speaking on the association with Puravankara Limited Vijay Arisetty, CEO & Cofounder of myGate said, “The Puravankara Group was evaluating various software solutions to manage the security of their residents across various projects. Additionally, they were also looking to provide and manage the training of facility staff, security guards and building association members, on the operation of the security system. Our offerings matched perfectly to their requirement and we are excited to be a part of this growth journey of Puravankara. We firmly believe our product will help Puravankara to have a better grip over their security management system for their residents.” Echoing the same views Anand Narayanan, Chief Operating Officer (COO) – Puravankara Limited said, “At Puravankara, customer-centricity forms the core of every decision made and our association with myGate reiterates our commitment towards the same. To us, a home goes beyond the realm of brick and mortar; it’s also about peace of mind and safety. With myGate coming on board, we are giving a new dimension to the safety and security of customers at our projects. Through their tried and tested digital solution, ‘Apartment Security and Visitor Management System,’ we are ensuring a hasslefree experience for all our residents.”

Helping CXOs Achieve Optimal Benefits from CCTV C

CTV cameras are increasing in number across the world but there are yet question marks – if crime is going down, or if the people are able to recover better ROI from their investments in CCTV, or if there is a better compliance and so on. The fact is that CCTV has become just a ‘fit and forget,’ but if users take just a few extra recommended steps, they will achieve far more benefits. The unfortunate incident that took place at Ryan school in Gurgaon has been a shocking experience. It is yet shocking to know even after that, there have been over 160 reported incidents across schools in India – 18 of which are deaths, 7 suicides, over 70 molestation cases, and even 2 cases of leopard intrusions. All these schools had one thing in common, and that is CCTV cameras. So, fundamentally there is something wrong in the way the world is using CCTV, or rather not using CCTV to its fullest potential. After the unfortunate Gurgaon incident, every authority suggests to increase cameras, but needs to be considered if just the installations thereof are enough. Team COM-SUR is reaching out to business leaders to make them understand that any organization that uses CCTV cameras can achieve lots of value from CCTV surveillance by adopting a few simple SOPs in terms of CCTV video footage auditing, smart backup and intelligent reporting software. Gautam Goradia, the creator of COM-SUR is taking personal interest and looking to deliberate with organizations and their CXOs about how their organizations can benefit from this new angle of auditing CCTV video footage as a SOP, save costs of storage and bandwidth, and gain business intelligence from standardized reporting. SecurityLink India ■ July 2018

27


National Roundup

Securing Kidzania Entertainment City Noida K

idZania is an infotainment concept designed for children aged 1-14 years. It showcases an interactive city that combines inspiration, fun and learning through realistic role-play. Spread over 7,000 square meters, kids can independently explore more than a 100 exciting careers, the inner-workings of a city and the concept of managing money. Each activity and experience is designed to empower and hone kids and give them the confidence to be their best selves, and inspire them to be great global citizens. The KidZania concept is already present in 24 cities across 19 countries, complete with paved roads, buildings, battery operated cars, and a fully functioning economy with its own currency. KidZania management put two main concerns to CP PLUS – firstly to consider the expanse of the theme park, where it was challenging to watch and control activities of kids playing around; and secondly, video feed of the children’s activity was to be provided to parents sitting in the lounge area. While the premise did have manned security, manually monitoring all corners of expansive area was rendered ineffective.

Solution

To monitor the kid’s activity areas, a combination of CP PLUS 1.3MP dome and 1.3MP varifocal dome cameras were used that offer high resolution imagery with wide coverage and a visibility range of 30 meters. The footage from these cameras would be displayed on the lounge screens for guardians of children to see. The lanes and aisles were secured using the CP PLUS 1MP vandal dome cameras which support variable focal length thereby making them ideal for corridors and lanes. Additionally, these cameras are also vandal and tamper proof. The entry and exit points and the outdoor are covered by CP PLUS 1.3MP bullet cameras, which offer high resolution imagery, WDR that automatically adjusts to varying light conditions, and come with an IP66 rating making them ideal for outdoor environments. For the monitoring station/ control room setup, an embedded VMS solution has been provided with a capacity to cater to 500 IP cameras with 700Mbps incoming bandwidth and 700Mbps transmission bandwidth. The control room solution has been designed considering future needs such as scalability wherein ‘n’ number of

A

fter analyzing the requirements, the CP PLUS team conducted a detailed survey of the area with the system integrator for the project, Honeywell, to draw out a comprehensive plan for the campus. A combination of state-of-the-art IP cameras and NVRs were chosen to address the unique needs of specific areas. 28

SecurityLink India ■ July 2018

devices can be added on to the existing server/ client architecture, and a ‘failover system’ which allows switching over to an alternate system in case of a system failure, and more. It also provides an option to integrate multiple solutions and analytical features such as people counting, face recognition any many more, access control, fire alarm system etc. Additionally, as per the project’s requirement of 30 days of recording, a NAS solution has been provided which easily configures with the DSS server and can be upgraded to increase the days of recording required by simply cascading more NAS servers to act as one NAS recorder. Considering the nature of the setup CP PLUS has provided a solution that is scalable and can be easily upgraded whenever required. It can also be integrated with other allied systems to make security more efficient.

Impact

T

he solution provided the administration with a ready access to the all sections of the expansive area at a click of the mouse. It enhanced the overall safety and operational efficiency of the setup, while enabling guardians to keep an eye on their children. Implemented over 4 weeks, the solution was commended by the KidZania management, especially by Yazdi Khambata, Facility Director – India, KidZania. With the successful implementation of this project, KidZania is considering up-scaling of their existing security infrastructure with CP PLUS in other branches as well.


National Roundup

The Chandani Chowk to Hangzhou, China – India Program High Performing Indian Partners Visit Dahua Headquarters in China

D

ahua Technology has recently organized a successful tour program called ‘The Chandani Chowk To Hangzhou, China – India Program’ for 25 high performing Indian partners to its headquarters at Hangzhou in East China. The partners had an extensive guided tour of Dahua’s facilities.

Aims & agendas

T

he Chandani Chowk To Hangzhou, China – India Program aimed to enhance cooperation by enabling partners to learn more about Dahua and its latest technologies, products and solutions, as well as the country and its culture. The Indian partners were warmly received by the Dahua Technology top management including Michael Chen, the Vice President and James Wang, the CTO, Dahua. The Indian partners began from Dahua showroom where they had a first-hand experience on newly developed security technologies and products such as display solutions, video conference solutions, smart home automation solutions etc. The group also had an on-site training and discussions with industry and product experts from Dahua to get a more comprehensive understanding of the industry and the application of Dahua solutions which would help them explore more business opportunities in India and help them to broaden the market and the customer base. The partners were presented a UAV show in the new Dahua Smart IoT Industrial Park in Fuyang District showing the company’s advanced production capabilities and technologies. Subsequently, Michael Chen and Aditya Khemka, MD of Aditya Infotech addressed the gathering, and James Wang made a presentation on the latest technology. A Dahua spokesman said, “Dahua always rewards the best performers and surprises them with these kinds of valuable and beneficial trips. Now we have prepared a more knowledgeable and understanding Indian partners on Dahua products and technologies after this visit which will help them to find more opportunities for Dahua products and increase their market outreach in India. We will support their initiatives in this direction.” SecurityLink India ■ July 2018

29


National Roundup

Launches

H.265 Powered Surveillance Solutions and Surveillance Monitors

C

P PLUS has recently launched a range of state-of-the-art monitors and H.265 powered IP cameras and NVRs. While the former has been designed specifically for surveillance, the latter offers a range of IP cameras and NVRs that offer the latest CODEC H.265 compression for unmatched bandwidth and storage savings. “The CP PLUS monitors have been designed in response to the long time need for monitors that are user friendly in the context of surveillance infrastructure. While the larger monitors (22” and above) offer speakers, the smaller screens do not have this facility. Since smaller screens have a greater demand, our monitors will save on the added cost of additional speakers. Also, our latest range of H.265 powered IP cameras and NVRs will now offer in-device compression thereby saving significant bandwidth and storage costs. This range will be a highly advantageous in 4K video streaming,” said Yogesh B. Dutta, COO, CP PLUS. CP PLUS LED monitors have been designed to cater to the needs of a CCTV surveillance infrastructure, complete with in-built speakers, high luminosity and backlight. Available in 19” and 22”, these monitors are compact and rugged in design and offer both audio and video streaming. With the launch of these monitors, the CP PLUS product portfolio will now offer a complete end-to-end solution for all surveillance needs. The H.265 powered IP cameras and NVRs, on the other hand, are equipped with the latest CODEC, H.265, also known as high efficiency video coding (HEVC). Aimed at the next generation 4K recording and displays, the H.265 CODEC technology will double the data compression ratio as compared to the earlier H.264 at the same level of video quality, thereby doubling the bandwidth and storage savings. This range includes 2MP, 3MP and 4MP IP cameras, and 4, 8, 16, and 32 channel NVRs in 1 SATA and 2 SATA storage capacities. The CP PLUS LED monitors and H.265 powered IP surveillance range will be out in the market early next month. 30

SecurityLink India ■ July 2018

PSIC 2018 F

ICCI is organizing the sixth edition of ‘Private Security In-

dustry Conclave (PSIC) 2018’ on August 03, 2018 at FICCI Federation House, New Delhi. The theme of this year’s programme is ‘job creation and skill development,’ and the objective of the conclave is to bring together experts from the government, private security industry, state controlling authorities, service users, and other stakeholders to discuss and debate various central and state legislative and policy issues affecting the functioning of private security industry. There is an urgent need to upscale the standards and professionalism for training of security officers and the process involved for the licensing of private security firms and the registration.

Key focus areas of the Conclave

● ● Job creation and skill development in private security sector.

● ● MANTECH – Integration of security personnel and electronic security. ● ● Standards and professionalism for training of security officers. ● ● Combination of manpower and technology as a security solution. ● ● Best practices for the proper enforcement and implementation of PSARA in the state.


National Roundup

For Exhibiting and more information please contact : Jay Sheth: jay.sheth@nm-india.com / +91 9967971606 I Eshita Sharma / mumbaichapter@fsai.in / +91 9818805922 Supported By

Official Publication

Organisers

Media Partner

SecurityLink India â– July 2018

31


feature

Improving Personnel Productivity for Security Companies with Cloud Telephony By Shivakumar Ganesan – CEO & Co-founder of Exotel

T

he private security industry in India has gained a strong footing in the last decade. With the largest number of private security agents – estimated at 7 million – this industry provides employment to a huge section of people. Urbanisation, and introduction of government proposals such as Mission Smart Cities and Make in India have created a demand for more and more security personnel.

Current state of affairs

P

rivate security industry plays a huge role in the safety of commoners. For a densely populated country like India, the police to people ratio is not significant enough, which has made the private security industry all the more popular. However, this industry grapples with many crises everyday. One of the major problems is the lack of accountability from the security personnel. Security industry in India is largely unregulated, and it’s not uncommon to see guards swapping their shifts without intimating their employer. This impersonation can be potentially harmful, not just for the customer, but also for the security company. 32

This is just one of the many problems plaguing the security service providers. Unless there’s a scheduled visit or patrolling by a supervisor, there’s no way to monitor if the guards are alert on their job. Surprise visits to the premises are not a productive alternative either. The human body which is designed to retire at sunset starts to inevitably feel tired and dull during night shifts. Therefore, it makes sense to place your trust in systems, rather than a person to supervise the security personnel.

How cloud telephony can help

Automated Calls with IVR based check-in

T

o check if the guards are alert, a simple mechanism such as an automated call can be set to trigger at particular time intervals. These calls can solicit input from the guards to ensure that they’re alert. Alternatively, they can be imparted with small training modules in vernacular that are a minute long, asked a related question towards the end of the module, and solicit a response from them. SecurityLink India ■ July 2018

A lot has been said about the lack of training for the security guards. This is an interesting and engaging way to keep them alert and awake. Their call response is an attestation to their situational awareness and alertness. Actions can be initiated by the agency if they fail to respond or answer the call. This method is more proactive than reactive, and adheres to the urgency of the situation. Apart from these call check-ins that fall into a predictive pattern, surprise check-ins can be done by triggering calls at random times. This keeps the security officers alert and ensures they don’t nod off on duty. Automated check-in calls are a more sustainable solution, and the message or structure of the call can be changed every now and then to break the monotony, which is one of the major gripes of security officers.

Reminder calls for shift changes

A

utomated reminder calls can be set to go out an hour or 30 minutes prior to the shift, which ensures that the security officer is on time to


feature

relieve the on-duty officer. This reduces the chances of no-show or turning up late to the shift.

ensures no impersonation can take place, thus assuring the safety of the customer.

SMS updates to the customer

IVR to handle new/ potential customer queries

S

ince the shift rotation chart is prepared in advance, the details of security personnel on duty can be setup to be sent to the customer via an automated SMS message, which they can verify with the help of the personnel identification card. This

F

or a security services provider, it is essential to be available at all times and put the customer’s safety interests first. Instead of employing a full-scale call center solution, IVR auto-

mation can be introduced to answer FAQs. This helps to optimize existing resources better, while also ensuring that an agent does not have to be on-call at all times. A technology like cloud telephony can bring responsibility to this unorganized sector. What’s more – it is not a stand-alone solution. A virtual number that is obtained from a cloud telephony service provider can help provide all the features mentioned above.

VPNFilter Malware: What is known so far By Marina Kidron – Director, Threat Intelligence, Skybox Research Lab

A new destructive VPNFilter malware has compromised 500,000 networking devices worldwide

R

ecently, a malware known as VPNFilter was discovered infecting various types of routers. VPNFilter is a modular, multi-stage malware that works mainly on home or small office routers. Since 2016, when the malware was initially introduced, it has compromised more than 500,000 home and small office routers and NAS boxes. Infection of such a large scale could

allow the malware’s creators to utilize the affected nodes as a private VPN, making the trace back to the origin of a targeted attack very difficult. Though the infection vector is not yet clear, it is most likely to exploit known vulnerabilities affecting the various routers. There is no indication at present that the exploit of zero-day vulnerabilities is involved in spreading SecurityLink India ■ July 2018

this threat. Some researchers and other US governmental bodies such as the FBI link this attack to the constant cat-and-mouse game between Russia and Ukraine.

VPNFilter affected devices

D

evices infected by the VPNFilter malware include home and small 33


feature

office routers made by Linksys, MikroTik, Netgear and TP-Link, as well as network attached storage devices from QNAP.

Stage 1 – completes the persistence on the system and uses multiple control mechanisms to find and connect the Stage 2 deployment server. Stage 2 – focuses on file collection,

Magnitude of VPNFilter attack

command execution, data extraction,

V

possess a self-destruct capability to ren-

PNFilter has been active since 2016, affecting some 500,000 devices in more than 54 countries. During May of 2018, two major attacks have been spotted targeting devices located in Ukraine.

and device management. Some versions der itself unusable. Stage 3 – includes two known modules, possibly there are more to come: ●● A traffic sniffer to steal website credentials and monitor Modbus SCA-

Threat behind VPNFilter

T

he FBI hints to readers in its post that the VPNFilter malware attack could be the work of Sofacy Group, also referred as APT28, Sandworm, X Agent, Pawn Storm, Fancy Bear and Sednit. They have also seized a key domain that was used to infect home routers. It was also noted by Cisco researchers that the pattern of the attack indicates that the malware is part of a state-backed effort to create a versatile and effective botnet or data harvesting campaign, and shows the hallmarks of previous Eastern European malware efforts. Additionally, parts of this malware overlap code from the BlackEnergy malware which was responsible for multiple large-scale attacks that targeted devices in Ukraine, which was also attributed to a Russian governmentbacked threat actor.

DA protocols. ●● Tor to communicate with anonymous addresses.

How to prevent VPNFilter attack on the router

S

teps to protect against this malware are very generic and include the fol-

lowing:

How Skybox Security can help defend your network

S

kybox Security can help identify vulnerability on a network quickly and provide recommendations for patching or other forms of mitigation – based on security controls such as firewalls and intrusion prevention systems (IPS). For this purpose, information about the vulnerability is analyzed in the Skybox Research Lab. A team of security analysts scours dozens of public and private safety data sources every day and investigates websites on the dark web. This allows Skybox to provide validated and up-to-date threat information. The Research Lab also provides vulnerability information regarding exploitability levels, exploitation preconditions and effects, and configures attack patterns to be used in Skybox’s patented attack simulations. By means of a vulnerability as-

●● Reboot your device; if the device is

sessment without an active scan, the

infected with VPNFilter, rebooting

existence of vulnerability in a cus-

will temporarily remove the destruc-

tomer environment is to be derived.

tive elements (outlined in stages 2 and 3 above). ●● Perform a hard reset of the device, restoring factory settings to wipe it clean (removes elements from stage 1 above). ●● Make sure you have the latest firmware installed. ●● Change the default password on the device.

Vulnerabilities are then integrated into an attack surface model that includes the network topology, security controls and resources. The model performs attack simulations using information feed data to identify vulnerable assets directly or indirectly exposed to a potential attack. With Skybox, customers can quickly respond to threats such as theVPNFilter malware. Instead of focusing solely on

VPNFilter infection process

●● Turn off remote administration. In addition to the above general pre-

analyzes more factors than any other

M

vention methods, the FBI are likely to

solution to determine the risk of attack.

begin the process of helping ISPs and

This can prevent an exploit like this

end users disinfect devices.

from becoming a risk for companies.

cAfee has provided a write-up on VPNFilter’s three-stage infection process: 34

SecurityLink India ■ July 2018

the severity of the vulnerability, Skybox



white paper

Cybersecurity Trends 2018 Perspectives on Cybersecurity in an Increasingly Digital World By Norman Hübner – Press Officer IT, Telecommunications & Information Security, TÜV Rheinland

H

ow can businesses better protect themselves from the increasing volume and complexity of cyberattacks while preparing for the opportunities of automation and digitalization of industries – this is the burning question of the day and our goal is to raise awareness to help them address it. This article focuses where we see the most significant threats and opportunities emerging, and highlights the implications of the increasingly connected world, how global regulation is responding, the need to inject trust into cybersecurity, ways to protect ourselves from intelligent cyberattacks, and what we should do to close the skills gap in an environment starved for cybersecurity talent, yet overwhelmed by volumes of data. The leading cybersecurity experts from TÜV have forecasted eight challenges that organizations will cope with in coming times. The forcast is based on a survey of TÜV Rheinland’s leading cybersecurity experts where inputs were collected from clients in Europe, North America and Asia. Following are highlights of the 8 cybersecurity trends identified this year:

Trend 1: A rising global tide of cyber-regulation increasing the price of privacy

D

ata protection is a critical concern in an increasingly digital world and May 25, 2018 is a turning point for data protection in Europe. It marked the end of the transitional period for the EU General Data Protection Regulation (GDPR) as it becomes enforceable by law. It disrupts data governance and how information is protected for any organisation controlling or processing EU citizen personal data, and leads a growing list of emerging data protection regulations from around the globe. 36

Data protection is a critical concern in an increasingly digital world

A

s business undergoes digital transformation and becomes increasingly connected, cyberattacks continue to grow in both sophistication and volume. Recent highprofile cyberattacks have showed just how vulnerable organisations are. The ransomware WannaCry infected more than 300,000 computers across multiple organisations, countries, and continents in less than 48 hours. 87 million Facebook profiles harvested by political consultancy Cambridge Analytica is being dubbed one of the most consequential data breaches in history, rivalling the breach of financial records from Equifax. These attacks predict a dark future for privacy.

SecurityLink India ■ July 2018


white paper

 In April, an anonymous group called the Shadow Brokers leaked a suite of hacking tools suspected to belong to the US National Security Agency. In July, attackers stole the personal data of 145 million people from Equifax. WannaCry and NotPetya ransomware outbreaks followed and spread to over 150 countries, contributing to suggested ransomware payments exceeding $2 billion in 2017, and FedEx attributing a $300 million loss to the NotPetya attack alone. Both of these infamous ransomware attacks exploited the vulnerability leaked by the Shadow Brokers. Most recently, revelations of harvesting of user profiles from Facebook has highlighted the far-reaching risks that stem from the misuse of our most personal information. It now seems easier than ever to create malware or ransomware, or gain access to personal data  GDPR disrupts the data governance and how information should be protected

I

ncreasingly, organisations must be able to prove that they are processing personal data in accordance with the legal requirements of this evolving regulatory environment. GDPR introduces a number of key components including extra-territorial reach over EU data, individual right, data privacy officers, notice and consent, restrictions on secondary users, privacy impact assessment, and data breach notification. These requirements are forcing organisations to rethink data governance, systems architecture, documentation and data loss prevention.

Failure to comply could result in fines of up to 4% of global turnover

T

he related business risk is material. In the event of noncompliance or contravention, the EU is envisioning sanctions amounting to four percent of the previous year’s turnover, or EUR 20m, whichever is the greater. Weaknesses in technical and organisational data security such as outdated encryption standards leave organisations vulnerable to these fines.

Many organisations are underestimating the extent of such requirements

F

ew organisations are going to be ready by the impending deadline. Most, having underestimated the extent of the requirements, are still developing their plan for GDPR compliance. Some have decided not to develop a plan, choosing

instead to treat non-conformity as just another operational risk to be managed – perhaps doubting the seriousness with which the EU commission will enforce it. Others are not sure if the regulation applies. As a result, the majority of organisations are starting late with implementation.

An emerging list of data protection regulations from around the globe

G

DPR is leading a global trend as European regulators are not alone in mandating greater accountability at the executive level. The USA, Argentina, Brazil, Switzerland, Africa, India and China – all are revising their data protection regulations. Many share similar concepts like informed user consent and data breach notification obliging organisations to notify the relevant authority and all affected data subjects when a breach occurs – an often costly exercise. Yet this also leads to fragmentation and emerging market barriers driven by territorial requirements for data protection and data flows across borders. For global organisations, this will make international operations an increasingly costly and complex challenge.

Trend 2: The Internet of Things drives the convergence of safety, cybersecurity and data privacy

T

oday, product development, time to market considerations, and technical power constraints leave IoT devices exposed by exploitation of critical vulner-

SecurityLink India ■ July 2018

37


white paper

abilities. The impact of data breaches now extends far beyond simple data monetization to kinetic threats to health and safety, as devices and systems are directly connected to open networks. It is widely accepted that the state of IoT security is poor and with over 500 connected devices expected to cohabit with us in our homes by 2022, these represent a major risk to safety, cybersecurity and data privacy.

