2
SecurityLink India â– 1 April 2017
Wi-Fi Camera Standalone Vehicle Camera
Mobile DVR Anywher Anytime Surveillance
SecurityLink India â– 1 April 2017
1
From the Editor’s Desk
(102 pages including 6 for cover) Volume II • Issue 8 • March 2018 Editor-in-Chief Santosh Pathak Principal Consultant Pritam Singh Mehta
Dear Readers, Heartiest Greetings from SecurityLink India! The second edition of the Fire & Security India Expo (FSIE) held during 22-24 February 2018 in Bengaluru was rather encouraging. With more than 100 participants and ample quality footfalls, the fair witnessed over 150 brands displaying and demonstrating live their technological advancements, and products and solutions catering to the wide demand of the industry. The show was well received and exhibitors hailed it on a positive note. The FSIE is an initiative of FSAI taken under the leadership of the current President Pankaj Dharkar, and is organised jointly by the Fire & Security Association of India (FSAI) and NürnbergMesse India (NM).
SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Vibha Dixit
The rising incidents of protectors allegedly turning perpetrators are of grave apprehension today. The recent assault of a woman by a security guard in her apartment in Chennai is an