Mirai proved that IoT devices can be effectively weaponised as botnets

O

n October 21, 2016 a massive Distributed Denial of Service (DDoS) attack hit DYN Inc. and temporarily disrupted much of the internet on the East Coast of the United States. It affected companies like Twitter, Spotify, Amazon, Netflix, Reddit, the Guardian, CNN, and the New York Times. Formed mainly of hacked IoT devices, the Mirai botnet was a wake-up call about the vulnerability of internet connected things to cyberattacks.

Commercial and technical constraints leave IoT devices vulnerable to exploits

M

any IoT devices are fundamentally insecure, leaving product manufacturers and customers exposed to the inherent risk of cyberattacks. This should not come as a surprise as manufacturers are not in the business of cybersecurity. Instead, they are under increasing pressure to innovate faster than the competition, while protecting their margins. Ensuring devices are easy to produce, functional, connected and secure – while limiting power consumption to extend battery life – is a complex technical challenge leading to difficult trade-offs.

Vulnerabilities often reside deep in the product software stack

T

o save time and money, software developers use open source code libraries rather than reinvent the wheel for basic features. These 3rd party libraries can be a source of critical vulnerabilities. A good example is the Devil’s Ivy vulnerability, recently found in the gSOAP toolkit that is often used by manufacturers to connect their devices to the internet. It is estimated that over one million devices exist that are vulnerable to the Devil’s Ivy stack buffer overflow exploit. 38

 As businesses continue on their digital transformation journeys and we continue to integrate smart devices into our daily lives, cybercrime increasingly represents a major threat to society  The impact of data breaches now extends far beyond simple data monetization

W

e are increasingly living in one integrated digital system aimed at improving the quality of our lives. But consumers simply do not have the knowledge to protect themselves from these vulnerable IoT ecosystems. Product manufacturers who neglect cybersecurity and data privacy concerns are delivering their customers into the hands of cybercriminals. In a world of cyber-physical things, this is a threat to personal health and safety, not just personal information.

Hackable medical devices endanger patient lives

L

ast year, the FDA confirmed that St. Jude Medical’s implantable cardiac devices, including pacemakers and defibrillators, were vulnerable to cyberattacks. Attackers could gain control of devices via accessing the transmitter that reads device data and sends it back to physicians. Another example is that of a baby heart monitor where a nun encrypted Wi-Fi network between the monitor and sensor left it vulnerable to cyberattack. Attackers could take control of the system and monitor a stranger’s baby and stop alerts being sent to the parents.

Hackable cars leave passengers at the mercy of their attackers

I

n 2015, a team of researchers was able to take complete control over a Jeep SUV. The vehicle’s CAN bus was hijacked over the cellular network by exploiting a firmware updates vulnerability. The researchers were able to remotely speedup, slow down, and even steer the vehicle off the road. More recently, a new vulnerability in CAN protocol was reported that is not only nearly universal, but can be exploited while bypassing the auto-industry’s attempts at cybersecurity controls. It allows attackers to shut off critical safety and security systems including air bags, antilock brakes and door locks.

SecurityLink India ■ July 2018


white paper

Trend 3: Operational Technology emerges as a frontline for cyberattacks

T

technology networks will bring unprecedented opportunities along with new risks.

To compete means to move process equipment online

he industrial internet is already transforming global industry and infrastructure, promising greater efficiency, productivity and safety. To compete means to move process equipment online, often unwittingly exposing component vulnerabilities to cyberattacks. Manufacturing plants are targeted to obtain intellectual property, trade secrets and engineering information. Attacks on public infrastructure are motivated by financial gain, hacktivism, and national state agendas. Fear of a worst-case scenario where attackers trigger a breakdown in systems that underpin society, was highlighted this year at the World Economic Forum. Industrial systems are particularly susceptible to supply-chain attacks, adversaries have recognised this and are targeting them.

F

The industrial internet is transforming global industry and Infrastructure

T

F

or the past 15 years, the internet has been transforming the business to consumer relationship, democratising information-based industries such as media, retail and financial services. For the next 10 years, it is set to disrupt physical industries manufacturing, energy, transportation and agriculture. Dubbed the ‘Industrial Internet,’ the trend to integrate information and operational

or decades, measurement data has been used by industrial sectors to improve productivity and competitiveness, and to save energy. At its most basic level, current data is compared to historical data to determine how processes should be run. Analytics provide recommendations, enhancements, and warnings to support decision making. The next big step for industrial evolution is to move measurement data outside of the facility and into the Cloud. This way information from process equipment from all over the globe can be combined, leading to new opportunities for competitive advantage.

Fear of a ‘worst-case scenario’ is highlighted by the world economic forum he volume and sophistication of cyberattacks is escalating, having almost doubled over the past 5 years. Historically, industrial systems were standalone and not connected to corporate networks or the internet, but in an increasingly connected industrial world, cybercriminals now have exponentially greater number of potential targets. As a result, there is a growing trend to attack critical and strategic infrastructure across the world including government, railways, banks, telecom-

SecurityLink India ■ July 2018

39


white paper

munications, energy, manufacturing and hospitals; raising fears that, in the worst case scenario, attackers could trigger a breakdown in the systems that keep society functioning.

Manufacturing plants are targeted to obtain trade secrets

A

s the volume of cyberattacks increases, manufacturing is becoming one of the most targeted industries. Just over a third of documented cyberattacks are targeting the manufacturing industry, with manufacturers appearing in the top three targets in five out of six geographies. This is because of the fierce competition in a sector where intellectual property is at a premium, yet investment in cybersecurity is lacking due to commercial focus on productivity and efficiency.

Public infrastructure attacks have destructive motives

O

ften overshadowed by the sheer scale of personal information being stolen by cybercriminals in the enterprise sector, cyber espionage groups are continuing

40

to escalate their access to public infrastructure across the globe. For the past decade destructive attacks have been increasingly targeting a variety of organisations and critical infrastructure, but with a definite ‘spike’ in the past 18 months. The ‘Crash Override’ malware was used to attack the Ukraine power grid and was able to take control of grid circuit switches and breakers. More recently, attackers breached nuclear plants in order to map out computer networks and process control systems for future attacks.

Targeting of supply chains is an emerging threat

I

ndustrial processes depend on a regular supply of resources and logistical support. Attackers have recognised the importance of supply chains and have started targeting them with interception, infiltration, counterfeit and disruption. This can be demonstrated by the impact of cyberattacks on the global logistics industry. Last year, FedEx and AP Moller-Maersk reported combined business losses of nearly $600m after being hit by Ransomware and ‘Wiper` virus attacks. As supply chains become more global, the risks from intentional insertion of malicious functionality increase.

SecurityLink India ■ July 2018


white paper

Additional budgets are required to address rising compliance requirements

I

n this context, organisations will need to allocate additional budgets to detection technologies and incident response, as opposed to prevention technologies only. Artificial intelligence (AI) and predictive analytics for cyber risk management of operational technology will be adopted. Compliance requirements from regulators to secure critical infrastructure will rise and increase the cost of compliance for operators. Regional and industry specific standards will bring clarity to the compliance regimen. Privacy regulations like GDPR will find its way into this domain where operators will be faced with a unique set of challenges around managing data protection and privacy especially with IIoT (Industrial Internet of Things).

Trend 4: With cyber defences in place, focus shifts to threat detection and response

R

ecent cyberattacks on high-profile organisations are proving that preventative controls alone are not enough against the sophisticated and persistent cybercriminals. Today, organisations take too long to detect a data breach. Due to the vast growth of security log data, limitations of incumbent technologies, ineffective use of threat intelligence, inability to monitor IoT devices, and shortage of cybersecurity talent, organisations are exposed to costly dwell times.

Organisations continue to take too long to detect a data breach

T

he faster a data breach is detected and contained, the lower are the costs and impact on reputation and business value. Cybercriminals take a matter of minutes to hours to compromise a network and extract basic data, or days to weeks to identify and steal critical data. However, organisations take on average 191 days to detect a breach and 66 days to contain it. Organisations that can get their detection time below 100 days can save over $1m. Furthermore, when a data breach is disclosed, stock price declines immediately by an average of five percent in line with customer confidence.

Traditional approaches to threat detection are cumbersome

T

raditional approaches are built around security information and event management (SIEM) solutions. Unlike

security cameras that go straight from installation to insight, traditional SIEM solutions are plagued with painful implementation, limited scalability, difficulty in integrating data sources, and convoluted reporting process. This is exacerbated by the fact that the amount of data analysed by security teams is doubling each year, and shifting towards unstructured.

The cybersecurity skills shortage is getting worse

I

T organisations continue to cite cybersecurity as the biggest area where they have a problematic skills shortage. Looking back through the ESG’s annual global survey on the state of IT shows an alarming growth of the issue – more than doubling from 23% of organisations in 2014 to 51% in 2018. It is expected that there will be 3.5 million unfilled cybersecurity jobs by 2021. More than half-million of these are predicted to emerge in the U.S. The cybersecurity skills shortage is getting worse and there is no evidence to suggest it will slow down in the foreseeable future.

Rapid cyber-threat detection and accurate response requires a new approach

M

odern malware and sophisticated cyber-threats require a proactive, agile approach to replace traditional SIEM solutions. Traditional solutions work to detect known threats within fixed enterprise network perimeters using signature-based techniques that are no longer effective. To materially reduce detection times and accelerate containment, organisations will increasingly adopt advanced security analytics. This new approach uses machine data to identify anomalies from a pre-determined baseline of usage behaviour across the dynamic landscape of the modern digital enterprise.

Barriers to effective use of threat intelligence remain

I

n an environment of ‘big security data,’ the combination of advanced threat intelligence and a team of security analysts can lead to actionable insight. Threat intelligence is not a technology but the knowledge about adversaries, their means, motives and intentions. It should be disseminated in a way that supports cybersecurity teams and the business to protect the critical assets of the enterprise. Yet, even the most cutting-edge threat intelligence is ineffective if you do not have the people with the knowledge, skills and experience to do something with it.

SecurityLink India ■ July 2018

41


white paper

Trend 5: Increasing use of Artificial Intelligence for cyberattacks and cyber defence

A

s organisations undergo a digital transformation, there is a growing volume of increasingly sophisticated and persistent cyberattacks. With a global shortage of cybersecurity talent, organisations are losing the cyber arms race. The volume of security data now far exceeds our legacy capability to use it effectively, leading to a growing number of AIenabled cybersecurity use cases – accelerating incident detection and response, better identifying and communicating risks to the business, and providing a unified view of security status across the organisation.

tack where rudimentary machine learning was used to study patterns of normal behaviour within a company’s networks. Once a baseline was established, the malware began to mimic normal network behaviour to become almost undetectable.

Cybersecurity leaders will defend against AI attacks by using AI

T

he next-generation of cyberattacks will use AI-based malware capable of reacting in real-time to evade cybersecurity controls and necessitate new defensive approaches. Cybersecurity professionals are looking towards advanced cyber defences which use AI to pro-actively respond to such attacks. AI-based security automation can detect and contain the same incident within minutes. It is, therefore, increasingly considered a critical component in a modern cybersecurity strategy.

Organisations are losing the cyber arms race

Turning to AI plugs the growing shortage of cybersecurity talent

G

U

one are the days when cyber-attackers were little more than annoying ‘scriptkiddies.’ They have graduated to well-funded organised cybercrime and nation-state actors. They are a legitimate and sophisticated threat that regularly disrupts organisations and governments alike. Cybercrime is very lucrative, low risk and global. It is not as if the cybersecurity industry is standing still, the attackers do keep winning. So by leaving vulnerabilities un-patched, we are making it too easy.

The volume of security data now far exceeds our legacy capability to use IT

M

ost large organisations have deployed and potentially integrated dozens of security technologies. The digital economy is connecting everything to everything else, leading to billions of new endpoint devices. As a result, we are generating so much security event log and alert information, that it is no longer possible to see the forest from the trees. This is making the job of protecting the organisation increasingly difficult, and perhaps represents an even greater risk than the escalating sophistication of cyberattacks themselves.

The era of AI powered cyberattacks has started

A

I threatens to exacerbate the already considerable cybersecurity challenge faced by organisations in an increasingly digital world. They are rare today, but we are seeing signs of AI-based advanced cyberattacks. Last year, we witnessed the first artificial intelligence based cyberat42

sing AI security teams can quickly make sense of massive amounts of security data, putting alert information and event logs into far greater context. This ability to prioritise and focus on the highest risk threats holds great promise for organisations trying to protect their critical assets with scarce cybersecurity resources. This will, however, lead to some defensive roles (tier 1 and tier 2 security analysts, or security operations centre [SOC] analysts) to be at risk of being replaced by AI in the next 5-10 years.

Trend 6: Certifications become necessary to inject trust into cybersecurity

I

t is broadly accepted that cybersecurity and data protection are of critical importance in an increasingly digital world, but how one can judge the effectiveness of an organisation’s cybersecurity posture. For CISOs and product manufacturers alike, certification validates you have done what you say you have done. Today, however, product security assurance certification schemes tend to focus on the critical infrastructure and government sectors only.

Effective cybersecurity is needed for a viable IoT-based digital economy

W

ith a growing share of services offered online, and the rapid proliferation of connected devices, it is increasingly apparent that cybersecurity plays a critical role in

SecurityLink India ■ July 2018


white paper

the viability of our digital economy. Protecting our digital ecosystems, from critical infrastructure to consumer devices must be a fundamental requirement for doing digital business. As a result, cyber-threats pose a serious risk to the fabric of contemporary society.

Leading to a growing concern for trust in cybersecurity

I

n fact, this year’s World Economic Forum Global Risks Report states that cyberattacks against businesses have doubled over the last five years. This year saw a significant jump in concern over cyberattacks and massive data fraud, with both ranking in the top five global risks by perceived likelihood. A Pew Research Center survey found that the majority (64%) of Americans have personally experienced a major data breach, and that many do not trust modern organisations to protect their personal information. The European Commission announced two initiatives related to certification and labelling – a security framework for ICT products, anda ‘Trusted IoT label’ giving information about different levels of privacy, security, and where relevant, demonstrating compliance with the directive on security of network and information systems (NIS Directive); adopted by the European Parliament in 2016.

Impacting the business ecosystems and supply chains

T

he ongoing digital transformation of business is leading to increasingly complex and networked ecosystems and supply chains, with the automotive industry being a good example. Here, the trusted information security assessment exchange (TISAX) audit is gaining traction. TISAX enables accredited providers to offer mutually accepted assessments based on the VDA (German Association of the Automotive Industry) information. Security assessment which, in turn, is based on a catalogue of information security criteria incorporating key aspects of international ISO/ IEC 27001 and 27002 standards.

Certification validates you have done what you say you have done

W

ith cybersecurity acknowledged to be of such critical importance, a key question arises how you can judge the effectiveness of an organisation’s cybersecurity posture. The existence of corresponding certification plays an important role, for example, in making a decision on whether to impose administrative fines, and on their amount. A certifica-

tion procedure can prove that the provisions of a new regulation have been observed and implemented in full.

Regulated certification schemes lag the market need

T

he concept of a security certification framework for products and services is a good one, but these should be done at a global level, if at all possible, and in such a way not to give a false sense of total security. National level schemes, for example, that define standards and evaluation methods and only recognise certification bodies within their own territory would create market inefficiencies. Recent experience with common criteria has shown that even if a pan-region approach is achieved, global support is required to avoid multiple regional certifications for one product.

Consumers need easy to understand transparent information

I

ndependent product evaluation can be a very resource intensive process and so tends to focus on high risk government or critical infrastructure products and services. This gives rise to process-based approaches including ISO/ IEC 27034, as well as certifications for specific types of systems such as ISA/ IEC 62443. But with pressure for even faster, cheaper product development lifecycles, agile assessment schemes, utilizing test automation environments will need to be created and evolved.

Trend 7: Passwords being replaced by biometric authentication

O

ur digital lives are ruled by a complex web of online apps each requiring a user name and password to control access. To protect the data behind these apps, selecting an obscure and complex password, and changing it often, is good practice, but it is quite rare. With exponential improvements in computing power, and easy access to lots of it in the cloud, the time it takes to brute force passwords is rapidly reducing. What took nearly 4 years in 2000 now takes only 2 months. Add to that the fact that stolen, hacked and traded passwords have never before been so openly available. As a result, it is increasingly commonplace to encounter biometric authentication (facial, fingerprint, iris and voice) included in everyday mobile, tablet and laptop devices, as well as physical access and online services.

SecurityLink India ■ July 2018

43


white paper

Password best practice is well known, but frustrating to follow

T

raditional best practice approaches to creating passwords has made us lazy. Making use of irregular capitalisation, special characters and numbers, and then being forced to change it every 90 days lead to passwords like ‘P@ ssW0rd123!’ Such passwords are hard to remember but relatively easy to guess. When faced with logging into an application after an extended period of time, it is frustrating to reset your password because you have forgotten it. The issue is that most people tend to use the same techniques when crafting passwords that leave them predictably vulnerable to password cracking algorithms that target those specific weaknesses.

Moore’s law renders passwords weaker over time

O

ver time passwords weaken dramatically as computing power doubles every 18 months, and cybercriminals become more proficient. For example, a password that would take over three years to crack in 2000 took just over a year in 2004, and five years later in 2009 just 4 months. In the modern era, passwords simply do not stand up against sophisticated cyber-threats. A third of cybercrime originates from stolen passwords, and over 1.5 billion passwords have been stolen.

An emerging theme from recent data breaches points the finger squarely at passwords

I

n many of the recent headline-grabbing data breaches, the attack vector has been a common password. This is not surprising how many people reuse passwords between accounts. For example, the breach of a White House contractor was made possible by him reusing the same password as his gmail account, which turned out to have been stolen during the Adobe breach in 2013. In fact, as many as two-thirds of data breach incidents are a result of leveraging weak, stolen or default passwords, and nearly all phishing attacks are after user credentials.

Biometric authentication determines exactly who is accessing a system

B

iometric authentication creates accountability. Every access or action is recorded along with the individual associated with it. This naturally reduces the risk of misuse, fraud and data leakage. Within the next few years, three bio44

metric options will become standard features in every new phone – a fingerprint scanner built into the screen, facial recognition powered by high-definition cameras, and voice recognition based on a large collection of a human vocal sample. The number of fingerprint reader-equipped devices has already passed a billion. Unlike passwords, there is no way for someone to forget his or her biometric credentials, and this information is very difficult to forge. On the downside, if the biometric credentials are ever compromised, it is very difficult to alter one’s fingerprint or their appearance.

Trend 8: Industries under siege: Healthcare, Finance & Energy

T

he majority of cyberattacks are undertaken by criminal organisations and are motivated by money. The value of information on the dark web depends on demand for the data, the available supply, its completeness and ability for reuse. As a result, healthcare and financial personal information are highly sought after. Medical records can fetch $1-$1,000 depending on how complete they are, while credit cards can fetch only $5-$30 dollars, if bundled with the information necessary to do immediate damage. Other cyberattacks have more political and nation-state motives.

Medical industry: Versatile challenges – growing spending

I

n 2017, cyberattacks struck hospitals and health systems at an alarming rate and the cybersecurity exposure is still growing. With the increase in the digitalization and use of healthcare information, the availability of consumer access to private health information (PHI), continued innovation and availability of consumer-focused health applications and devices as well as the growth of networked medical devices, the cyber exposure in the healthcare industry will rise. The challenges of cybersecurity in the healthcare sector are also versatile. Whether it is malware that compromises the integrity of systems and privacy of patients, or Distributed Denial of Service (DDoS) attacks that disrupt facilities’ ability to provide patient care, cyberattack scan have other results than only financial loss or the breach of privacy – the direct impact on human lives. Patient safety, financial loss, disruption of health services, reputation damage, and exposure to litigation related to cyberattacks remain the key risks for the medical industry in 2018. Organisations spend more to protect their systems and patient data. Cybersecurity Ventures predicts global healthcare

SecurityLink India ■ July 2018


white paper

cybersecurity spending will exceed $65 billion cumulatively over the next five years, from 2017 to 2021.

Financial sector: Increased volume and complexity of attacks

T

he area of financial services is relatively well-developed in terms of cybersecurity. This is also largely due to legal regulations especially in regard to risk management. Nevertheless, 2017 was a game changer. We saw an increased volume and complexity of cyberattacks due to the growth of cybercrime services in which advanced attack capabilities are sold to and leveraged by less sophisticated adversaries. Reported cyberattacks against financial services firms rose by 80 percent in the last year, reflecting the increasing number of attacks aimed at organisations. The risk of cyberattacks is also being amplified by the significant outsourcing done by investment dealers and asset managers.

Different attack vectors: One goal – money

D

ifferent cybercriminal groups penetrated bank infrastructures, e-money systems, crypto-currency exchanges, capital management funds, and even casinos, in order to withdraw large sums of money. In this context, the interception of bank customers’ electronic operations through the hijacking of bank domains in order to perform phishing attacks, install malicious code and wield the operations of customers who were using online banking services at the time appear already traditional. The main key events were continuous cyberattacks targeting systems running SWIFT, which affected several banks in more than 10 countries around the world. In addition, cybercriminals have been actively using ATM infections including those on financial institution’s own networks and PoS terminal networks to change card balances. Attacks on ATMs became so popular in 2017 that the first ATM malware-as-a-service was offered.

New unknown risks as a result of open banks eco-systems

I

n the future, it is expected that the financial sector will suffer further. Unknown risks will also arise as a result of the demand for further opening of banks’ eco-systems. Moreover, significant reputational damage is expected for financial organisations, when banks and insurers are forced to reveal any data breaches that occur in the context of the GDPR. The customer trust in banks and insurers still remains high, with 82 percent rating them among the most trusted institutions,

may be due to the practice that financial organisations fail to voluntarily share news of data security breaches. The great cybersecurity opportunity for financial organisations will be to cooperate and co-ordinate across the financial sector involving insurance, banking and security firms.

Energy sector: Attractive target due to its national and economic importance

T

he energy sector will be the prime target for cyberattacks, particularly companies engaged in alternative energy development, coal mining, nuclear energy development, natural gas distribution, oil and gas exploration and production, oil and gas field equipment manufacturing as well as oil and gas field services petroleum refining.

New quality of attacks

C

lassical data stolen from energy companies includes business process information, contract negotiations information, executive communication, market analysis and proprietary technologies. In 2017, Dragonfly was synonymous with a new wave of cyberattacks that could provide attackers with the means to severely disrupt affected operations. But the nature of attacks is changing. According to sources of the New York Times, hackers compromised computer systems at a petrochemical plant in Saudi Arabia in August 2017, aiming to not only destroy or steal data but to cause a deadly explosion – a new quality of an attack that could be replicated in other countries because the compromised systems are used in thousands of industrial plants worldwide. One of the recent events was in April 2018 when the energy industry of the UK was on alert for cyberattacks on UK power network. In this context, more and more governments worldwide are considering ways to optimise the police protection of critical infrastructure such as nuclear sites. A regulatory framework for cybersecurity in critical sectors is due to be implemented by May 2018 in the UK.

Serious impact on general supply security

T

he cybersecurity risks will grow. A decentralized energy supply system requires a distribution network which is nolonger based on conventional perimeter security. Smart grids represent a large number of gateways for advanced persistent threats and DDoS attacks. Increasing pairing of mobile private devices with low perimeter security involves considerable malware risks e.g., in the case of WannaCry, which may also have serious impacts on the common good and general supply security.

SecurityLink India ■ July 2018

45


2018. September 19, 20 & 21 BOMBAY EXHIBITION CENTRE - MUMBAI, INDIA

Unique pla orm with unparalleled business & networking oppo unity for professionals involved in the Safety and Security Industry

www.capex.co.in / www.future-cities.in For space booking, pa nership, delegate registration and speaking oppo unities: Vijay +91 98 3377 2109 / vijay@fai est.in Nikita +91 98 1910 7179 / nikita@fai est.in *Future Cities is the mega event that will present for the first time in India a 360 degree vision of the built environment: Municipalika - 15th edition of Sma & Sustainable Urban Solutions CAPEx - Innovative Building Materials & Technologies IIPM - India's first and the only B2B event for the real-estate sector


feature

The Rise of IT Department & Integration with Identity Management By Jim Dearing – Analyst, Access Control & Fire, IHS Technology

C

onvergence has been a continual trend in the security industry for over a decade. It began with simple integrations of similar types of security equipment such as adding video cameras to an intrusion system or break-glass detectors to an access control system. The level of integration, however, has quickly evolved – now physical security is being integrated with systems designed with functionality outside of security applications. End users are no longer satisfied with a lack of return on investment from security equipment. Rather, their priorities have shifted from wanting to improve the effectiveness of their security systems toward finding new ways to earn a positive return on investment from these very systems. Historically, physical access control has always been a local, on-site responsibility for those in charge of security management. This is due to huge variations in the methods used to secure buildings, both regionally and by building type. As such, it has always been difficult for larger enterprises to roll out ‘one-size fits all’ access control solutions across multiple sites because of huge variances in the

requirements for a given system. The result therefore is that end users responsible for managing these systems now require different training or must issue multiple credentials for multiple locations. Many of these pain points and inefficiencies could be eliminated if credentials are managed centrally; this is where logical integration becomes beneficial. Despite companies often possessing multiple access control systems (each with their own unique database of access rights), they also often have a central database, known as an active or corporate directory. An active or corporate directory is a database that companies use to keep track of employees, contractors, and even customers for a variety of purposes including human resources or IT login credential management. As this database spans multiple sites, it could potentially be used to pull user credentials to create physical access control credentials for the entire enterprise. There is already a wide variety of different levels of logical and physical access control integration. However, pulling physical security access rights from the corporate or active directory is essenSecurityLink India ■ July 2018

tially doing so in its most basic and simple form.

Features and benefits of integrating these two systems

●● Automation of credential management: Rules-based access control can be implemented by automating system assignments. For example, when a new user is added from the corporate/ active directory, the system can also look every attribute (location, job role, time with the company, etc) associated with the employee. The system then sets default access rights depending on an employee’s attributes. This can greatly speed up the process of adding new users, and it also helps sync access rights with the company’s corporate structure. ●● Unifying credentials: Integrating logical and physical security systems also creates more opportunities to unify credentials. Access control badges or cards can be used for additional functions outside of physical security. Examples include using the credential for two-factor authentication 47


feature

when accessing the IT network, secure printing, or micropayments in the company cafeteria. ●● Improved auditing capabilities and increased accountability: Across an enterprise, the summation of access right changes, on-boarding/off-boarding, and temporary access rights provisioned from its access control system equals a huge volume of requests each month. Without an overarching system, the methods available to senior management for accessing and reviewing logs are limited and inefficient. ●● Corporate governance integration and automation: Logical integration provides the potential to roll out uniform governance across all of the company’s access control systems by enforcing company policy through identity management. Policy checks can be programmed into permission requirements, allowing companies to ensure that best practices are followed. The system also allows the company to verify whether policy was followed, further increasing accountability among employees.

Barriers to further adoption

● ● Cybersecurity concerns: Connecting every access control system to the IT network, and also

managing all of the identities associated with the company via a single system creates huge network risk. If the system is hacked, every identity associated with the company is quickly compromised. Additionally, connecting all the new devices offers hackers new routes into the network, which means that all of the hardware’s software needs to be updated regularly to reduce cybersecurity risk. ●● The lack of an ‘off-the-shelf’ solution: Logical integration projects often require large commissioning and design efforts because they are highly complex both initially and after implementation, particularly with respect to maintenance. This means there is a cost involved for the entire lifecycle that the system remains in place. ● ● Lack of developed identity management infrastructure: Many smaller-sized enterprises lack identity management platforms capable of supporting physical access management. And with many larger-sized projects, end users often find that their current authorization policies and best practices have not been updated since they first adopted the identity management system. The result is that these systems must be updated before being integrated with physical access.

Need Buy-in from IT on the Next Security Install Here’s 3 Reasons to Recommend March Networks

W

ith increasing concerns about cybersecurity, it’s no surprise that many organizations are expanding the role of their IT departments. Cyberattacks are now rated one of the top risks to global business, alongside natural disasters. Because no business wants to be the victim of a data breach, organizations are working hard to bolster their cyber defenses, and those responsibilities fall squarely on the shoulders of IT. As a security integrator or installer of network video recorders and IP cameras, one must be able to answer questions 48

from IT on how the system he is installing could impact network security, as well as day-to-day network operations. In the past, it may have been dealt solely with the customer’s security department but in many organizations the physical security and IT departments are becoming more tightly integrated, so speaking the language of IT can go a long way toward satisfying the customers’ overall requirements. Having IT’s blessing could also help free up budget for the installation.

SecurityLink India ■ July 2018


feature

In some organizations, IT has decision-making power because they are tasked with improving businesses processes and driving revenue through new technology. If one partners with a video surveillance manufacturer that delivers business intelligence (BI), he will have a more compelling case for the value of video, and how investing in the right solution can help that organization’s operations and marketing departments, in addition to security. Looking at all of this through the lens of IT, here are three important points to remember about March Networks products:

1. March Networks takes a proactive approach to cybersecurity

M

arch Networks has a 3-step process for dealing with cyber threats. Once they become aware of a potential critical vulnerability (through a U.S.-CERT notification or other source) we are committed to: ●● Immediately assessing the vulnerability to determine if it affects their products; ●● Addressing the vulnerability via a patch or software release, if required; and ●● Communicating with their partners. The March Networks security updates and advisories program helps facilitate this process in a transparent way, as notifications are posted directly on their corporate website. Both partners and end user customers can sign up to receive alerts each time the webpage is updated with a new advisory. In addition to this program, March Networks equips the certified partners with innovative tools like their GURU Smartphone App, which can help with cybersecurity. GURU’s Security Audit feature automatically analyzes and rates how secure the configuration of installed March Networks recorders are, based on the firmware the recorder is currently running. It then provides advice for hardening the installation such as changing a password or closing ports that don’t need to be open, or upgrading to a new firmware release.

2. Helping minimize the impact of video on network performance

V

ideo can eat up a lot of bandwidth, especially when IP cameras are involved. Although the exact amount of bandwidth consumed by a video surveillance system is determined by many factors

including camera type, resolution, bit rate etc., March Networks’ products have features that can minimize video’s impact on the customer’s network. For example, their recorders accommodate secondary networks so one can keep IP camera traffic on a separate local area network (LAN). March Networks’ recorders also support secondary stream recording, so the customer can record both a high resolution video stream for evidentiary purposes, and a low resolution stream for remote viewing using less bandwidth. Another handy resource is their system design tool, which can help as the installers calculate the bandwidth and storage resources required when using their IP cameras. These simple calculations can help one find the best resolution possible with the network resources available. He can also take advantage of features like the low bit rate setting on our ME4 series IP cameras, which automatically manages the bit rate, and can reduce data consumption by as much as 50%.

3. The enterprise management features simplify device management

F

or large, multisite customers, device maintenance can be a headache without the right kind of video management software. Just imagine manually applying software or firmware patches to hundreds or even thousands of cameras and recorders. That could take weeks, or even months, and result in considerable expense. March Networks Command Enterprise video management software makes it easy to update multiple March Networks recorders and cameras simultaneously from one central location by allowing one to push mass updates and configurations with a few clicks of a mouse. Command also allows system administrators to schedule these updates in the evening or weekend, so as not to disrupt network operations. With features like these, the IT department can delegate device maintenance to the security system administrator, and relax knowing that the latest updates are being applied. Making IT’s job easier is really what it’s all about. Offering a solution that’s easy to use and maintain, and that demonstrates a commitment to high cybersecurity standards, will go a long way toward satisfying IT’s concerns. Remember these three points in the conversations with customers, and know that March Networks is always happy to answer the questions.

SecurityLink India ■ July 2018

49


application/ case study

Romania Opens State-of-the-Art Football Arena Meeting international standards, Bosch equips Craiova Stadium with premium safety and security systems

O

fficially inaugurated in October 2017, Ion Oblemenco Stadium in the Romanian city of Craiova is the country’s most modern football arena at a capacity of over 30,000 seats. The futuristic stadium, inspired by the art of Romanian sculptor Constantin Brâncuși, was built from the ground up over the course of two-anda-half years at a total cost of EUR 51 million. It is home to football club CS Universitatea Craiova and was ranked fourth on the Stadium DB website’s list for Stadium of the Year 2017. The high-profile project was built with a clear goal – hosting international and premium league matches not only in the Romanian capital of Bucharest, but also in the city on the river Jiu. For this reason, the municipality of Craiova required a stadium security solution at par with stringent guidelines – according to the year 2020 European football championship standards – to guarantee safety during mass events. Looking for a trusted vendor with sports stadium experience, plus the ability to deliver the majority of necessary equipment as a single point of contact, Craiova officials opted for Bosch. Working closely with the on-site team, Bosch experts installed a fire and safety solution composed of four fire panels and 1,500 detectors. The stadium also received a quality sound system with elec50

tro-voice pro sound speakers for music and commentary, Dynacord Promatrix for evacuation, and Bosch loudspeakers for interior sound, as well as a conference and interpretation system for the pressroom. However, the real ‘kicker’ of the football stadium installation is the comprehensive video security solution: Ion Oblemenco Stadium boasts a fully integrated Bosch video security system including 211 cameras, centrally managed on a single platform through an enterprise edition of the Bosch Video Management System (BVMS). The networked cameras serve a wide range of functions at entry and exit points, and areas surrounding the stadium. On the perimeter, 115 robust DINION IP bullet 5000 cameras watch central avenues leading to the stadium, while 86 discrete FLEXIDOME IP 5000 cameras monitor visitors. For added security, eight AUTODOME IP 7000 cameras – two on the stadium outside, six inside – safeguard the surroundings with on-board intelligent video analytics (IVA) which allows for ‘smart’ video SecurityLink India ■ July 2018

surveillance functions. For instance, intelligent tracking automatically tracks moving objects based on predefined alarm rules. Besides automatic tracking of objects of interest once certain predefine rules, like loitering, security operators in Craiova can also manually track groups of football fans or follow specific individuals. Video streams of all 211 cameras are monitored in a central security room, manned by operator personnel and members of Romania’s police during matches. Video data is safely stored on two Bosch DIVAR IP 7000 network video recording units with a total of 256 Terabyte storage capacity. The recorders feature video recording manager (VRM) software to increase reliability and reduce storage volumes and costs by automatically balancing the video stream load to the free available storage devices. Also the recording units support forensic search enabling security operators to quickly retrieve the relevant video data from hours of stored video to deliver irrefutable evidence. Craiova officials are satisfied with the easy-to-use and cost-efficient solution. Because Bosch products fulfilled international guidelines, the stadium is now fully certified to host matches of the First Romanian Football League, European league matches, Champions League and national team matches.


application/ case study

KKB Anadolu Data Center Adopts Costeffective Matrix Data Center Solution K

redi Kayıt Bürosu (KKB) was founded by the then nine leading banks of Turkey on 11th April, 1995, which is a highly regarded financial institution in Turkey and has a total of 156 members. The KKB Anadolu Data Center is located in the capital city of Ankara across 43,000 square meters of land, comprising three main sections. The facility is equipped with protection systems against lightning and earthquake.

Issues

T

he data center has cabinet system in place while access to data racks require biometric authentication. The center is equipped with numerous data racks for which they required a display device at the entrance. Each rack was locked with physical locks but the center required a cost effective solution that did not include a device for each Solution Diagram

rack. Moreover, they required devices that supported both smart card authentication as well as door locks. The center authorities were looking forward to provide the supervisors with an additional option of authentication through RFID cards. With respect to gaining access, they wanted a solution that would grant access through two steps, biometric authentication and physically opening the locking system. Finally, the center wanted a solution that could alert them in case of situations such as a door being left open.

Solutions provided

M

atrix, in association with SouthCo, provided the KKB Anadolu Data Center with the following solution: To enable a display device at the entrance, integrated with the biometric device Matrix integrated data center solution with a touch screen display. Whenever any user tries to access the data center with their biometric credentials, the touch screen would display a list of racks the respective user is authorized to access. From the display, the user would be allowed to choose the racks he/ SecurityLink India ■ July 2018

she would like to access. Once the user is granted access into the chosen racks, they will be allowed to access the same for a pre-defined period of time. User based access ensures the security of sensitive company data. They also installed 200 COSEC ARCs at the entry/ exit of racks between 400 SouthCo locks, one between two door locks, making it a costeffective solution for the center. Additionally, the COSEC ARC also provides the admin personnel with real-time notifications such as SMS or email notifications in case of any mishaps such as an open door, a forced opened door, door being left open etc. The personnel can also gather customized reports on events like who, when and which rack was accessed.

Results

●● Maintenance of diverse data. ●● Foolproof security with biometric user-wise rack access. ●● Accurate records of who accessed data center at what time. 51


application/ case study

Senegal’s New International Airport Chooses Smart Surveillance & Car Park Management Effective access S management T Parking management T

enegal’s new Blaise Diagne International Airport has chosen to minimise its parking lot headaches and secure its massive freight zone with intelligent smart surveillance from Hikvision. Officially opened by Senegalese President Macky Sall in December 2017, Blaise Diagne International Airport (AIBD) covers 4,500ha of land located near the town of Diass, 47km from the capital of Dakar. Built at a cost of $575 million, the new airport is one of the largest travel hubs in West Africa, with a main runway designed to accommodate long-haul aircraft such as the A380 and B787. Approximately 3 million passengers are expected to travel through AIBD annually, increasing to 10 million by 2035. With a two level 42,000m2 main passenger terminal and 12,800m2 cargo terminal building designed to handle 50,000 tons of cargo and 80,000 aircraft movements annually, the new airport of-

52

fers a long-term solution to intra-African economic activity, providing excellent levels of aviation connectivity.

o address the security, efficient management and profitability objectives of the airport’s 17 car park entrances and exits, operator Senecar enlisted the help of Hikvision authorised distributor, CST Securite, which capitalised on the support of the Hikvision Technical team, and all parties worked to confirm the final specification to meet the needs of the airport’s car parking and freight zone security surveillance, and site management requirements. Drawing on specialist products from Hikvision’s Smart Parking Management Solution, for the airport’s car park areas, CST Securite installed 17x DS-TCG225 2MP HD resolution ANPR cameras, featuring built-in whitelist, LPR identification support, barrier/ gate control and audio output.

SecurityLink India ■ July 2018

he Hikvision smart parking management system employed at AIBD uses the latest barrier technology combined with Hikvision industry-standard ANPR (Automatic Number Plate Recognition) to ensure seamless, managed vehicular entrance and exit from parking lots. Fast vehicle identification and integrated barrier control software means queues are kept to a minimum – which means greater vehicle flow can be handled to increase the productivity and efficiency. The Hikvision Darkfighter and True WDR imaging technologies employed in the airport’s ANPR system are specified to deliver crisp and clear recognition, alongside a recording of every vehicle using the car parks day and night. A development beyond traditional technology, the airport’s car park barrier activation is not driven by traditional sensor coils in the floor (that detect a vehicle waiting to enter or exit), but by highly accurate ‘radar’ sensors. This technology enables far simpler installation and maintenance, as no ground works are required to dig across roadways or pedestrian pavements to install the traditional sensing coils and their cables. Additionally, the Hikvision radar solution is not affected by local environmental influences such as light, dust or rain that can inhibit the performance of traditional sensing coil based solutions. Helping Senecar to maximise their operation, the system provides invaluable statistical and analytical parking lot in-


application/ case study

formation, supplying status history, parking usage rate and parking vehicle flow, to name but a few. Underlining the advanced performance capability of the Hikvision smart parking management system, a range of configurable alarms helps the ANPR system operators to manage daily activities such as unauthorised parking, overtime parking and illegal access, which all helps support highly-effective vehicle and security management.

High-level freight security

A

IBD’s cargo terminal building located to the south-west of the runway accommodates the airport’s freight handling, and incorporates a number of storage areas, freezers, office facilities and electromechanical service areas. To integrate with the airport’s mix of security measures and site management, CST Securite liaised with the airport security team to identify the most advantageous locations to install the freight zone cameras. Designed to capture a comprehensive view of all key internal and external areas, a mix of Hikvision DS-2CD2T42WD 4MP/ DS-2CD2T22WD 2MP full HD EXIR bullet network cameras with built-in IR to 50m, and DS-2CD2142FWD 4MP/ DS-2CD2122FWD 2MP full HD vandal-resistant network dome cameras with built-in IR to 30m and edge storage – all with IP67 protection have been installed. Supporting the Hikvision cameras’ high-performance imaging, their on-board VCA alarm activation parameters was set-up for individual camera scenes, to provide automated alarm activations and situation awareness of any predetermined set of events within each cameras’ view. To provide the airport’s security and management teams with effective real-time and playback monitoring, at the control room, Hikvision NVR-7332NI-E4/ 16P, embedded plug & play NVRs and a DS-7716NI-I4 NVR were installed to provide up to 6MP resolution recording. Simple and intuitive systems control is provided by Hikvision’s iVMS-5200E Control software, enabling all aspects of the surveillance system to be managed effectively. Commenting on the AIBD installation, Kevin Zhu, General Manager of CST Securite said, “Having used their products many times before on other high-profile projects, we had no doubt that the choice of Hikvision surveillance products would provide the customer with an efficient and reliable intelligent surveillance solution. We can confirm the good reputation of Hikvision products’ quality is backed by an equally good experience of their after-sales service.”

Manufacturing Awarded

ISO 9001:2015 Quality Certification Quality Management System standard reaffirms Avigilon’s focus on operational efficiency and quality

A

vigilon Corporation has been awarded ISO 9001:2015 certification for its quality management system (QMS). ISO 9001:2015 is a globally recognized quality standard that defines QMS requirements and performance. The standard assists companies to align quality with their wider business strategy, helping to improve communications, efficiency, and implementation of continuous improvement.

Avigilon’s state-of-the-art manufacturing facilities in North America awarded ISO 9001:2015 quality certification

As part of the ISO 9001:2015 certification process, Avigilon engaged in a rigorous audit of its business processes and manufacturing facilities, and has successfully demonstrated its ability to consistently provide high quality service and products to its customers. “Achieving this level of certification again demonstrates our commitment to delivering the highest levels of quality and efficiency,” said Manny Gill, Avigilon’s Vice President, Global Manufacturing & Supply Chain, “Thanks to the hard work of our manufacturing team at our state-of-the-art facilities in North America, we continue to ensure quality control and create efficiencies in our production to best meet the needs of our customers.”

SecurityLink India ■ July 2018

53


application/ case study

Video Surveillance Brings up-to-date at

Iconic West Midlands Site in UK D

ahua Technology has recently announced that a compressive video surveillance solution consisting of 96 cameras from Dahua Technology UK is being installed at the striking Fort Dunlop commercial and retail site, overlooking the M6 motorway in Birmingham. Built for Dunlop Rubber, Fort Dunlop became the tyre-maker’s flagship production facility and at one time was the world’s largest factory, employing 3,200 workers. After production stopped in the 1980s, the building lay derelict before being redeveloped into 360,000 square feet of office and retail space, and also now with an adjoining hotel. Much of the site’s previous video surveillance system was installed during the refurbishment in 2006, but with advances in modern technology, it was felt that the current system was no longer meeting basic requirements. An external consultant assessed the site and put forward plans for an upgrade. Bromsgrove-

54

based Champion Security Installations won the bid for the upgrade project. Installed over two phases, the design consists of a total of 96 static and PTZ cameras from full HD to 4K resolutions. Cameras include the 12MP panoramic internal IPC-EBW81230 fisheye camera, which uses H.265/ H.264 triplestream encoding, and the external panoramic IPCPDBW8802 dome camera, with four 2-Megapixel progressive scan CMOS sensors and day/ night functionality. Images are managed and recorded by a 128-channel, ultra 4K NVR616 network video recorder. “Having undertaken a full review of the security systems at Fort Dunlop, it became clear that a replacement CCTV system was required to ensure protection

SecurityLink India ■ July 2018

of the staff, visitors and building. Three different options were presented by contractors, but it quickly became clear that the Dahua system presented by Champion Security met our brief. The system installed has changed the way we monitor and protect our asset, and its ease of use has been a revelation to our site staff,” said a spokesperson from Savills. A spokesperson from Champion Security Installations added, “We have worked with the management of Fort Dunlop for a number of years now, so we designed the new IP CCTV system in consultation with them. The aim was to meet all of the different security, health and safety criteria, as well as ensure ease of use for the operators. Having installed Dahua equipment at a number of sites, we invited them to assist with the design of the Fort Dunlop system using a number of their new products. Working in conjunction with Dahua and Oprema Ltd, the project was delivered on time and within budget.”


application/ case study

New Plate Link Feature for AutoVu Allows Sharing of Parking Data Between Patrol Vehicles Vehicle to vehicle communication simplifies patrol planning and increases enforcement efficiency

G

enetec Inc., has recently announced Plate Link, a new feature for its AutoVu™ automatic license plate recognition (ALPR) solution. Designed to allow vehicles to share license plate data while out on patrol, Plate Link acts as a force multiplier for parking enforcement officers (PEOs), allowing them to administer shared permits and timelimited parking bylaws across multiple zones more efficiently. Managing shared parking permits (where several vehicles share a single permit) can be a complex and time-consuming task. To identify a shared permit violation, a single parking enforcement vehicle would typically need to see both cars sharing a permit to detect that they were both in the lot at the same time. This can prove challenging, if not impossible, for large facilities that employ multiple enforcement vehicles. With AutoVu Plate Link, any patrol vehicle can detect viola-

tions using license plate data collected by other connected vehicles. This helps increase the rate of detection and simplifies the assignment of patrol routes. “In an effort to provide the best experience possible to their patrons, parking organizations have adapted their services to provide more flexibility. Shared permits have become a frequent and popular solution to encourage carpooling and accommodate households with multiple vehicles. This has placed a heavier burden on enforcement offic-

SecurityLink India ■ July 2018

ers who must ensure compliance with parking rules,” said Charles Pitman, AutoVu Product Marketing Manager at Genetec, “Our goal is to empower officers by making it easier for them to organize their routes and efficiently enforce those rules, without having to worry about the way their ALPR system works.” AutoVu Plate Link provides similar benefits to officers enforcing timelimited parking bylaws. It allows two separate patrol vehicles to be assigned to a zone and work in unison, as if they were a single vehicle. Each license plate scanned by a vehicle is automatically transferred to the next vehicle that enters the zone. By working together, the first patrol vehicle captures the license plate information initially, and should a violation occur, it will be detected by the second patrol vehicle making a subsequent pass. The first patrol vehicle doesn't have to circle back after the time-limit has elapsed. Using the same vehicle data eliminates the need to circle back to an assigned zone, and boosts capture rates. 55


application/ case study

Examining Security Measures at Major Sporting Events The 2018 FIFA World Cup kicked off with the opening match between hosts Russia and Saudi Arabia

R

ussia selected 11 host cities to be the venues for the matches of the 2018 World Cup. Security will be a big talking point across the competition, which takes place between June 14 and July 15 at 12 stadiums. Two of the stadiums are in the Russian capital. The safety success at recent sports meetings can be no excuse for complacency. Like other current hosts, the Russian government introduced extra security measures by presidential decree last May. They aimed to control movement in and around the venues, and they were successfully trialed at last year’s Confederations Cup. The security measures include a long list of restrictions on the sale of weapons and dangerous chemicals, as well as on selling and drinking alcohol.

Past blueprints

F

or a two-month period, all demonstrations and public events in World Cup cities that are not football-related must be authorized not only by the local authorities and police as usual – but also by the Russian secret service, the FSB. In host cities, there will be increased checks at train stations, airports and in the metro. Security consultants, installers, and manufacturers must work with police and arena managers to create strategies that will continue to protect fans, competitors, and staff. A ‘spectacular’ at a sports event is among the most feared (and expected) threats among the security community. South Wales Police conducted an exercise in June 2016 that could assist Rus-

sian authorities. Aware that Cardiff had an outstanding network of IP cameras both at the Principality Stadium and the city railway station, police used facial recognition on soccer fans during the Champions League Final. Camera feeds were of a resolution that more than met the needs of facial recognition to compare facial close-ups with a database of 500,000 custody images assembled from police forces across Europe. It was not a condition of entry to the stadium for a spectator to present his/ her face to the camera but there was dedicated video surveillance at turnstiles. In addition to the 71,000 spectators, a further 100,000 people visited Cardiff on the day. The operation was directed at known or suspected criminals including terrorists as it was at possible hooliganism.

Access control

D

evelopments in RFID have seen the introduction of single-use RFID wristbands at sports venues. These have significant benefits in that they make ticket forgery near impossible. Should imitation ever occur and two spectators with the same seat allocation arrive at the ground, the duplication will create an alert. This eliminates the scenario of violence ensuing when fans arrive at seats for which they have paid a premium price to find that they are already occupied. RFID ticketing 56

SecurityLink India ■ July 2018


application/ case study

also minimizes wait-times while queuing at turnstiles. This type of delay is the most dangerous flashpoint regarding spectator behavior and the most likely factor to precipitate crushing incidents. RFID of this kind also tells stadium managers if there has been an expectedly high influx of spectators into a part of the ground during a short time interval and whether stewards should be redeployed. RFID can be hierarchical and distinguish between staff, spectators, dignitaries, officials and even competitors. Over 100,000 RFID wristbands were used during the Ryder Cup

in 2014 at Gleneagles, Scotland. It is likely that golf organizers will use the technology again, with the Ryder Cup being the one other preeminent sports event scheduled for 2018. An additional benefit of using RFID wristbands as tickets is that if a child is separated from their parents, they need only report to a steward or police officer and it is a simple matter to take them to their assigned seat.

Multi-faceted video analytics

I

mprovements in people-counting algorithms mean that police and officials can now monitor crowd movement

at the approach to stadiums and on concourses with precision. The technology was initially hampered by an inability to count people if they were bunched together or holding hands but accuracy now approaches 99 percent. If peoplecounting suggests that reasonable queue time (even with advances such as RFID) is approaching a dangerous level, it is possible for stadium supervisors to corral spectators at an early stage causing minimal inconvenience and stress. In the event of large-scale ticket fraud and no safeguards through RFID, peoplecounting will generate an alarm as soon as occupancy levels are a cause for concern. This technique can be used both on a whole venue and in specific seating areas. It is also useful at city railway stations on match days to warn the stadium that a sudden influx of spectators is likely. People-counting can be used during an emergency evacuation to give officials an overview of egress and updates on problem areas.

Premium video management systems (VMS)

A

premium VMS using open architecture is vital in the command center of a massive stadium. For the duration of an international game or essential league fixture, a stadium control room should be regarded as a missioncritical environment. Security staff will SecurityLink India â– July 2018

receive numerous alerts before and during the game with the alarms ranging from minor disturbances to false positives. It should be remembered that for every incidence of video surveillance making the control room aware of antisocial behavior there will be at least one useful or beneficial scenario. A common occurrence is a conscientious camera operator spotting a spectator experiencing medical difficulties and dispatching a steward with first aid training. Best-of-breed VMS allows police and stadium managers to exploit advances in camera technology. Speed PTZ dome cameras now offer exceptional zoom levels (both optical and digital) that enable operators to hurry from overviews to specific areas and activity of interest. Megapixel technology is enabling security managers to cover larger areas with fewer cameras which has obvious financial benefits but also simplifies the logistics of VMS and speeds up site familiarization for new operators. Sports stadiums are early adopters of technology, and it is likely that any significant leisure venue will now be using IP cameras throughout. This makes it possible to export footage promptly to third parties not just for identifying problems but so that other stadiums during a multivenue tournament can absorb positives from what has gone well. 57


application/ case study

Powering System-Wide CCTV Service at Melbourne’s Metro Trains Extreme switching family enables real-time access to 100TB of video traffic daily for one of Australia’s largest metropolitan rail services

M

etro Trains, Melbourne’s Metropolitan Rail Service has selected Extreme Switching™ 10G Ethernet core and edge switching solutions to deliver an agile, adaptive, and secure network supporting its system-wide, real-time CCTV and video system. Metro Trains is one of Australia’s largest metropolitan rail services, with 16 lines, 219 stations and 221 six-carriage trains. The rail network is in a constant state of expansion as Melbourne continues to lead population growth among the country’s largest capital cities, and as the Victorian

58

government rebuilds rail and station infrastructure as a part of its ambitious level crossing removal program. Metro Trains transports nearly half a million passengers a day, and required a technology partner that could scale to aid its network growth. A core component of the Metro Trains technology platform is its CCTV network. It is one of the state’s largest CCTV networks, with one camera on every station platform and in every train carriage, resulting in more than 9,000 cameras total. Utilizing Extreme Switching aggregation, edge

SecurityLink India ■ July 2018

and ISW Industrial Ethernet Switches ideal for ‘in-tunnel’ CCTV, the robust network provides round-the-clock aggregation and seamless hand-off for all CCTV traffic as well as additional in-station services. The network transmits over 100 terabytes of video traffic on a typical business day, equivalent to 20,000 high definition films streaming simultaneously. “Extreme Networks is committed to help Metro Trains build a reliable, secure network to underpin its CCTV infrastructure,” said Chris Georgellis, Managing Director, Extreme Networks, Australia and New Zealand (ANZ), “Metro Trains operates one of the most sophisticated and geographically-dispersed networks in the country and this is a real showcase of Extreme’s capabilities.” “Having real-time access to network-wide CCTV footage is essential to the operations of Metro Trains, and critical to enabling the security and safety of passengers,” continued Georgellis, “The Extreme Switching platform provides the multicast performance required to support the huge volumes of video captured and managed on the Metro system, and the scalability to meet its demanding requirements as the network environment expands.”


application/ case study

Bringing Secure, Multi-factor Authentication To Belgium’s Pioneering National Mobile Identity Scheme itsme® Gemalto technology enables Belgian itsme® app to hit one million transactions a month

G

emalto has enabled Belgian mobile ID scheme itsme ® to enroll 350,000 users and securely process one million transactions per month for both private and public online services – making it one of the most successful mobile ID applications in Europe within one year of launch. As well as for bringing greater convenience to consumers, itsme ® provides merchants, government and f inancial institutions with strong, multi-factor authentication that is fully compliant with PSD2, GDPR and is certif ied for eIDAS. itsme ® was developed by Belgian Mobile ID, a consortium of Belgium’s leading banks and mobile network operators, in close collaboration with Gemalto. It has been off icially recognized by the Belgian government as a way for citizens to connect to numerous online public services including taxation, pensions and health, as well as online banking and mobile operator services. In its f irst year the app is already being used widely, with the average user completing six banking transactions and three e-Government transactions each month. In an increasingly digital world with growing numbers of government services moving online, a secure digital identity scheme allows

consumers to prove who they are. The itsme ® app allows users to create a 100% verif iable ID to safely and easily conf irm their identity and approve transactions with their mobile phone, meaning they can access services on-the-go with one single login. The seamless service grants access to a wide portfolio of services including those related to telecoms, f inancials, HR and health, without having to f ill in a time-consuming form each time. itsme ® will also provide users in the near future with a qualif ied e-signature that is the legal equivalent of a handwritten signature, which they can use to easily sign documents. Following many years of collaboration in the f ields of banking and mobile payment security, Belgian Mobile ID tasked Gemalto with providing robust, end-to-end security for the itsme ® app. Gemalto’s strong mobile authentication solution, using the latest biometric technology combined with digital identity expertise, provides the highest level of security for users to access services, conf irm transactions, and sign for private and government online applications. As a result, users stay in control of their data, managing privacy in a secure environment that protects them from fraud and security breaches. SecurityLink India ■ July 2018

Helps Enable Contactless Student IDs in Apple Wallet A

SSA ABLOY is working to support mobile access capabilities for student IDs with Apple Wallet. When student ID cards are added to Wallet on iPhone with iOS 12 or Apple Watch with watchOS 5, students and faculty will have an easier and more convenient way to open doors, make payments on and around campus, and enable other student ID driven functionality on a university campus. “We are proud to work with Apple to drive this innovation,” said Nico Delvaux, President and CEO of ASSA ABLOY, “ASSA ABLOY will leverage its expertise in mobile access to support Apple’s efforts to make it easier to access dorm rooms with contactless student IDs, which we feel will help open doors to their future.” This fall, with contactless student IDs students and faculty will be able to use their iPhones and Apple Watches to open doors in buildings. ASSA ABLOY’s reader technology, combined with embedded HID technology in ASSA ABLOY locks, will be part of a broader technology solution that unlocks the possibilities for mobile student IDs on university campuses. As the global market leader in mobile access technology, ASSA ABLOY has a proven track record of success delivering mobile access readers and credentials worldwide, providing customized solutions that meet evolving user requirements. 59


application/ case study

New Electronic Cover for Passport in Argentina T

he Government of Argentina has recently selected HID Global to upgrade its ICAO electronic passport to a newer generation that will reduce costs, improve security and enhance the reliability of data reading at border control points. The Argentina government is transitioning its electronic booklet from a printed antenna to a new copper wire antenna, which is more reliable having a stronger bond with the chip holding the traveler’s data, and therefore reducing the failure rate. A vast majority of the ePassports around the world use copper wire antennas. Supporting stronger security elements, the booklet also features an electronic cover built with a radio-frequency shield. A thin layer of special material disturbs radio communication with the passport antenna, only when the booklet is closed, impeding it from being read or stolen by people with harmful intentions. It strongly decreases the risk of unauthorized access to chip data when passports are not inspected. In the current state of ICAO standards, the micro-controller chip constitutes the critical place where sensitive citizen biometric and biographical data is stored. “HID Global continues to help countries such as Argentina gain the benefits of higher security, efficiency and flexibility from the newest generation of ePassports,” said Rob Haslam, Vice President of Worldwide Sales, Citizen Identity Solutions business with HID Global, “Our eCover is one piece of a broader portfolio of HID solutions, systems, software and services that we offer to help governments issue and manage citizen IDs for millions of people.” The process to upgrade the Argentine passport started in June 2017 when the government opened a public bid. The delivery of the new eCovers started in March 2018, and the Argentina government began issuing the enhanced ePassports to citizens in April. Using the new eCover solution from HID’s Citizen Identity Solutions business unit, the Argentina government is expected to save $2.3 million USD (60 million pesos) annually. “The Argentina government was looking for a high-quality solution for its latest ePassport and wanted to align with the global market trends,” said Eduardo Lerner President at the Institute of Publications and Statistics (IPESA), HID’s partner that assisted with the implementation of the new technology in Argentina, “We were able to combine HID’s state-of-the-art TLam eCover with our trusted delivery and advice to support Argentina’s goal to provide its citizens with one of the most secure passports in the world.” 60

SecurityLink India ■ July 2018

Smart Thermal Cameras Protect Electrical Substations For Major U.S. Utility

S

ightLogix smart thermal cameras have been deployed to protect tier 1 and tier 2 electrical substations for a major utility serving the southern United States. The organization has been deploying the SightLogix intrusion detection system to reduce risk, increase safety, prevent copper theft and satisfy NERC CIP 14 regulations. At each substation, anywhere from eight to twenty-eight SightSensors are positioned along the perimeters, paired with a pan, tilt and zoom camera. When an intruder enters a secured area or even approaches a fence line, the video analytics inside the SightSensor detects the breach, auto-steers a PTZ onto the source of the event, triggers a smart lighting system to illuminate the facility, and sends an alarm with video to a remotely located security operations center, where remote guards can view the video in real time and notify local law enforcement to respond.


application/ case study

The system detects intruders with high accuracy day and night, regardless of bright sun, complete darkness or bad weather. The utility considered several solutions, ultimately choosing the SightLogix thermal video system based on its detection reliability, low nuisance alerts, and lower overall cost. Because they detect intruders over long distances and wide areas – a single SightSensor can detect a person up to 600 meters away, and create a large buffer zone outside the fenceline to meet NERC CIP requirements – the utility was able to reduce supporting infrastructure like poles and power, cutting costs significantly. The utility is also using the SightSensors to create virtual barriers along open areas that surround a building or an asset to prevent insider theft where physical or man-made boundaries are unlikely to exist. “When it comes to protecting substations, utilities need real-time awareness to reduce risk, protect the stability of the grid, and satisfy NERC mandates,” said John Romanowich, SightLogix President and CEO, “Given our track record of providing a high level of security at critical sites, SightLogix has become the solution of choice for securing the nation’s power infrastructure.” SightLogix systems are being used at utilities throughout the United States, Canada, Europe and the Middle East to protect assets that include substations, solar farms, wind farms, hydro facilities, power transmission and distribution, and nuclear power plants.

The Impact of Biometrics in Healthcare W

ith often hundreds or even thousands of workers per location, the Healthcare sector has some particular challenges in terms of attendance management. The main challenge is due to an increased mobility of workers and working hours. Medical staff frequently move from one hospital to another. Furthermore, complex shifts and extra hours are a common and sometimes an unexpected occurrence for them. Biometricbased time and attendance solutions precisely address such complexities because it shows an accurate representation of individual workers and schedules across different locations, translating into precise staff reports. Access control is a paramount need in hospitals to prevent access to many specific critical areas. There are many aspects a biometric-based access control system can address. The most obvious is the access of medical staff into specific areas, for example, limiting access to pharmaceutical storage, medical machinery storage or other rooms like the dispatch centres, analysis labs with bio-samples, biohazard areas or server rooms. The medical to patient relationship can also benefit from the biometric access control. The biometric tablets can be used for identifying patients, ensuring the right medication is given to the right person, providing access to historic records, thus enhancing end-to-end security. This can even be extended to locations outside the hospital, to field application during house visits, intern camps, health and safety visits by doctors at corporations or schools. Moreover, biometric access control ensures safety during in-patient visits. Visits plays an immense role in the emotional and physical recovery of interned patients. By biometrically registering and recording who visits and when, hospitals have a better control of schedules, visitors and where they can access within a location. This is particularly relevant at maternity wards, recovery rooms or long-term intern therapy. Experienced in the field of access control and attendance in the public and private sector, TBS has the solutions that accommodate the complexities of the healthcare sector. Working together with many system integrators such as Nedap, Honeywell or Siemens to provide seamless integrated access control and attendance systems, TBS provides the right devices and customized solutions for the healthcare environment and its users. There is no single device that will meet the requirements of every type of deployment, thus they act as trusted advisor, considering several options. The 3D Terminal is a totally touchless device, extremely hygienic and accurate which can be best considered to ensure critically secure access to all types of users. Likewise, the 2D Eye, a mix of iris and face recognition sensors presents itself as a highly reliable and hygienic solution. Their touch devices also address the needs of the healthcare users such as the 2D+ and 2D+ HD, whose sensor is able to read fingers fitted with the most common medical latex gloves. Finally, the 2D Portable brings the convenience of mobility, synchronizing data within or outside a site normal network. TBS excels with the experience of business development managers and partners to address the specific needs of the healthcare site. SecurityLink India ■ July 2018

61


application/ case study

Busy Dog Care Center Secured With New Valerus System

V

icon Industries, Inc., has recently announced that Play Dog eXcellent (PDX), premier provider of dog care services in Chattanooga, TN has completed a facility-wide security upgrade with Vicon’s new Valerus VMS. Meyers Security, also of Chattanooga, handled system design and installation of the new system, which incorporates many of the center’s existing analog cameras along with new high-definition models into a Valerus network solution

budgetary concerns, offering a system that delivers ease-of-use and flexibility while minimizing hardware, licensing and installation costs. Plans to eventually swap out the remaining analog cameras with new HD analog models from Vicon will make the conversion simple and affordable. New Vicon 4 MP cameras and 12 MP hemispheric cameras provide PDX management with an ability to see what’s happening across their entire property with a level of detail not previously possible. They can now differentiate between individual dogs on camera, even from long distances and when they’re moving very quickly. Coverage of the parking lot and surrounding grounds has helped to deter vandalism. In addition to security surveillance, the Valerus system is proving helpful with staff supervision, management and training. Video clips of staff interacting with the dogs, or the dogs interacting with each other, are used as ‘teachable moments’ during

that enhances the security and operations at PDX. The 20,000 square foot building and surrounding four-acre property provides boarding, dog day care, training, seminars, workshops and performance events for the dog-loving community. The business serves an average of 120 dogs each day. Meyers Security designed the solution with sensitivity to the facility’s 62

SecurityLink India ■ July 2018

staff meetings to demonstrate how procedures can be improved. Video from panoramic cameras above the training arena provide clear footage of agility exercises, which can be reviewed repeatedly by training staff. Nancy Miller, Managing Partner at PDX, says, “The new Valerus system is an important tool that helps me and my staff do our jobs better and it’s very easy to use.” Mike Rose, Vicon’s Regional Sales Manager who worked on the project, says, “The PDX installation showcases how Vicon solutions can offer the features and benefits of a premium VMS solution to smaller businesses with modest budgets.”


feature

Reducing Downtime for the Surveillance System I

t seems that everywhere you look, there is a surveillance camera looking back at you. Video surveillance has become an absolute necessity for every type of organization – whether it be retail, hospitality, gaming, education, infrastructure or government – or any other type of business. When a crime is committed or a tragedy occurs, there is now an expectation that it will have been recorded on video, and this usually proves to be true. As a society, we have come to depend on this video to provide us with the documentation we need in many different types of situations. However, our video surveillance systems are under constant attack. Every day, thousands of video cameras are knocked out of service, not by criminals with evil intent, but by something much more lethal and simple i.e., power surges. In fact, between normal fluctuations of power, lightning strikes and other power disruptions, virtually every video surveillance camera is at risk of going out of service either temporarily or permanently. When your surveillance system experiences a power surge, there are three possible negative outcomes: damage, destruction and downtime. A damaged or destroyed system requires repair or replacement, which can be extremely costly and time-consuming. But the downtime caused by this damage or destruction is by far the worst consequence of power surges. When a video surveillance system is no longer functional, it has much wider consequences for the organization that put it into place. When surveillance systems stop functioning, it becomes more difficult for security teams to do their jobs effectively. If there is a theft or other crime committed while video cameras are down, it will be much more difficult to identify the

criminal without video of the incident. Hazardous situations like an ice patch on an outside walkway could go unnoticed while numerous individuals lose their footing on the spot, until someone falls, breaks an arm and sues the company. Liability will rise accordingly without video to confirm whether a claim is false. Facilities must be evacuated when the fire alarm systems stop functioning. When security systems are out of service, parking lots, doors, and secure areas may need to be patrolled by temporary guards at an additional cost. There is also a loss of productivity if staff is delayed by congestion and manual processes at entrances, or if their work equipment and/ or work data is damaged or lost. Downtime can also cause a potential loss of customer confidence and business volume.

SecurityLink India â– July 2018

63


feature

If a customer uses social media to complain about a website being down for a few hours, the resulting negative impact can be detrimental to a business for an extended time. To help avoid this type of situation, there are steps security professionals can take, both during the installation process and after systems are in place. Installing surge protection to keep systems up and running in the event of a power surge is simple, and as these examples show, the ROI is immense. As surveillance systems are the eyes and ears of a business, it’s crucial to keep downtime as minimal as possible.

Downtime and its impact on specific verticals

Casinos and gaming

F

B

illions of dollars are lost each year by businesses and other organizations due to theft, false injury claims, vandalism and more, highlighting the importance of maintaining fully operational video surveillance systems. Beyond the shared concerns of identifying criminals, providing evidence etc., downtime presents a number of different specific threats to various vertical markets.

Safe cities

I

vestigations. Often this video provides the only evidence to identify individuals and prove criminal action. As more and more cities deploy video surveillance, the number of incidents where it is proven to be irreplaceable as a security resource will only continue to grow. And because so much of the infrastructure for municipal surveillance is installed outdoors in exposed locations, it is more vulnerable to the risk of downtime due to lightning strikes and other unprotected surge sources.

n the past few years municipalities have become enormously dependent on surveillance video to help with in-

or casinos and other gaming establishments, compliance regulations require video surveillance to be up and running 100% of the time. If video is interrupted at any time, business operations must be shut down completely, causing total loss of business revenue until the system can be repaired or replaced. No casino could survive a complete business stoppage for long – making downtime a virtually fatal situation.

Higher education and K-12

T

he number of risk factors present on school campuses is immense – from abduction of students to vandalism or theft, and much more. For every one of these adverse events, video surveillance is of vital importance for apprehending thieves, kidnappers and other criminals; and with so many different life safety and other electronic/ electrical systems in place, the possibility rises for a power strike or surge that would cause devastating downtime.

Retail

S

tores, malls and all types of retail establishments absolutely require their video surveillance systems to be up and running in order to protect them against losses from shoplifting, sweet-hearting, vandalism and more. Without a working surveillance system many of these crimes would simply go undetected, though their negative effect on the bottom line would be unmistakable. Retailers literally cannot afford downtime.

A simple step to protect devices

T

o avoid the possibility of downtime for the video surveillance system, it is imperative to include surge protection devices in your planning right from the start, and anytime you expand, improve or install a surveillance system.

64

SecurityLink India ■ July 2018


feature

Surge protection is quite easy and reasonable in cost to add, and it is an insurance policy for your organization, providing protection from every type of power event. For video surveillance systems, it is recommended that surge protection be installed at every external camera, including outdoor PoE or PoE+ IP cameras. Surges can travel through cabling from a remote device, damage or destroy a network switch, and possibly cause further issues with other switch-connected devices such as servers running VMS software. If you are responsible for your organization’s video surveillance system, it makes sense to speak with a surge protection expert who can review your situation and make suitable recommendations. Reputable companies that specialize in surge protection may also offer free site surveys to help achieve the most effective protection solution. Depending on the design of a video surveillance system, the number and type of surge protection devices required to ensure optimal protection vary. Ideally, each camera needs two devices – one camera-specific surge protector near the camera and one mounted at the power source. If a security team is looking to protect cameras mounted outside, in parking lots or other areas subject to the elements, choose an outdoor enclosure that can withstand even the worst weather. For cameras that are located directly on the exterior wall of a building, you will want a

surge protector designed for protecting wires as they enter the building. Because most systems comprise several cameras, a rack mounted multi-channel surge protector will protect the different feeds entering the recording system. It is also recommended to include a powerful UPS system in the installation process, to keep the surveillance system operational even if the central power system is disrupted.

Summary

P

erhaps the best approach to protecting your surveillance system is to think like an insurance provider, and look at the potential cost of surveillance system failure. Comparing potential risk and loss to the costs of basic and enhanced surge protection for essential security systems, the benefits clearly outweigh the costs. Power surges are inevitable; therefore, it’s important to take the necessary steps to reduce the impact these surges have on your daily operations. Surveillance systems are installed for a purpose, and surge protection can help ensure that they perform as they should regardless of what’s going on within the power grid. Properly protecting your organization’s surveillance systems will save time, energy and money – and it will give you peace of mind knowing that you’re protecting the systems that help to safeguard your people, property and assets.

SecurityLink India ■ July 2018

65


white paper

The Influence of Lens Selection

The Trade-off between Image Resolution and Field of View By Andrea Iniguez – VP Business Development, Theia Technologies

“I want a lens that can cover the whole parking lot and I want to be able to read a license plate.” Sounds familiar? As a manufacturer of wide angle lenses, Theia Technologies is frequently asked if we have a product that allows the user to do both of these things simultaneously. And the answer is ‘it depends.’ It depends on several variables – the resolution you start with from the camera, how far away the subject is from the lens, and the field of view of the lens. But keeping the first two variables constant, the impact of the lens field of view becomes clear. One of the important factors to consider when designing video surveillance installations is the trade-off between lens field of view and image resolution

Image resolution versus field of view

O

ne important, but often neglected consideration in video surveillance systems design is the trade-off between image resolution and field of view. With any given combination of camera and lens the native resolution from the camera is spread over the entire field of view of the lens, determining pixel density and image resolution. The wider the resolution is spread, the lower the pixel density, the lower the image resolution or image detail. The images below, taken with the same camera from the same distance away, illustrate this trade-off. The widest field of view allows you to cover the widest area but does not allow you to see high detail, while the narrowest field of view permits capture of high detail at the expense of wide area coverage. The next series of images, each taken with the same high resolution camera from the same distance away similarly illustrates the trade-off of high detail and ability to identify a person when using a wide angle of view lens and the ability to cover a wide area. 66

Other ways to improve image detail

S

o now you see the trade-off. You would like to cover the whole area, but unfortunately you are not able to read

SecurityLink India ■ July 2018


white paper

the license plate. What to do? At this point, there are a few other variables that you may be able to change in your system design to improve image detail. First is the distance from the camera to the subject. If possible, the installer could improve the image detail by moving the camera closer to the subject. This may be feasible in a new installation, but in an existing system this may be limited by the physical constraints of the location and the system, as well as costs associated with re-cabling. Moving closer improves the image detail, but field of view is reduced. The second variable that may be changed is the camera resolution. By selecting a higher resolution camera with a higher starting number of pixels and spreading them over the same field of view as before, the pixel density will be higher and the resulting image detail will be better. Of course, this assumes you can make that change in your system and you can support the likely higher priced hardware and data storage needs required with higher resolution systems. The higher resolution, data intensive cameras will also lower the frame rate of the system which must also be kept in mind especially with industry specific standards and requirements.

need in terms of pixel density, how much coverage you need in distance (feet or meters), or how far away the camera is from the subject. The tool then calculates the other variables for you. For example, you indicate you plan to use a 5 megapixel 1/2.5” sensor camera, a 3mm lens and you will be 50 feet away from your subject. The tool will calculate your pixel density – in this case 27 pixels/ foot, and coverage width – here 97 feet wide. The tool then provides an image that represents the level of image resolution you would get for your selected variables allowing you to quickly see if you have enough resolution to meet the needs of your application. The newest iPhone and iPad versions of Theia’s calculator App include enhancements that allow users to input the camera height and/ or camera angle so that one can tell if a person’s head, for example, will be covered in the image given different distances from the camera. The latest version also allows the user to introduce a level of jpeg noise so that the resulting image more accurately reflects real world conditions.

Use available tools

T

here are many useful tools available to help support systems design and correct equipment selection. One of those is Theia’s own image resolution and lens calculator. The calculator allows you to input some important details of your application and potential equipment, then quickly calculates image resolution with those assumptions. You input the camera resolution and sensor size you intend to use, the lens field of view you believe you need, then input your key project variables – either how much resolution you think you SecurityLink India ■ July 2018

67


white paper

The importance of lens selection

I

f you decide to increase your image resolution by increasing the camera resolution, you must also consider lens selection. The lens needed for an IP/ megapixel camera is much different than the lens needed for a traditional analog camera. These higher resolution cameras demand higher performance lenses in order to take full advantage of the increased resolution. For instance, in a megapixel camera, the focal plane spot size of the lens must be comparable or smaller than the pixel size on the sensor (Figures A and B below), otherwise the light falls off the pixel resulting in a fuzzy image. Using a standard resolution lens with a 5 megapixel camera will produce a blurry image. Most often if you want to take advantage of all the pixels a multi megapixel camera provides, a high quality lens with matching resolution is needed otherwise the money spent on a high resolution camera is wasted.

68

One would assume, then, that all someone specifying a megapixel camera needs to do is specify a megapixel lens. However, it’s not that simple and in many cases it can be quite difficult to ensure that the lens needed is the lens being offered. Traditionally, just about any decent lens would do the job for traditional analog cameras so specifying the lens wasn’t a problem. As a result, too many designers and integrators are still unaware that for megapixel cameras not all lenses are created equally. In megapixel cameras the pixel size and the required lens spot size varies depending on the size of sensor and quantity of pixels it contains. You can have 2 different cameras, both 1.3 megapixel, but if the sensor size is not the same the pixel size will be different. The figures below illustrate this. In selecting a lens it is important to choose one that is designed for use with both the sensor size and the resolution of the camera. Over-specifying the lens to have a higher megapixel rating than the camera is acceptable. This ensures

SecurityLink India â– July 2018


white paper

the lens is not the resolution limiting factor in the system. With a megapixel camera, designers and integrators have entered a new world in which millions of pixels and 1500 pixel wide images are the norm, not the 320 TV lines used in most analog cameras. The old TV lines can now be thought of as rows of pixels. Resolution needs have skyrocketed. Many manufacturers refer to their products as a ‘megapixel lens’ but they seldom define what the adjective ‘megapixel’ means. Is that ‘MP’ lens to be used with a 1.3 megapixel camera or a 3 megapixel camera? Can it be used with all megapixel cameras? By referring back to Figures A and B, you would probably expect that different levels of megapixel cameras would also need different lenses. Higher megapixel cameras with their smaller pixels need lenses with more internal glass elements and higher precision elements than lower megapixel models. These superior lenses should deliver the greater performance required for higher megapixel cameras.

What can you do?

S

o what can help you determine the quality of lens you need? A Line Pair per Millimeter (LP/MM) specification provides the resolution properties of a lens and can be used to help select the correct lens for your camera. LP/MM determines the smallest width of a pair of adjacent pixels that can be resolved by the lens. Standard analog cameras need a lens with around 30 LP/ MM while megapixel lenses start at 60 LP/MM and can go up to over 200 LP/MM. For example, a lens with resolution of 60 LP/MM on a 1/3-inch 1.3MP camera that has resolution of 133 LP/MM does not utilize the full resolution of the camera. That’s because the lens resolves only 60 LP/MM while the camera requires 133 LP/MM for its full megapixel resolution. The lens cannot focus to see fine enough detail for the camera’s sensor. In the example above, a feature such as a pole which would be 1 pixel wide will be washed out by the lower lens resolution and not be visible. The pole would have to cover almost 3 pixels before the lens can resolve it. In other words, no object less than 3 pixels wide will be clearly visible with the lens and camera in the example. The consequence is that the extra pixels of the camera are wasted – you paid too much for the camera. Beware, too, many lenses are labeled megapixel based on the LP/MM in the center of the lens, not at the edge. This difference can be major for you as the user. It’s not

uncommon for a megapixel lens to have a 150 LP/MM in the center but only a 60 LP/MM at the edge. This means that the resolution at the edge of the ‘so called’ megapixel lens is no better than that of a standard analog camera lens at half the price. Also, the size of pixels varies from megapixel camera to megapixel camera, influencing which lens is best for a specific camera. A LP/MM ‘required’ resolution can also be calculated for the camera based on the camera pixel size. Adding to the complexity, the physical width of pixels in cameras will vary due to their differing image sensor sizes and the number of pixels that must fit on the imager. In other words, you can have two different size sensors each with the same number of total pixels, yet the resolution required of the lens will be different. This means that the LP/MM is relative only to the size of the pixels on the sensor. A lens with a 120 LP/MM might be perfect for a 1.3 megapixel camera using a 1/2 inch imager but not very good for a 2 megapixel camera using a 1/3 inch imager because the pixel size of the latter is much smaller. Ideally the lens resolution should be greater than the camera resolution. To calculate the LP/MM needed for a given camera, divide the width or height of the sensor in pixels by the physical width or height of the sensor in millimeters, then divide this number by 2. Dividing by 2 is necessary because LP/MM is defined for 2 adjacent pixels (a line pair). Pixels per chip width / width / 2 = LP/MM While the LP/MM lens rating was not generally provided by lens manufacturers in the past, it is becoming more common with the adoption of megapixel technology and can be useful in specifying a lens today. However many manufacturers will use a simplified lens rating for the megapixel specification (e.g. 1.3 or 3 MP) and standard sensor size (e.g.1/2 or 1/3 inch).

Get the maximum out of your megapixel cameras

W

hen buying analog cameras, you were concerned about darkness, glare, rain and other factors but seldom gave the lens a second thought. With today’s highresolution, megapixel cameras the lens might be the most important accessory to specify with each megapixel camera. After all, if the lens doesn’t provide the resolution that the camera is capable of producing, you’ve simply wasted your investment on a higher resolution camera.

SecurityLink India ■ July 2018

69


International Updates

Wildlife Crime Global Seizures and Arrests in Transcontinental Operation

A

n international operation against the illegal trade in wildlife and timber has seen hundreds of seizures worldwide as well as suspects arrested. Code named Thunderstorm and targeting the people and networks behind global wildlife crime, the operation involved police, customs, border, environment, wildlife and forestry agencies from 92 countries and resulted in millions of dollars-worth of seizures. The month-long (1-31 May) operation has so far brought 1,974 seizures and the identification of some 1,400 suspects, triggering arrests and investigations worldwide. Further arrests and prosecutions are foreseen as ongoing investigations unfold. Total worldwide seizures reported to date include: ●● 43 tonnes of wild meat (including bear, elephant, crocodile, whale and zebra). ●● 1.3 tonnes of raw and processed elephant ivory. ●● 27,000 reptiles (including 869 alligators/ crocodiles, 9,590 turtles and 10,000 snakes). ●● Almost 4,000 birds including pelicans, ostriches, parrots and owls. ●● Several tonnes of wood and timber. ●● 48 live primates. ●● 14 big cats (tiger, lion, leopard and jaguar). ●● The carcasses of seven bears, including two polar bears. The operation saw eight tonnes of pangolin scales seized worldwide in70

cluding almost four tonnes by Vietnamese maritime authorities on board a ship arriving from the Democratic Republic of Congo. Two flight attendants were arrested in Los Angeles attempting to smuggle live spotted turtles to Asia in their personal baggage. Both suspects have been charged with smuggling CITESprotected species and a transnational investigation has been opened between the involved countries. A man was arrested in Israel and awaits deportation to Thailand after his hunting photograph on social media led to the seizure of multiple wildlife items at his home including fox, jackal and mongoose bodies. Follow-up inquiries have revealed that the suspect was also engaged in people smuggling and illegal employment. Canadian authorities intercepted a container holding 18 tonnes of eel meat arriving from Asia. Thought to be poached from Europe originally, the juvenile glass eels had been reared in Asia before being dispatched to North American markets for consumption.

An integrated global response

T

he second in a global ‘Thunder’ series initiated by the INTERPOL Wildlife Crime Working Group, Operation Thunderstorm was coordinated by INTERPOL and the World Customs Organization (WCO) in conjunction with the International Consortium on ComSecurityLink India ■ July 2018

bating Wildlife Crime (ICCWC), which includes the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) Secretariat, UNODC and the World Bank. “Operation Thunderstorm has seen significant seizures at global level, showing how coordinated global operations can maximize impact,” said INTERPOL Secretary General Jürgen Stock, “By revealing how wildlife trafficking groups use the same routes as criminals involved in other crime areas – often hand in hand with tax evasion, corruption, money laundering and violent crime – Operation Thunderstorm sends a clear message to wildlife criminals that the world’s law enforcement community is homing in on them.”

An intelligence-driven operation

I

nvestigative crime intelligence was gathered ahead of the operation to help target specific hotspots for action including land and airport border points and wildlife parks. Cars, trucks, boats and cargo transporters suspected of moving illicit products were also targeted with searches carried out by officers, often with specialist sniffer dogs and x-ray scanners. “By leveraging the global network of worldwide environmental law enforcement experts and customs community’s commitment to protecting wildlife, WCO and its partners have clearly illustrated the power and effectiveness of in-


International Updates

ternational cooperation in keeping our natural heritage safe, both now and for future generations,” said WCO Secretary General Kunio Mikuriya, “Operation Thunderstorm clearly demonstrates that by pooling our transnational law enforcement collaboration in the field, WCO and INTERPOL firmly contribute to making sure that borders everywhere divide criminals but connect customs and law enforcement as a whole to make the world a safer place.” Results will continue to be analysed globally to generate intelligence which will be used as guidance in future national, regional and international law enforcement efforts.

Organized wildlife crime: Everybody’s business

T

he organized crime groups behind wildlife crime target high-value animal and plant specimens, and operate through complex global criminal networks. Driven by profit, the activities of these groups can have devastating economic, social and environmental impacts. Ben Janse van Rensburg, CITES Secretariat Chief of Enforcement Support said, “No one country, region or agency can tackle illegal wildlife trade alone. Collective action across source, transit and destination states is essential. On behalf of all ICCWC partner agencies, I commend the excellent work done in member countries – Operation Thunderstorm is testimony to what can be achieved if we all work together.” Senior officer Grant Miller of the UK Border Force and head of the UK national CITES enforcement team said, “Through Operation Thunderstorm, criminals have seen the products they need to ply their trade seized and their illegal profits targeted. Organized crime groups engaging in wildlife crime will feel the impact of this operation for a long time.” Mr. Miller is also chair of the INTERPOL Wildlife Crime Working Group, which leads a number of projects to combat the poaching, trafficking, or possession of legally protected flora and fauna.

GSX Accepting Applications for

2018 Innovative Product Awards Award program created by security practitioners for practitioners to spotlight leading innovations at GSX

A

SIS International, the leading organization for security management professionals worldwide, invites exhibiting companies to enter the 2018 Innovative Product Awards (IPA) – a competition recognizing the most ground breaking offerings on the Global Security Exchange (GSX) expo floor. Winners will be announced and recognized at GSX, which takes place during September 23-27 at the Las Vegas Convention Center in Las Vegas, and is expected to attract more than 20,000 security professionals from 100+ countries. “While there are many awards programs out there, the Innovative Product Awards stand apart because the judges are security practitioners,” said Howard Belfor, CPP, Co-chair of the Awards Program and Member, ASIS Board of Directors, “They are the individuals who use these products every day, and they bring tremendous expertise to the judging process. For attendees, this means that award winners offer peer-distinguished products that address industry trends and are well worth exploring on the GSX expo floor.” Formerly the ASIS Accolade Competition, the newly revamped IPAs will spotlight the leading products – hardware, software, testing materials, practices or thought leadership – designed to tackle current and emerging global security risks and threats. A team of judges representing security practitioners, thought leaders, and industry experts will select up to 10 winners based on their level of innovation, unique attributes, and specific benefit to the security industry. In addition, one product will be named the ‘Judges Choice.’ The IPAs provides an opportunity for companies to distinguish new products and services at the show – and across the security marketplace. The submission deadline is August 3. Winners will be honored at GSX and will be given time to showcase how their product addresses market needs on the new X stage – a learning theater on the GSX expo floor where esteemed industry experts will present futureforward sessions on topics such as AI, mixed reality, robotics, drones, and more. SecurityLink India ■ July 2018

71


International Updates

Drone Forensics Gets a Boost with New Data on NIST Website How do you extract forensic data from an aerial drone – Very carefully

A

erial drones might someday deliver online purchases to homes. But in some prisons, drone delivery is already a thing. Drones have been spotted flying drugs, cell phones and other contraband over prison walls, and in several cases, drug traffickers have used drones to ferry narcotics across the border. If those drones are captured, investigators will try to extract data from them that might point to a suspect. But there are many types of drones, each with its own quirks, and that can make data extraction tricky. It would help if investigators could instantly conjure another drone of the same type to practice on first, and while that may not be possible, they can now do the next best thing – download a ‘forensic image’ of that type of drone. A forensic image is a complete data extraction from a digital device, and NIST maintains a repository of images

72

Aerial drones at the VTO Labs field research station in Colorado Credit: Photo courtesy of VTO labs

made from personal computers, mobile phones, tablets, hard drives and other storage media. The images in NIST’s computer forensic reference datasets, or CFReDS, contain simulated digital evidence and are available to download

SecurityLink India ■ July 2018

for free. Recently, NIST opened a new section of CFReDS dedicated to drones, where forensic experts can find images of 14 popular makes and models, a number that is expected to grow to 30 by December 2018. “The drone images will allow investigators to do a dry run before working on high-profile cases,” said Barbara Guttman, Manager of Digital Forensic Research at NIST, “You don’t want to practice on evidence.” The drone images were created by VTO Labs, a Colorado-based digital forensics and cybersecurity firm. NIST added the images to CFReDS because that website is well-known within the digital forensics community. “Listing the drone images there is the fastest way to get them out to experts in the field,” Guttman said.


International Updates

Work on the drone images began in May of last year when VTO Labs received a contract from the Department of Homeland Security’s (DHS) Science and Technology Directorate. “When we proposed this project, there was little existing research in this space,” said Steve Watson, Chief Technology Officer at VTO. The drone research was needed not only to combat drug smuggling, but also to allow officials to respond more quickly should a drone ever be used as a weapon inside the United States. For each make and model of drone he studied for this DHS-funded project, Watson purchased three and flew

them until they accumulated a baseline of data. He then extracted data from one while leaving it intact. He disassembled a second and extracted data from its circuit board and onboard cameras. With the third, he removed all the chips and extracted data from them directly. He also disassembled and extracted data from the pilot controls and other remotely connected devices. “The forensic images contain all the 1s and 0s we recovered from each model,” Watson said. The images were created using industry standard data formats so that investigators can connect to them using forensic software tools and inspect their

contents. The images for each model also come with step-by-step, photo-illustrated teardown instructions. Watson was able to retrieve serial numbers, flight paths, launch and landing locations, photos and videos. On one model, he found a database that stores a user’s credit card information. Investigators can use the images to practice recovering data including deleted files. Universities and forensic labs can use them for training, proficiency testing and research, and application developers can use the images to test their software. “If you’re writing tools for drone forensics, you need a lot of drones to test them on,” Guttman said.

Partners with present4D Making Strategic Minority Investment in Virtual Reality Presentation Company ARO®, the trusted source for 3D measurement and imaging solutions for 3D factory, construction BIM, product design, and public safety forensics, has recently made a strategic minority investment in present4D GmbH, a leading software solutions provider for professional virtual reality (VR) presentations and training environments. “We are very excited to have present4D as a strategic partner, which is uniquely positioned to drive adoption of virtual reality solutions across a broad spectrum of business and industrial applications,” stated Dr. Simon Raab, President and CEO of FARO®, “This investment represents a unique opportunity for FARO and is an important part of our innovation strategy with VR tools and applications in our target vertical markets. The market potential for these powerful presentation and training tools, which can incorporate augmented 3D point cloud data, is very promising. We look forward to a very close and creative partnership of our development teams that we believe will be beneficial to FARO’s customers.” “We are excited to partner with FARO to support our next phase of growth,” stated Markus Prenneis, founder and CEO of present4D, “FARO will bring significant value through its global network, as well as its software and industrial technology expertise. The investment proceeds will be used to make the necessary investments in software engineering and product development to accelerate the market penetration of our unique and powerful VR-Suite presentation software. The partnership brings us one step closer to our vision of providing one of the best business solutions for multimedia VR presentations and training environments in the market.” present4D’s VR-Suite solution leverages 360° videos and 360° pictures to incorporate point of interest icons, links, audio and objects to provide an immersive VR experience for a variety of business applications. The intuitive concept and functionality of VR-Suite is complementary in combination with FARO’s VR-enabled solutions SCENE 7.1 and FARO Zone 3D 2018.

F

SecurityLink India ■ July 2018

73


International Updates

Presenting FPGA in AI with Intel

D

ahua Technology held a technical session together with Intel at IFSEC 2018 at London on 21 June to introduce AI NVR based on FPGA technology for security applications. Steve Norman, Sales Director of Dahua UK & Ireland highlighted Dahua’s new AI NVR based on Intel FPGA technology, which is able to realize real-time face recognition powered by AI, thanks to the deterministic low latency performance of Intel FPGAs. Moreover, Intel FPGAs are highly flexible and easy-to-use, which has enabled Dahua to better design its unique AI products. Todd Matsler, Director of Intel Global IOT Video also

Todd Matsler Presenting Intel® FPGA & Intel® MovidiusTM VPU

Dahua AI NVR’s now powered by Intel

introduced Intel’s vision product technology including the Intel® FPGA & Intel® Movidius™ VPU, which are both equipped on Dahua’s new Deepsense series AI products. He especially pointed out the deterministic low latency, superb performance, power efficiency and future readiness of FPGA make it suitable for deep learning inference. Intel® Movidius™ VPU enables low power visual intelligence, delivering dedicated imaging, vision, and deep neural networks at the edge. With the in-depth presentations, participants of the technical session were fascinated by the great future AI could bring to the surveillance industry.

Partners with To catalyse life protection technologies

H

alma, a global group of life-saving technology companies, and OurCrowd, a leading equity crowd funding platform, announced a new business partnership, which will help to catalyse life protection technologies focused on hazard detection and digital health. The partnership combines the strength of OurCrowd’s global network, robust deal flow pipeline and growing portfolio of 150 promising startups along with the reach and business objectives of Halma to seek innovative products and services in digital health, infrastructure and environmental analytics and insights. Dr Inken Braunschmidt, Chief Digital and Innovation Officer at Halma, said, “We’re looking for the best innovations in Medtech, smart buildings and environmental analytics and Israel is the place to find them. It is one of the most vibrant innovation hotspots in the world. We’re excited to collaborate with OurCrowd, which is the ideal partner to help us access the talent and ideas of this unique innovation and digital ecosystem. OurCrowd will help Halma grow faster by identifying new investment opportunities within the Israeli tech ecosystem.” Jon Medved, Founder and CEO of OurCrowd said, “We’re thrilled to enter into this new strategic partnership with Halma. It will give our portfolio companies and other promising global startups a quality gateway to world markets, with one of the most progressive technology groups on the planet. Halma wants to make the world a safer, cleaner, healthier place for everyone and that’s something that we at OurCrowd believe in passionately.” 74

SecurityLink India ■ July 2018


International Updates

TS-328 3-bay NAS Receives

2018 COMPUTEX Best Choice Award

Q

NAP TS-328 NAS has received the 2018 Computex Best Choice Award in the Computer & System category. The TS-328 features a unique 3-bay design allowing users to build a RAID 5 array with the fewest disks, while providing optimal storage capacity and data protection. “We are honored that the TS-328 was recognized at the Computex Best Choice Award in the Computer & System category. The primary design concept behind the TS-328 was high data security. Potential users looking for a budgetfriendly NAS can benefit from the RAID 5 configuration and snapshot protection provided by the TS-328,” said Dan Lin, Product Manager of QNAP.

The TS-328 sports an elegant look that easily fits home environments. Powered by a Realtek RTD1296 quad-core 1.4 GHz processor with 2GB DDR4 memory, two 1GbE ports with SATA 6Gb/s, the TS-328 delivers up to 225 MB/s read/ write speeds. The model also features H.264/ H.265 hardware decoding and real-time transcoding that can convert videos to universal file formats that can be played smoothly on multiple devices. The QNAP QVHelper, Qmedia, and Video HD streaming applications also provide users with greater choice in multimedia entertainment throughout their home and on their mobile devices when on the go. All of the award-winning entries of the Best Choice Award 2018 are exhibited at the Best Choice Award Pavilion during recently held COMPUTEX TAIPEI.

Alights in Myanmar

With an Introductory Partner’s Meet C

P PLUS has recently hosted an introductory Partner’s Meet at Park Royal Hotel in Myanmar, marking its entry in the country. The event was an introduction to the brand, its global presence and its key technologies through an elaborate technical session and live demonstrations. “It was a great session. The people of Myanmar are very supportive and warm. We had a great experience conducting this show. I’d like to thank our partners here who made it to the meet and expressed their interest in CP PLUS technologies. We look forward to a great association with them,” said Yogesh B. Dutta, COO, CP PLUS.

CP PLUS showcased their Red and Indigo series cameras and DVRs at the meet. While the Red series is designed for small to mid-sized commercial installations, with up to 4MP resolution, H.265 compression, motorized zoom, WDR, starlight, night vision etc., the Indigo series are high end, enterprise grade cameras that are designed rugged, and can undergo stringent tests to meet a wide range of environmental and situational conditions. They are equipped with resolutions up to 12MP, InstaStream compression, 44x zoom, edge analytics, and more.

SecurityLink India ■ July 2018

75


International Updates

Hikvision’s Twin Accolades 2018 Esx Innovation Award for Video Surveillance

H

ikvision Thermal Bi-Spectrum IP camera has been named as the 2018 ESX Innovation Award winner in the video surveillance category. The ESX Innovation Awards recognize ‘the most impactful and ground breaking technologies for the electronic security and life safety industry.’

“To be recognized by the ESX panel of industry experts is an honor,” said Jeffrey He, President of Hikvision USA Inc., and Hikvision Canada Inc., “We’re proud to provide our integrator partners and their end user customers with thermal camera systems combined with VCA such as the DS-2TD2615-7/10 Thermal Bi-Spectrum IP camera. Used in some of the most demanding market segments, these Hikvision solutions help combat crime and terrorism, and safeguard North American communities.”

Best Technology Company by DMCC

H

The DS-2TD2615-7/10 Thermal Bi-Spectrum IP camera is an affordable, bi-spectrum perimeter camera system, with onboard VCA, that features a 160x120 thermal imager, with 7 or 10mm lens, and 2MP CMOS DarkFighter visible camera with matched field of view. It is capable of full frame low light color imaging down to 0.002 lux. The DS-2TD2615-7/10 effectively addresses the requirements of highly reliable, low false alarm, unmanned perimeter detection at a very low cost of ownership. Ground breaking technology that is built into the camera includes bi-spectrum image fusion, picture-in-picture preview and image switching, enabling enhanced image quality and ease-of-use viewing capabilities. Hikvision and the other ESX Innovation Award winners were chosen by a panel of security industry professionals who judged the products based on features and functions, innovation, end-user experience, ability to solve a problem, revenue growth potential, impact on company value and efficiencies, and compliance with regulations. Hikvision’s award-winning camera was featured in the recently held ESX 2018 Innovation Awards Show, in Nashville, Tenn. 76

ikvision, has also been awarded the ‘Best Technology Company’ at the 2nd DMCC Members Awards 2018. Dubai Multi Commodities Centre (DMCC), the world’s most interconnected Free Zone and the leading trade and enterprise hub for commodities, awarded Hikvision for its outstanding performance in the field of science and technology. DMCC is the Dubai Government Authority on commodities, trade and enterprise. The Members Awards highlights outstanding DMCC member enterprises and industry leaders, and thanks them for their efforts in the construction of the DMCC community. DMCC received 115 award applications this year, of which 11 enterprises stood out to win the final awards. Hikvision was the only Chinese enterprise to receive the award. “We are excited and honored to win the Best Technology Company Award. Since the establishment of Hikvision MENA office in DMCC in 2010, the company has moved

SecurityLink India ■ July 2018


International Updates

forward at a rapid pace in the MENA market,” remarked Robert Wong, Technical Director of Hikvision, MENA. In 2008, Hikvision set out to penetrate the Middle East and North Africa market, extending its business across 23 countries. Hikvision’s MENA headquarters was officially established in 2010, and joined DMCC the same year. At present, Hikvision’s Dubai warehouse, showroom, and RMA centers are complete and operating normally. Thanks to the efforts of the Hikvision team and its valued partners, Hikvision MENA has gained the No.1 market share in this competitive region for

CCTV and video surveillance equipment. The DMCC Members Awards covers a wide spectrum of business sectors, providing an opportunity for all their members to submit their entry into the award categories that best suit their business. The awards were evaluated based on the enterprise performance and ability to achieve business growth, their global influence, market share, high turnover, and contribution to the industry. The winners for each category were carefully selected by an esteemed panel of judges.

Recognized for Multiple Awards For Innovative Products and Partner Solutions

O

ncam, has been honored with two awards for its innovative products – Most Innovative Online Solution from the 2018 North American Fraud Awards alongside its partners at Video Analysis Solutions (VAS), and a 2018 Money-Saving Products Award from BUILDINGS Magazine for its new Evolution 180 indoor camera. The recognitions demonstrate the company’s continued dedication to innovation and the development of technology to address today’s greatest security and business challenges. At the 2018 North American Retail Fraud Awards dinner in May, Oncam and its partner VAS were recognized by Retail Risk for their retail-centric cloud searching dashboard. Oncam and VAS have created a powerful and user-friendly analytics tool that leverages Oncam’s high-quality 360-degree video and intuitive VAS analytics to allow store managers and staff to securely log in and view live or recorded images, as well as monitor customer behavior and provide details on store

traffic. The solution offers significant ROI by optimizing store operations, improving customer service and growing sales. The Evolution 180 indoor camera was recognized in the June 2018 issue of BUILDINGS Magazine for the features it provides building owners and facility managers for life safety and security. The Evolution 180 range uses a 12MP sensor for high resolution panoramic video. Oncam’s unique angle compensation technology provides adaptive dewarping in the camera, eliminating the need for integration in video management software. The SecurityLink India ■ July 2018

camera is ONVIF Profile S compliant, making it plug-and-play with the leading video management systems on the market today. “Oncam provides innovation in the products we create, but more than that, our close collaboration with other technology leaders allows us to create solutions that enhance the abilities of our video capture tools to provide valuable insight to end users,” said Jumbi Edulbehram, Regional President – Americas, Oncam, “These awards are an acknowledgement of the hard work and dedication of our team and we’re honored to be recognized.” 77


International Updates

Hosts Developers’ Plugfest in Sweden NVIF®, the leading global standardization initiative for IP-based physical security products has recently hosted the 18th ONVIF Developers’ Plugfest (ODP), its largest Plugfest ever, in Malmö, Sweden. With a record 445 hours of testing, the ODP provided an opportunity to fine tune interoperability using all six ONVIF profiles including the Release Candidate of Profile T for advanced video streaming, scheduled for final release later this year. Held twice each year, the ODP brings together engineers and developers from ONVIF member companies to test their products’ implementation of ONVIF Profile specifications with other ONVIF Profile-conformant products to ensure interoperability between conformant products. In all, the Malmö event drew 62 attendees from 26 member companies and 16 different countries. In the three-day timespan, attendees logged nearly 450 hours of total testing time, surpassing the previous record of 300 hours. “The ONVIF Developers Plugfest is not just a testing opportunity for members to establish ONVIF conformant products before they are released into the market, but also an opportunity for member representatives to work directly with Test Tool developers,” said Steven Dillingham, Chairman of the ONVIF Technical Services Committee Taskforce, Developers’ Plugfest, “The Plugfest represents the final phase of product development after months of hard work, and we are fortunate to have so many member companies excited to participate, and willing to give feedback to further refine the conformance process.” In addition to testing the six Profiles, attendees were also offered one hour of testing using the ONVIF Device/ Client Test Tools, also with the opportunity to discuss any issues that arose during conformance testing with Test Tool developers. Founded in 2008, ONVIF is a leading and well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system and access control companies and nearly 10,000 Profile conformant products.

O

78

Access Control Integration with Genetec in 2018 I

SONAS and Genetec have announced a technology integration that will drive the access control market to the next level. Users will be able to pair the simplicity of the ISONAS Pure IP™ hardware with the enterprise functionality of the Genetec™ Security Center unified security platform; giving customers the power of choice in access control software solutions. The open architecture of Security Center unifies IP-based video surveillance, access control, and automatic license plate recognition (ALPR) allowing customers to manage their platform all from a single interface. With the introduction of its software development kit last fall, which provides a path for third-party software integrations with the ISONAS hardware, ISONAS has made a strong impact on migrating the access control market to Pure IP™ hardware powered by the network. As a testament to this commitment, collaborating with Genetec will allow customers to select the best of breed software and pair it with the next evolution in access control – the ISONAS Pure IP™ family of hardware. The RC-04 family revolutionizes the ease of install and the powerful addition of Bluetooth® Low Energy (BLE) capability makes access control hassle free by allowing for the use of a smart phone as a user’s credential. “The Security Center Synergis access control system gives customers great flexibility to choose the hardware that best meets the unique physical security needs of their organization,” said François Brouillet, Access Control Product Manager at Genetec, “Because Security Center Synergis is built on an open architecture, we can extend support for the ISONAS IP to the RC-04 door hardware. ISONAS is a valued technology partner.” “We are excited to announce our new partnership with Genetec, a global leader in video and access control and look forward to a powerful integration. This integration proliferates the ISONAS hardware as the defacto standard for access control,” states Melissa Stenger, VP of Product Management and Marketing at ISONAS, “Genetec has been a great partner and we look forward to providing a positive product experience to our customers in the future.” Over the last few years, ISONAS has made the commitment to develop powerful integrations and offer customers the opportunity to use Pure IP™ hardware with any software, specifically like-minded open-architecture companies like Genetec.

SecurityLink India ■ July 2018


International Updates

Key to Successful use of

Smartphones in Access Control N

edap has announced significant new possibilities in the MACE platform to seamlessly fit it into the technical and organizational environment of clients. MACE is used to send and revoke virtual access control cards to smartphones in any security or parking application. The announced expansion and enhancement of the mobile access control platform offer unlimited potential for integration and effective use. “MACE already offered a great deal of functionality to security managers that were looking to store virtual access control cards on a smartphone. With MACE, it is very easy for administrators to distribute and revoke those virtual cards, and for users it is very easy to gain access. This functionality is improved even further with additional features related to credential management and communication with users,” says Maarten Mijwaart, General Manager of Nedap Identification Systems, “In addition, clients now can build the functionality into their own access control system and they can create their own custom apps. It is our belief that these new features make MACE the platform of choice for any organization that is looking for a solution to empower its users with the ability to use the smartphone as a key.”

Improved credential management and user communication

T

he newly announced features of the MACE platform for improved cre-

dential management and user communication include: ●● The new MACE App SDK that is used to develop a MACE compatible app with custom look and feel and potential integration with client specific functionality. ●● The MACE REST API that is used to exchange commands between the cloud based MACE Admin Portal and third party access control systems. Access control administrators now can send and revoke virtual access cards to their users from within the application that they are used to. ●● The MACE Admin Portal that offers additional possibilities to automate the process of allocating and revoking virtual cards and the communication related to that. ●● The newest version of the MACE Apps for Google Android phones and Apple iPhones that offer enSecurityLink India ■ July 2018

hanced BLE performance and additional security features.

Leading in mobile access control

T

he number of companies offering mobile access control is increasing. What makes Nedap’s MACE leading in mobile access control is that the platform truly matches the clients’ demands. Not only do the new features enable a seamless integration into any access control or parking management system, they also complement their processes. With the introduction of the MACE platform, Nedap responds to the global shift of smartphone credentials replacing physical cards. MACE can be used in combination with any access control system or any other system that requires the swift identification of people, such as building or parking management systems. 79


International Updates

Facial Recognition Solution Excels at US Department of Homeland Security 2018 Biometric Rally Innovative solution using Gemalto Live Face Identification System (LFIS) obtained a 99.44% acquisition rate under 5 seconds

G

simulated airport conditions. Gemalto created a solution using Live Face Identification System (LFIS) as the core technology to meet the 2018 biometric rally requirements, and the solution outperformed the average range for most metrics in addition to a 99.44% successful acquisition rate in less than 5 seconds compared to the average of 65%. Gemalto, also known as ‘Castle’ in the anonymized results shared by the sponsors performed exceptionally well. Gemalto’s solution had the leading result for FtAR (see table) for both under 5 and 20 seconds and Face vTIR (see table) for under 5 and 20 seconds. Regarding Face mTIR (see table) and efficiency metrics Gemalto was one of only 2 vendors to meet the goal. Facial recognition is positioned to grow over 20% a year from 2016 to 2022 over a broad spectrum of use cases. In addition to security at the border, LFIS

80

SecurityLink India ■ July 2018

emalto excelled at the 2018 biometrics rally, sponsored by the US Department of Homeland Security’s (DHS) Science and Technology Directorate (S&T) in conjunction with the National Institute of Standards and Technology (NIST). Twelve companies were chosen out of a pool of applicants to showcase their facial recognition technology to address the growing challenge of traveler identification and automated border control. Each company also had to meet several listed requirements such as time restraints, unmanned operation, and limited physical footprint. They were also evaluated in three categories – efficiency, satisfaction, and effectiveness. The 2018 rally was done at the Maryland Test Facility (MdTF) which provides a controlled environment for laboratory evaluation and operational scenariobased testing of various biometric entry and exit concepts of operation under

can improve the traveler’s experience from curb to gate to curb by introducing self-service bag drop, speeding up security lines and even enabling biometric boarding. The technology is hardware and camera agnostic and can be used with enrolment and document verification as well. The technology can be used for other business cases where a biometric identity check is required to verify access to secure premises. “We’re thrilled with the outstanding results our solution achieved at the 2018 rally,” said Neville Pattinson, Senior Vice President of Federal Government Sales for Gemalto, “Given the success of LFIS, we see this as a secure and efficient solution for government entities to interact with citizens. It can also revolutionize the air, land and sea passenger, international border, and security checkpoint experiences with increased security and added convenience to travelers.”


International Updates

Smart Homes: Vendor Analysis, Impact Assessments & Strategic Opportunities 2018-2023 Smart Home Automation Revenues to Exceed $45 Billion by 2023, as Smart Security Dominates the Market Automation Service Market to Grow by 260% by 2023

A

new study from Juniper Research has found that increasing smart security adoption will drive home automation and monitoring revenues from an estimated $12 billion in 2018 to over $45 billion by 2023, representing a growth of over 260%. The research found that smart security is a driving force behind this market growth with manufacturers such as Nest, Hive and Netgear producing compelling mass market products. This move is reinforced by the heavy focus by big players on smart entry solutions, as evidenced by Amazon’s acquisition of Ring.

Interoperability of ecosystems driving ease of use

T

he new research, Smart Homes: Vendor Analysis, Impact Assessments & Strategic Opportunities 2018-2023, established that major vendors are concentrating on building out their ecosystems, with corporate partnerships and acquisitions being primary tools. Juniper predicted that open ecosystems will rapidly accelerate growth, reaching 1 billion automation and monitoring devices by 2023, up from 176 million in 2018, leading to benefits for both consumers and vendors. This approach has been aided by increasing device interoperability and in turn, consumer convenience. Meanwhile, the increasing ubiquity and low-entry cost of open platforms such as Alexa are leaving players with closed ecosystems such as Apple, exposed. Research Author Nick Maynard explained, “The smart home makes the biggest impact upon customers when it is seamless. By offering services across ecosystems, vendors are broadening their markets, allowing vendors to compete on features rather than compatibility.”

Smart home automation drives insurance opportunity

T

he research also found that the smart home represents a significant opportunity for insurers to boost their appeal to consumers. Juniper estimates that during 2018, around 65 million new home insurance policies will leverage smart home technologies. By implementing technologies such as water leak detectors and smart smoke alarms, insurers can add greater value to existing relationships and generate loyalty. Juniper recommends that this is critically important as price comparison websites have devalued the existing insurer-customer relationships. SecurityLink India ■ July 2018

Delivers Strong Revenue Growth in 2017 M

ilestone Systems once again delivers strong results as indicated by the 2017 financial report – a solid growth of 24% over 2016 was achieved. Net revenue was DKK 881M (EUR 118M), an increase of 24% compared to 2016 and operating income before depreciation and amortization (EBITDA) resulted in DKK 246M (EUR 33M), corresponding to an increase of 103%. Net income reached DKK 117M (EUR 16M). “The overall video management market is growing, and we expect to grow even faster. We offer an open, reliable, scalable and best-of-breed platform enabled by our partner community, which attracts end-users in all segments of the market,” explains Lars Thinggaard, President and CEO, Milestone Systems. (DKK and EUR millions)

2017

2016

Change

Net revenue

DKK 881M/ EUR 118M

DKK 709M/ EUR 95M

24%

EBITDA

DKK 246M/ EUR 33M

DKK 121M/ EUR 16M

103%

EBITDA margin

28.0%

17.0%

Net income

DKK 117M/ EUR 16M

DKK 41M/ EUR 6M

185%

Average number of employees

586

569

3%

New ways of deploying VMS

M

ilestone Systems expects continued growth in 2018 and plans to increase investments in its community of partners with the aim to remain a market leader and to explore new ways of deploying video management software. 81


product showcase

EasyIP 4.0 Cameras and NVRs To Help Small and Medium Businesses Maximize their Site Security

H

ikvision has recently announced a new range of EasyIP 4.0 cameras and NVRs. Building on the capabilities of their EasyIP 3.0 range, they provide simple, practical and affordable surveillance solutions for small and medium size businesses. The EasyIP 4.0 products are built on Hikvision’s H.265+ smart codec, which reduces bandwidth and storage requirements by up to 50% over H.265, delivering major IT savings for small and medium size businesses.

As an additional benefit, the EasyIP 4.0 range introduces a number of new technology innovations to help businesses maximize their surveillance and security. They include:

Hikvision AcuSense

I

ntegration of Hikvision AcuSense into EasyIP 4.0 IP cameras and NVRs, helps filtering out false alarms with more than 90% accuracy, and faster reaction to real security threats. Hikvision AcuSense works by detecting humans or vehicles, and effectively filters out false alarms triggered by natural movements such as rain or leaves. With automated strobe light and audio alarms, Hikvision AcuSense enabled cameras also deter would-be intruders before a security breach occurs. 82

Besides, they further incorporate Hikvision ‘Powered by DarkFighter’ ultra-low-light illumination technology, which provides superior surveillance images, even at night. Combined with ultra-high-definition video capabilities, Powered by DarkFighter ensures that organizations can identify and react to security threats effectively, and provide great video evidence in the event of a security breach. As an extension to Hikvision AcuSense, EasyIP 4.0 NVRs offer a ‘quick target search’ feature that allows security teams to find footage quickly in the event of a security incident. This saves many hours for teams who would otherwise search for footage manually.

Hikvision ColorVu

E

asyIP 4.0 ColorVu cameras use warm, supplemental lighting to deliver bright color video images, even at night. Round-the-clock color-boosting capabilities are powered by an F1.0 super aperture, a more advanced sensor, warm supplemental lighting, and a range of other technologies. With brighter, more colorful video, EasyIP 4.0 ColorVu cameras support protection against security breaches whenever they happen, day or night. The new EasyIP 4.0 ColorVu cameras can be paired with one of Hikvision AcuSense enabled NVRs to minimize false alarms and speed up target searches.

Unprecedented site security for small and medium businesses

E

asyIP 4.0 cameras and NVRs provide high-grade, costeffective surveillance solutions for small and medium size businesses. Frank Zhang, General Manager of International Product Marketing Department at Hikvision said, “In the past, surveillance features such as ultra-high-definition video, nighttime color video and automated strobe light and audio alarms were out of reach for many smaller organisations. Now, with the EasyIP 4.0 range, we have now made these features accessible to small and medium size businesses, helping them achieving much higher levels of site security.”

SecurityLink India ■ July 2018


product showcase

Thermal Cameras Creating Value with Temperature

C

onventional surveillance cameras are capable of capturing video in daytime and well-lit areas. They are not capable enough for poorly lit areas or at night. If at all a picture is produced, it is noisy as sensors compensate for the lack of light by increasing sensitivity. Since clear day and night monitoring is an important benchmark in assessing a surveillance system’s effectiveness, thermal imaging devices present a clear advantage in their ability to convert heat energy into an image visible to the human eye. Leveraging its experience in camera image analysis and intelligent algorithms, Dahua Technology has developed a new generation of thermal imaging devices with innovative functions that balance visible light with infrared, enabling users to effectively monitor an area under all lighting conditions. These functions include advanced capabilities such as intelligent temperature measurement and behavior analysis, further extending the scope of surveillance applications such as perimeter protection or equipment predictive maintenance in substations. The new products adopt advanced uncooled infrared detectors with 400x300 effective pixels, realizing a 40% increase over the previous infrared detector with 336x256 effective pixels. The benefit is that the field of view is increased, for example, TPC-BF5400 with 13mm thermal lens, has a 29.7°x22.3° field of view, and the older model TPCBF5300 has 25°x19° with the same lens. Meanwhile, newer models have received improvements in detailed information, contrast and other upgrades. The Dahua IVS (Intelligent Video System) is a built-in video analytics algorithm that delivers intelligent Dahua New Generation of Thermal Imaging Cameras functions to mon-

itor a scene for tripwire violations, intrusion detection, and abandoned TPC-BF5300 Vs TPC-BF5400 or missing objects. It requires a certain number of pixels on the target to function properly. The DH-TPC-BF5400-B13 model can be utilized to form a perimeter intruder detection system performing as an invisible wall. When installed at the recommended height of 5 meters, one camera can cover a 100 meters long fence. Whether it is day or night, as long as someone enters into a targeted area, a warning will be sent to the control center. A thermal camera is not just for video surveillance, it is also suitable for remote temperature monitoring to prevent accidents. Calculating the corresponding relationship between received radiation energy and temperature, it shows the surface temperature of the target through different gray values. Currently, the temperature measurement tolerance is within a certain range- ±2°C, ±2%. It provides users with real-time information about substation equipment much more efficiently, saving time and labor. If the temperature of equipment or part of the station exceeds a preset threshold, the system will automatically trigger an alarm and alert management. For a thermal camera, the radiation does not only depend on the temperature, the surTPC-BF5300 Vs TPC-BF5400 rounding environment also emits radiation, especially high temperature objects at close distance, which will be reflected by the target surface. The emitted radiation of the object and the reflected radiation are also affected by atmospheric absorption. Therefore, to measure temperature precisely, it’s necessary to consider the effect of different radiant sources. A precise temperature measurement should include these three steps: ●● Excluding external temperature interference by placing a baffle or coat of high emissivity materials on the surface of the target to make the result as accurate as possible. ●● Keeping appropriate distance to ensure the target occupies at least 10x10 pixels in the image. ●● Considering energy transmission losses, especially in high temperature and humidity environments, the atmospheric transmission coefficient is obviously to be reduced.

SecurityLink India ■ July 2018

83


product showcase

Launching MAY

UMD Technology Added to H4 SL & Mini Dome Cameras

A Wide-area Acoustic-based Situational Awareness Solution

Advanced Artificial Intelligence Capabilities Now Available with Entry-level Camera Lines

Accurately defining and geo-locating events, the system offers a powerful tool for security and law enforcement agencies

A

E

vigilon Corporation, a Motorola Solutions company, has extended its video analytics platform to the H4 SL and H4 mini dome camera lines with the addition of unusual motion detection (UMD) technology.

MAY continuously senses its surroundings, detects acoustic abnormalities and provides a real-time analysis of emanating sounds based on advanced algorithms and deep-learning. Once it detects an acoustic anomaly such as gun-fire, the system identifies the event, classifies the sound type, pin points the geo-location of the signals and automatically provides actionable information to operating forces. MAY can also detect and process a variety of other public safety related sound signals including screaming, alarms and vandalism sounds. Deploying MAY dramatically reduces response-time of first responders, increases efficiency by avoiding irrelevant event interactions and introduces a strong deterrence factor to urban environments. These make it an effective solution for Homeland security and law enforcement agencies tasked with maintaining order and providing public safety.

The addition of UMD technology in the H4 SL and H4 mini dome camera lines offers customers powerful artificial intelligence (AI) capabilities at an entry-level price point. Without any predefined rules or set up, UMD technology continuously learns what typical activity in a scene looks like, and then detects and flags unusual motion. Through Avigilon Control Center (ACC) software, it allows operators to review large amounts of video faster by focusing their attention on the atypical events that may need further investigation. “We believe that AI can benefit all of our customers regardless of project size, complexity or budget,” said James Henderson, Avigilon’s President and Chief Operating Officer, “By adding UMD technology to the H4 SL and Mini Dome camera lines, we’ve created an easy-to-install and cost-effective way to deploy advanced video analytics in any application.” All new H4 SL and mini dome cameras include UMD technology, which is supported by the upcoming release of ACC 6.10 video management software. A free firmware download is available for previously installed cameras.

lbit Systems introduces MAY, an innovative sensing and analysis system that provides real-time, autonomous, wide-area acoustic-based intelligence that significantly enhances situational awareness and response time of security forces operating in urban and border areas. Developed by Elbit Systems’ EW and SIGINT Elisra, MAY is based on high-end acoustic sensors which operate interactively within an area of interest. Compact and durable, these fixed-installation sensors sustain long-term, outdoor 24/7 operation using either wired or wireless communications.

84

SecurityLink India ■ July 2018


product showcase

AI-Powered Edge Network Solution To Accelerate Business Transformation for Enterprise Customers New Smart OmniEdge solution brings intelligence, adaptability and security to campus and distributed environments via on-premise deployments or as-a-Service

T

he convergence of technology, users and devices at the network edge, coupled with insatiable demand for secure, reliable connectivity has created unprecedented complexity for enterprise IT teams that need to manage it all. To help provide the simplicity and intelligence today’s businesses require, Extreme Networks has recently announced Smart OmniEdge, a powerful artificial intelligence (AI) enabled network edge solution that offers enterprises the ability to deliver an exceptional customer-driven experience with pervasive intelligence, business adaptability and intrinsic security to accelerate their digital transformation. Extreme Networks’ Smart OmniEdge solution comprises a secure, unified wired/ wireless infrastructure and AI-driven management capabilities, accessible through a single pane of glass. The solution provides common visibility, policy and authentication services across the entire infrastructure. Purpose built to address the growth of users and internet of things (IoT) devices, Smart OmniEdge uniquely delivers a consistent customer-driven experience across diverse network environments via flexibility of on-premise deployment or as-a-service offering. The resulting network and insights give customers the agility required to grow and adapt quickly as their business needs change, while protecting their investments. The Extreme Networks Smart OmniEdge solution family includes Extreme’s leading wired, wireless, network management, cloud, analytics and security capabilities. New technologies being introduced today are designed specifically to enhance the edge network experience, and include: ●● Extreme AI for Smart OmniEdge: A powerful, hosted application that augments human intelligence with proactive artificial intelligence to simplify the complex task of RF management. The solution uses machine learning

to collect network analytics, device statistics, connection rates, and user and application experience characteristics. This enables the network to continuously learn and adapt to a customer’s clients and applications accessing the WiFi network. ●● Extreme Cloud Appliance: Designed for customers that love the simplicity of the ExtremeCloud solution and want an on-premise solution. ExtremeCloud Appliance delivers cloud-like licensing and management with tightly integrated services and features on-premise deployments require. ExtremeCloud Appliance is container ready for operational expansion. It is also available as a virtual machine (VM) for customers that have their own private cloud services. ●● Extreme Extended Edge Switching: An innovative technology that collapses multiple network layers into a single logical switch, enhancing the intelligence of edge switches, while flattening the network and eliminating deployment complexity. The result is a simplified operational model that reduces costs. ●● Extreme Defender for IoT: A comprehensive security solution that simplifies on-boarding and securing of wired IoT devices. The Defender for IoT application can be deployed on the ExtremeCloud Appliance in any form factor, and used to help ensure secure access of IoT devices plugged into the wall jack AP or the Extreme Defender Adaptor. The solution provides centralized visibility and management, enabling IT to analyze traffic flows and pinpoint anomalies. The solution works with the Extreme Fabric Connect solution or over third-party networks to protect IoT devices, and is ideal for healthcare environments. Smart OmniEdge incorporates pervasive intelligence throughout the solution to provide mobile users with an exceptional experience and drive business and operational transformation. The solution is agile and business adaptive, allowing networks to quickly transform in lockstep with the businesses that rely on them using any combination of solutions to meet their business needs today and in the future, without rip and replace, or retraining. As the network edge has become the primary access for users, devices and IoT, it has also become an attack surface. Smart OmniEdge is intrinsically secure, from the Wi-Fi RF, access point and Ethernet switches which extend through the campus to the data center, with automated compliance checks, threat detection, analytics and mitigation from the

SecurityLink India ■ July 2018

85


product showcase

time of IoT device on-boarding until completion of the user’s session.

90 day no-pay financing through Extreme Capital solutions

T

he Smart OmniEdge solution’s unique network consumption model enables Extreme Network partners to offer on-premise and as-a-service solutions to fit customer’s unique requirements. Extreme offers 100% in-sourced services and support for Smart OmniEdge customers, delivered by Extreme employees. With the introduction of Smart OmniEdge, Extreme is offering a promotion for new customers through network partners, global system integrators and federal partners which enables them to acquire the Smart OmniEdge solution today and pay nothing for the first 90 days when they finance through Extreme Capital Solutions. Alternatively, customers can choose from financing options tailored to best meet their business needs.

Virtualized Network Encryption Platform To Help Customers Address Evolving Data Security Needs

G

emalto has launched a new virtualized network encryption platform, SafeNet Virtual Encryptor CV1000 as part of its continued investment to address the rapidly changing data security needs of organizations worldwide. Today, enterprises and service providers are increasingly using network functions virtualization (NFV) and softwaredefined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated network encryption hardware appliances to virtual servers. However, these technologies can also present additional security challenges for protecting sensitive data that runs across these networks because of their virtualized architecture. Leveraging the proven security and performance of the hardware-based SafeNet High Speed Encryptor family, the 86

SafeNet Virtual Encryptor CV1000 is a hardened virtual security appliance designed to secure data in motion across both software-defined wide area networks (SD-WAN) and traditional networks. Developed by Gemalto’s high speed encryption partner, Senetas the SafeNet Virtual Encryptor CV1000 can encrypt data in motion at data-rates up to 5 Gbps. “More and more organizations are embracing the advantages of virtualized networks to deliver cost-effective scalability, flexibility and network management to the network edge. Consequently, network services require trusted virtualized encryption for optimum data security,” said Todd Moore, Senior Vice President of Encryption Products at Gemalto, “Gemalto’s launch of a virtualized network encryption platform redefines network data security by providing the crypto-agility required to ensure sensitive data and transmissions remain secure, regardless of network design.” Transforming the network encryption market, SafeNet High Speed Encryptors are the first to offer Transport Independent Mode, which enables organizations to encrypt data across mixed high speed WAN links (Layers 2, 3 and 4). Organizations can now be assured that they are getting the best performance and secure encryption, regardless of the network layer. This feature is currently available for the SafeNet Virtual Encryptor CV1000, and will be available for the hardwarebased SafeNet High Speed Encryptors later this year. “As organizations increasingly embrace cloud-based applications and their use of multiple network types from Ethernet to MPLS, Senetas and Gemalto are ahead of the curve in providing seamless concurrent multi-layer network traffic encryption to ensure the best in network security and performance available today,” said Andrew Wilson, CEO of Senetas.

2D Eye A Unique Iris Recognition Device

T

he TBS 2D Eye is a revolutionary combination of iris algorithm and face detection designed for high security and multi-functionality at point of access. The sensor captures the iris of both eyes while the face sensor is used to automatically adjust to capture the height of the users, highly

SecurityLink India ■ July 2018


product showcase

user-friendly and hygienic for sensitive applications. Developed in cooperation with a leading specialist in iris technology, the new 2D EYE is fully integrated into TBS platform, offering all the communication, integration and adaptability advantages that make the TBS solutions unique in the market.

AI-Powered Video Surveillance Enabled with New High-Capacity Products Full edge-to-core surveillance portfolio adds 12TB WD Purple Drive with the ability to apply machine learning & ai to enhance safety & security

W

estern Digital Corporation has expanded its surveillance portfolio with the introduction of the industry’s highest capacity, deep-learning-capable, surveillance-class drive, Western Digital® Purple 12TB drive with exclusive AllFrame AI technology. The newest addition to Western Digital’s surveillance portfolio creates new possibilities in video surveillance by supporting the capture of multiple high resolution video streams while simultaneously accessing recorded video to support deep learning and analytics. This capability is purpose-built for emerging DVR and NVR systems with artificial intelligence (AI) capabilities in that it supports real-time detection of AI-triggered events at the point of capture with continuous background learning. According to IDC, the amount of big data exabytes generated by surveillance solutions is expected to grow by 25 percent per year through 2021. This growth is driven by

the installation of more complex cameras with vastly improved resolutions, increasingly intelligent applications and overall expanding use of video for analytics globally. Traditional video surveillance systems detect moving subjects without providing detailed analysis. New systems enable additional functions such as real-time edge analytics to better detect objects and reduce false triggers. Objects such as animals, leaves, and even light can cause false alarms. AI-enabled systems not only detect the moving targets, but can analyze them to help determine if they are a potential threat. In addition, deep-learning algorithms go beyond simple movement detection to enable advanced capabilities such as facial recognition and behavior prediction to drive advancements in the retail and entertainment industries. “Network video recording systems are getting smart,” said Brendan Collins, Vice President Product Marketing, Devices Business Unit, Western Digital, “AI-enabled NVRs are being architected for new GPUs and CPUs to improve overall deep-learning capability and to speed algorithms related to object recognition and facial recognition. NVRs with deep learning require greater storage capacity and more sophisticated processing, versus individual cameras, to perform more advanced analytics such as location of an individual face image from weeks or months of stored video, or creation of traffic heat maps from hours of retail surveillance video.” “With the advancements in the capability of our surveillance solutions, the amount of storage required to capture, store, and analyze the video from the millions of cameras installed throughout the world for smart cities, intelligent transportation, and other surveillance applications is constantly growing,” said Derek Yang, President, Hikvision Europe, “Western Digital’s 12TB surveillance drive and portfolio of surveillance products will enable us to provide optimized surveillance solutions for our clients.” The Western Digital Purple 12TB surveillance-class drives enable higher capacity storage for all compatible video surveillance systems. Western Digital Purple 10TB and 12TB capacities feature exclusive AllFrame AI technology designed specifically for AI-enabled systems. This allows the drives to support up to twice as many AI channels (16 AI channels/ 32 AI streams) than the competition, and is future ready for more capable next generation systems to enable the on-going evolution of deep learning and video analytics in the surveillance market.

SecurityLink India ■ July 2018

87


product showcase

Guardian A Cloud-based Managed Services Platform To extend security service providers’ and alarm monitoring companies’ offering

I

n a further development of its cloud-based services, Axis Communications has recently launched AXIS Guardian, which is designed to allow security service providers and alarm monitoring companies to offer an end-to-end managed service with remote monitoring. AXIS Guardian has been created in close collaboration with a number of alarm and security service companies to specifically meet the needs of their customers. Designed to integrate with a provider’s existing alarm monitoring software, the video data is processed on the edge by Axis and then stored in the cloud and/ or locally. Using AXIS Guardian’s centralized device management, providers can maintain and manage their clients’ systems remotely while delivering stable and reliable monitoring to their end customers, without the overheads of maintenance or installation. AXIS Guardian allows alarm monitoring companies and security service providers to increase their customer service and deepen their relationships with customers, without incurring large overheads by:

Increasing operational efficiencies

I

ntegrating AXIS Guardian with alarm handling software makes alarm handling very quick and efficient. By adding video verification to alarm solutions allows for the easy and fast identification and verification of a potential threat. This can be done immediately, off-site from the providers’ central station, so the most appropriate response (fire, police, janitor) can be quickly deployed, without sending a guard. By being able to verify an alarm trigger and only deploy someone to address actual incidents, security service and alarm monitoring providers can avoid wasting resources on false alarms, so they can run more efficiently, to provide more services, without having to increase their resources to investigate every alert. 88

 We have developed AXIS Guardian in partnership with alarm companies and security providers to give them a competitive advantage through a complete end-to-end security service offering  – Johan Birkfeldt Global Director, Hosted Services, Axis Communications Increasing revenues

A

XIS Guardian also opens up the opportunity for alarm companies and security service providers to offer additional services to their end-customers, from remote guarding of a perimeter through to challenging unknown individuals verbally using audio products. This integration allows for up-selling and cross-selling of additional products and services to end-customers. It means that customers can benefit from the combination of the best surveillance products on the market, without having to worry about how they will manage the extra security devices and services, as it is all looked after remotely by the alarm monitoring companies and security surveillance providers. This means providers can increase revenues through both the initial sales of the hardware and the additional on-going management of these extra surveillance services. AXIS Guardian’s web and mobile app also allows endcustomers to have control over their surveillance as required. Via the apps, customers can access their recorded and live video footage so they can monitor or check their system independently of their alarm or security services provider, for example to catch suspected shop lifters during opening hours, meaning they can act straight away to minimize losses through theft or damage.

SecurityLink India ■ July 2018


product showcase

Cost savings

T

he service also provides commercial benefits. Installation is exceptionally easy as no system design is needed, nor are specially trained installers. AXIS Guardian plugs right in to the existing alarm system, and new devices can be added with a single click, meaning no large up front or installation costs. Remote health monitoring of devices reduces the costs associated with paying and training guards or hiring additional engineers to undertake routine checks of equipment. AXIS Guardian has a flexible subscription model meaning it can be scaled according to a company’s clients’ needs, so alarm monitoring and security service providers only pay for what they are actually using.

Next-Generation Black Hornet 3 Nano-UAV Latest Black Hornet Enables Operation in GPS-Denied Areas

F

LIR Systems, Inc., has recently announced the Black Hornet® 3 nano-unmanned aerial vehicle (UAV) for use by global militaries, government agencies, and first responders. The Black Hornet Personal Reconnaissance System (PRS) is already the world’s smallest combatproven nano-Unmanned Aerial System (UAS), and FLIR’s next generation Black Hornet 3 nano-UAV adds the ability to navigate in GPS-denied environments, enabling the warfighter to maintain situational awareness, threat detection, and surveillance no matter where the mission takes them. The Black Hornet PRS has been fielded by over 30 nations over the past seven years and continues to represent the cutting-edge in the combat nano-UAS space, enabling small combat units, SWAT teams, and first responders with immediately available intelligence, target-acquisition and reconnaissance capability. At 32 grams, the Black Hornet 3 offers the lowest size, weight and performance for UAS available. Offering improved speed and distance compared to previous versions, the Black Hornet 3 flies 2 kilometers at speeds of over 21 kilometers an hour. The Black Hornet

3 also incorporates sharper imaging processing featuring the FLIR Lepton® thermal micro-camera core and a visible sensor to allow greater image fidelity. The design also features an improved encrypted militaryapproved digital datalink, Australian Department of Defense using the new FLIR Black Hornet enabling seamless com3. Credit Australian Department of munications and imagery Defense significantly beyond lineof-sight and in closed areas. Additionally, the Black Hornet 3 seamlessly integrates into the Android Tactical Assault Kit (ATAK) utilized by the military to provide battlefield networks and distribution of information to anyone on the network. “We are excited to bring this advanced Black Hornet 3 to our warfighters and first responders,” said James Cannon, President and CEO of FLIR, “With longer range and indoor flight capabilities, the latest generation Black Hornet provides full surveillance coverage continuity to the mission. The Black Hornet 3 is representative of FLIR’s new focus on providing full-solution technology, and we look forward to playing a role in helping modernize our military customers.”

New IP Video Phone for Android™

G

randstream, connecting the world since 2002 with award-winning SIP unified communication solutions, has recently introduced a new member of its award-winning GXV series of IP video phones. The GXV3370 IP Video Phone for Android™ offers a powerful desktop video phone featuring Android 7.0, a 7” touch screen, real-time HD video telephony, built-in Wi-Fi & Bluetooth, and more. The GXV3370 supports open SIP standards and offers HD audio, an intuitive user interface, advanced SDK/ API for custom application development, and is fully interoperable with nearly all major SIP voice and video platforms. This comprehensive IP video phone also seamlessly integrates

SecurityLink India ■ July 2018

89


product showcase

New Mx6 Camera Line With Integrated MxBus Functionality

M GXV3370 offers a powerful desktop video phone with 7” touch screen, Android 7.0, integrated Wi-Fi/ Bluetooth and more

with Grandstream’s other solutions including SIP cameras, door systems, IP PBXs and video conferencing offerings. Notable features of the GXV3370 include: ●● Runs Android 7.0 and offers access to the millions of apps in the Google Play Store. ●● Built-in megapixel camera for 720p HD H.264 video calling with privacy shutter. ●● 7 inch (1024x600) 5-point capacitive touch screen. ●● Integrated dual-band WiFi (802.11a/b/g/n). ●● Built-in HD Bluetooth for syncing with mobile devices and connecting Bluetooth headsets. ●● 4-core 1.3GHz ARM Cortex A53 processor with 2GB RAM and 8GB eMMC Flash. ●● Support for up to 16 lines and 16 SIP accounts, up to 7-way audio conferencing and 3-way video conferencing. ●● HD audio, speakerphone with HD acoustic chamber, advanced echo cancellation and excellent double-talk performance. ●● Dual switched auto-sensing Gigabit ports with PoE. “We are excited to introduce the newest member of our long-standing GXV series, the GXV3370,” said David Li, CEO of Grandstream, “Our innovative GXV series is truly one-of-a-kind as they offer some of the only IP video phones on the market that allow users to harness the full power of Android. This new model offers a significant upgrade to our existing GXV series models thanks to Android 7.0 and a much more powerful hardware platform. We expect the GXV3370 to extend our legacy of producing the finest and best-selling IP Video Phone on the market.”

90

OBOTIX offers second generation of Mx6 camera line with integrated MxBus functionality (camera types x16B/ x26B). The MxBus technology is based on an extended camera board. This two-wire cable system developed by MOBOTIX is encrypted against cyberattacks and expands camera functions by including practical additional MOBOTIX modules such as the MX-GPS-Box, a reliable time server for a complete video system. Within a MOBOTIX video system, Mx6 cameras without MxBus can also process and use the data from an MxBus module that is connected to a camera within the same network. For example, they can access the time signal from a GPS-Box or activate their own recording through MxMultiSense modules placed at the ceiling of a room via MxMessageSystem.

The new x16B/ x26B models feature the same exterior structures as the corresponding first-generation Mx6 cameras. This means that all of the sensor modules, mounts and system components that they contain can also be used for the latest generation of MOBOTIX cameras. All first-generation Mx6 camera models (x16A/ x26A) are also available as corresponding second-generation camera models with MxBus (x16B/ x26B). In order to use the MxBus functionality with the Indoor cameras c26B, i26B, p26B and v26B, as well as to add two additional inputs and two outputs to the camera, an additional MxIOBoard-IC is required.

SecurityLink India ■ July 2018


product showcase

New SPC Wireless Devices Aimed at Installer Convenience

V

anderbilt has recently released a new range of SPC Wireless devices, which includes detectors, panic buttons, fobs, and a transceiver. The devices are discreet and tasteful in design with sleek and modern lines to complement the interior styles of many environments such as retail stores and apartment buildings.

 Vanderbilt’s SPC wireless devices are easy for installers to mount, pair, and configure, and they can cover over 500 meters in open space. This is a more cost-effective alternative than having to wire an entire building with cable. The 500-meter range cuts down on install time, meaning an entire building can be fitted in just a couple of hours, offering a means of reducing costs for the installer  – Ronan Naughton Product Manager, Vanderbilt Wireless technology is coming of age, and the new Vanderbilt devices boast two-way wireless technology that delivers ease of installation without compromising on the security of a wired system. A vital feature of the release is that the devices use the industry-leading Energizer® lithium batteries, resulting in an extended battery life of five years or more. This longevity can free up installers’ time for more urgent tasks, as they won’t have to go to site as often to keep changing out batteries. Further delivering on the aim of aiding installers, settings for SPC Wireless are all configurable over the air, again

 At Vanderbilt, we are pleased to announce the expansion of the SPC intrusion detection family with the release of these wireless devices. This range of products was designed in response to growing consumer IoT trends, and as a result, present a great revenue opportunity for installers in boosting their SPC portfolio offering  – Ross Wilks Head of Marketing Communications, Vanderbilt reducing the need for time-consuming site visits. This release marks the first phase of wireless development for the award-winning SPC system. In subsequent releases due later this year, Vanderbilt will also present repeaters, bells, sirens, PIR cameras, and keypads for their wireless range to the market.

Wisenet Biometrics & Retail Solutions People Counting, Queue Monitoring and Age & Gender Analysis

H

anwha Techwin and analytic specialists A.I. Tech, have jointly engineered biometrics and retail solutions to enable small retail chains, as well as small outlets such as convenience stores, news agents and petrol stations, to gain a greater understanding of the type and numbers of people who visit their stores.

Accurate and reliable

B

oth of the cost-effective cameras solutions, which are supplied ready to work out-of-box, are equipped with A.I. Tech video analytics to provide retailers with valuable business intelligence. The advanced intelligence and artificial vision algorithms incorporated into A.I. Tech’s powerful analytics engine have been developed as a result of 25 years experience of designing innovative and intelligent video analysis solutions.

Wisenet AI-Retail-DASH

T

he Wisenet AI-Retail-DASH solution takes advantage of the superb quality images captured by the 2 megapix-

SecurityLink India ■ July 2018

91


product showcase

el network Wisenet XND-6010/ RET dome camera. It also harnesses the massive processing power of the chipset at the heart of Wisenet X cameras to enable A.I. Tech’s edge-based video analytics to run onboard the Wisenet XND-6010/ RET dome camera.

The Wisenet AI-Retail-DASH solution is available with a number of modules

●● A I-PEOPLE can count the number of people who enter a particular area of a store, enabling retailers to judge the effectiveness of in-store promotions, product placement etc. It does so by detecting the presence of people who cross virtual lines. This module can be configured by store managers in order to meet the specific people counting requirements of individual stores. The direction in which people are walking can be specified and there is no limit to the number of virtual lines which can be set up. With an accuracy of more than 95%, AI-People is not confused by several people crossing a virtual line at the same time or the presence of shopping carts and strollers. ●● AI-CROWD provides retailers with an estimation of the number of people present in crowded areas where they move slowly or stop such as at the point of sale. ●● AI-Overcrowd utilises A.I. Tech’s video analytics to alert a store manager if the number of people within a particular area of a store is too high. The number threshold can be changed as often as required. ●● AI-DASH offers ‘easy on the eye’ reports on the data analysed by the AI-People, AI-Crowd and AI-Overcrowd modules and stored via an SD card onboard the Wisenet XND-6010/ RET dome camera. It does so via an intuitive

92

dashboard which can be remotely accessed from a web browser. When multiple cameras are deployed, there is the option to run the dashboard on a server.

Public view monitor camera with age and gender analysis

T

he Wisenet TNB-6030/ BIO Public View Monitor camera is intended to be located at store entrances, shopping aisles and check-outs to detect any criminal activity. However, in addition to helping deter and detect shoplifters, the camera is equipped with AI-Bio-DASH which produces an analysis of the age and gender of store visitors. Using facial detection technology, the AI-Bio-DASH module is ready to be used out-of-box with the Wisenet TNB-6030/ BIO and can be linked to digital signage targeted at the person whose image has been captured by the camera, e.g., a young boy or an adult woman.

TS-1635AX 16-bay NAS With Powerful Processor, Dual 10GbE Ports, M.2 SSD Slots, PCIe Slots and Linux VM Support

Q

NAP has recently launched the TS-1635AX NAS – the successor of the landmark TS-1635 NAS. With 16 drive bays (twelve 3.5-inch and four 2.5-inch) and dual 10GbE SFP+ ports, the TS-1635AX is further boosted with a highperformance Marvell® ARMADA® 8040 ARMv8 CortexA72 64-bit quad-core 1.6 GHz processor and two M.2 SATA SSD slots (2280 form factor) and supports Linux virtualization, SSD caching, and Qtier 2.0. The TS-1635AX sets a new standard for ARM-based NAS and marks a new milestone for high-capacity and affordable desktop NAS models. The TS-1635AX supports QNAP’s proprietary Qtier 2.0 for automatic tiered storage and provides a cache-like mechanism in volumes and LUNs to boost the performance of applications where high-efficiency data access is necessary (such as virtualization). The TS-1635AX also supports containerized virtualization (LXC and Docker®) and Linux command-line interface (CLI) virtual machines for deploying virtualization applications to fully realize the potential of

SecurityLink India ■ July 2018


product showcase

the Marvell ARMADA 8040 processor. The TS-1635AX features two built-in 10GbE SFP+ ports and two Gigabit (1000BASE-T) ports for high-speed transmission and flexible network deployment. The core functionality of the TS-1635AX can also be expanded by installing two PCI Express (PCIe) 3.0 cards (compatible PCIe cards include the QWA-AC2600 wireless adapter, QM2 M.2 SSD/10GbE adapters, and USB 3.1 Gen2 (10Gbps) adapters). “Combining all the advantages of its predecessor with today’s cutting-edge functionality, the TS-1635AX sets a new benchmark for next-generation storage devices,” said Jason Hsu, Product Manager of QNAP, “Supporting snapshots, Qtier 2.0, and virtualization while ensuring data security, performance and expansion potential, the TS-1635AX meets various business needs, and is perfect for small businesses and organizations.”

VAX Access Control Version 2.9.60 Hardware and Software Enhancements Provide Flexibility, Cost Savings and more Effective Monitoring

V

icon Industries, Inc., has recently released VAX Access Control, version 2.9.60. This latest VAX version includes powerful feature enhancements to software as well as new hardware options that offer cost savings and programming flexibility. VAX now offers a Master Multi-Door Controller for 2 to

8 doors. Compact and powerful, the new panel is designed for mounting in equipment rooms and for seamless conversion to VAX in retrofit projects, where it will significantly reduce labor and hardware costs. The Multi-Door Controllers offer all the same functionality as VAX over-the-door controllers, including the new ability to program and store customized actions at the door level. These can be executed from inputs, triple swipes or user credential presentations and require no connection to the server. In addition, all new VAX controllers now support live firmware updates that can be automatically pushed to them from the VAX server, ensuring that entire networks stay current with minimal to no down time.

VAX’s updated software interface offers a new monitoring layout that clearly displays easy-to-view tiles for each of the last 12-16 reader events including users’ names and photos. System operators can customize the layout of the tile display depending on their monitoring preferences. In addition, administrators can receive an immediate, pop-up notification for specified events. These notifications may include custom text, images and even display corresponding video from a surveillance camera. VAX 2.9.60 also provides enhanced monitoring capabilities for unmanaged doors. Doors without access readers can now be monitored for door strikes and operators can easily call up associated cameras. This provides security teams with important visibility into the access of unsecured areas within facilities. Mobile credentialing offers a new level of convenience for VAX customers who prefer to use their smartphones instead of cards or fobs. Upon installing a special smartphone app, users can scan their own, unique VAX credentials into their phones, allowing them to communicate via Bluetooth with specialized door readers. When users come within a few

SecurityLink India ■ July 2018

93


product showcase

feet of a reader, the door will unlock, without any need to remove their phones from pockets or purses. Other new features include enhanced controls for time zones and holiday schedules, more complex logic-based programming at the door level, and the ability to support installations where site codes are not available or are inconsistent. Bret McGowan, Vicon’s V.P. of Sales and Marketing explains, “In the past two years, VAX has proven to be popular with our customers both as a standalone solution and for its built-in integration with Vicon’s Valerus VMS. With the launch of our new Master Door Controller, as well as many new software features, we expect to see continued strong market growth, particularly from retrofit projects.”

Texecom Connect SmartCom Ethernet & Wi-Fi Communicator

T

he Texecom Connect SmartCom is an Ethernet and WiFi communicator that facilitates the Texecom Connect experience by connecting any premier elite control panel (V4 or above) to a local area network. Texecom Connect integrates with Texecom’s flagship security systems, the Premier Elite Series, to allow the user to take direct control of his home and security. He can control the operation of security system, receive notifications of system events and monitor cameras or activity from anywhere in the world. Features of Texecom Connect SmartCom ●● Supports both over Ethernet & Wi-Fi. ●● Texecom Connect Mobile App works on iOS (iOS 8.0 or later) & Android (V5.1 or higher). ●● Communicates exclusively using outbound connections. ●● No need to open any router ports or public static IP for mobile app control. ●● Cloud base service enables easy and secured access to mobile app. ●● Texecom Connect will only function on networks with DHCP enabled. ●● Simplicity of installation and maximum security. ●● Work with any reliable internet connection. ●● Wintex V6.2.5 or higher needed for establishing connec94

tion to panel via SmartCom. ●● Push notification & email notification supported. Other Features: The Timeline: Both past and programmed events are clearly presented, giving the user instant access to review events that have transpired. Calendar: See all the events of the day, arranged by system status, go back and review previous days, view stored video linked from the calendar or watch a live video stream Rooms & devices: Devices are allocated to rooms within the Texecom Connect App, which makes locating devices and creating home automation recipes from multiple devices in a room easy and intuitive. Recipes: Recipes are a user-friendly way of describing the programming actions that are used for automation. The Texecom Connect App is programmed on the basis of cause and effect. Cameras: Texecom Connect is compatible with IP cameras that support JPEG video formats. The users can view live footage from the Texecom Connect App, anywhere in the world, and locally record video to their smartphones. By creating recipes with push notifications they can also choose to monitor events at their homes remotely.

REDSCAN RLS-3060 and REDSCAN Manager ver.8.0 now available

O

ptex version 8.0 of long-range award-winning LiDAR – the REDSCAN RLS-3060 series and its configuration software REDSCAN Manager are both now available. The laser sensor with the new firmware version, together with the new configuration software provide a number of

SecurityLink India ■ July 2018


product showcase

new features for both the standard model, RLS-3060L and the high-end model, RLS-3060SH. Both models offer more flexibility in managing dry contacts with the option to switch from normally open (N.O.) to normally closed (N.C.). The RLS-3060L model ver. 8.0 features more detection zones and detection modes as well as greater flexibility with settings. The standard 2D LiDAR provides 30m radius detection range with 4 detection zones when used in analogue configuration and 8 zones in IP configuration. Loitering and selectable pattern modes are now available. Alarm duration and detection time settings are also more adjustable. The RLS-3060-SH provides additional detection modes to the L model such as indoor ceiling protection and vehicle detection mode, and has one major new feature – an extended detection area between 30 and 50m. When used in horizontal detection it creates a pre-warning zone from 30 to 50m radius that is able to detect larger objects such as vehicles. In vertical mode when mounted at 3m off the ground, it can detect a standing or squatting person over 100m making it ideal to pick up intruders, along a wall or a fence.

IPAnything Module

G

JD, an award winning manufacturer and designer of smart electronic perimeter detection and high performance LED illumination equipment, has launched its IPAny-

thing module (IPA), which is a simple yet powerful input/ output controller, and is designed to convert any type of analogue sensor to an IP system, or vice versa. The IPAnything is built in a compact, heavy duty waterproof housing. It is fitted with a 12V/ 24V DC socket to power the sensor, four alarm inputs, three relay outputs and an analogue input. This ensures that the IPAnything can truly handle all types of equipment. The IPAnything allows the installer to create individual network alarms to connect video management systems (VMS), IP cameras or other network devices. It also enables the installer to monitor and control alarm sensors, sirens, gates and lights. In addition, its web based user interface is an intuitive way for installers to configure network alarms for integration with VMS software, or direct control of cameras. The IPAnything provides flexibility as it is easy for installers to add IP devices onto an analogue based security or home automation system. This has many advantages including a cost effective way to future proof the site as new actions can be created and adjusted over the network. It is also simple to add additional IP products onto the network. Greg Stuttle, Business Development Manager at GJD commented, “The IPAnything is an extremely useful device. It has proved itself to be a very versatile product as it is a problem solver for projects that require analogue equipment to be converted on to an IP system.” Another huge benefit of the IPA is that it is powered by PoE, which is more cost effective and environmentally friendly than connecting to mains power. PoE provides advantages such as reduced overhead costs from the reduction of power outlets required per installed device. Another key benefit is reduced cabling on site, this makes the installation look neater.

SecurityLink India ■ July 2018

95


product showcase

Wireless High-Security Access Control With Hirsch Velocity and ASSA ABLOY Aperio Wireless Lock Integration Hirsch Velocity Software Security Management System Now Integrates with Aperio Wireless Lock Technology, Increasing Security Quickly, Easily, and Affordably

I

dentiv has recently announced the integration of the company’s award-winning Hirsch Velocity Software security management system with ASSA ABLOY’s Aperio® wireless lock technology. Aperio is a global platform that uses local, wireless communications between a lock and hub to connect to an access control system, eliminating the greatest cost and inconvenience of traditional access control, wiring at the door, and adding security to doors quickly, easily and affordably. By integrating with the latest Hirsch Velocity Software, Aperio capabilities are expanded to include the bestof-breed features and benefits of the Velocity system. Small businesses no longer need to trade off price versus feature set, and enterprises no longer need to worry about the ability of initial deployments to scale seamlessly across a global enterprise. Hirsch Velocity 3.7 delivers unsurpassed security, interoperability, backwards compatibility, and the ability to expand to accommodate evolving security, business and facility needs. Hirsch Velocity manages access control and security operations in hundreds of different facilities, from single high security rooms to multibuilding, multi-location campuses. Facility personnel can control doors, gates, turnstiles, elevators and other building equipment; monitor users as they move around a facility; prevent unwanted access; maintain compliance; and provide a robust audit trail. “Wireless doors are meant to fix a number of design and environmental issues that challenge physical access 96

systems,” said Martin Huddart, President, Access and Egress Hardware Group, ASSA ABLOY Americas, “By integrating with Hirsch Velocity, ASSA ABLOY’s Aperio wireless lock system benefits from the entire suite of leading-edge Velocity features including the flexibility to grow campus size, monitor door statuses in real-time, and manage traffic based on threat levels.” The Aperio wireless lock system is tightly integrated with Velocity, giving users unmatched capabilities not achievable until now. With access to a full featureset typically only available with wired lock systems, the integration allows for the most secure and advanced configuration options. By combining the power and cost-effectiveness of Hirsch Mx-1 Controllers, Velocity’s configuration and management options, and the flexibility of the Aperio wireless lock system, Identiv is able to provide users and integrators with even greater capabilities and design options at industry-leading price points. “Whether maximum flexibility and scalability is a requirement, or you simply need to secure a few doors, our Hirsch Velocity Software integration with Aperio wireless lock technology is the perfect solution,” said Sam Tuthill, Identiv Senior Product Manager, “Customers can be confident that they have the world’s most secure facilities with our new, responsive, and featurerich platform. The solution is supported out-of-the-box and extends the reach of Velocity security management systems to schools, stadiums, cities, and offices without compromising secure monitoring or control.” Aperio wireless lock technology offers the same real-time communication as traditional access control without the necessity of wiring the door. Aperio technology reduces the cost and inconvenience of wired systems without the hassle of complex site surveys. It utilizes local, encrypted, wireless communication between the lock and a communications hub to connect to an online electronic access control system. This offers facilities an easy, affordable way to expand the reach of existing systems, secure additional openings, or add physical access control to historical buildings and facilities with building materials not suitable for standard wiring.

SecurityLink India ■ July 2018


product showcase

Searchlight Business Intelligence Software Introducing New Dashboards and Reporting Capabilities arch Networks®, a global provider of intelligent video solutions, introduces the next evolution of its powerful Searchlight software. Used by leading banks and retail organizations worldwide to extract valuable information on customer service, merchandising, operations, compliance and more, March Networks Searchlight™ helps businesses improve performance and profitability. Integrating clear surveillance video, business data and highly-accurate analytics, the software also enables organizations to proactively detect fraud and theft, and reduce investigation times by as much as 90%. With the launch of Searchlight 4.6, customers benefit from new dashboards and reporting capabilities that make it even easier to analyze, compare and share critical information. Key among these new capabilities are: ●● New summary dashboard views and drill-down filtering: Available in Searchlight’s Business Analytics reporting tool, the new dashboards enable users to compare aggregated data and trends from multiple locations more effectively, based on their own key performance indicators (KPIs). Users can filter data by analytic, site or customized grouping across their organization, and quickly drill-down to a granular level when needed. A retail operations manager, for example, could view people counts from all locations, then drill down to get exact numbers for each of the four entrances at a single site. A district manager could do the same to view the information from his district only. Users can also save their own custom reports and dashboard views for convenience. ●● Automatic email notifications with images: This new feature in searchlight’s operations audit enables organizations to share snapshots in low or high definition by e-mail with select users on a set schedule. The reports can include images from all cameras at each

M

site, or from select cameras only such as all front entrance images. A large March Networks retail customer that is already using this feature to provide district managers with a daily overview of their showroom floors reported a 30% improvement in merchandising compliance within four months. ●● Multiple image export to e-mail: Another operations audit addition, this practical feature makes sharing video images quick and easy. Users simply right-click and select the images they want to export, and the software will automatically add them to the user’s email application as attachments.

Analyze, compare and share critical information on customer service, operations and more – faster and more conveniently

Other new Searchlight features include the ability to automatically export business analytics data from all sites, cameras and zones on a set schedule, ensuring that key reports are always ready and easily accessible. As well, new embedded hyperlinks in the software’s business rules summary email notifications allow users – in particular loss/ fraud prevention investigators – to move quickly into the software to view video evidence and the exact exceptions results. “When customers start using Searchlight, two things usually happen fairly quickly. First, they are thrilled with the business insights the software provides, and second, they start brainstorming about new ways to apply that information and who in the organization could also benefit,” said Douglas Wong, Vertical Software Application Product Manager, March Networks, “Several of the new capabilities we’ve introduced have been inspired by our customers and we look forward to demonstrating them to partners and prospects.”

SecurityLink India ■ July 2018

97




National Roundup

Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)

“Security Link India” payable at New Delhi dated__________

* Please subscribe through admin@securitylinkindia.com

WE ARE UPDATING OUR DATABASE For free listing in Database:

For

Advertisement Contact: editor@securitylinkindia.com

* Send your detail to admin@securitylinkindia.com

Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 100

SecurityLink India ■ July 2018




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.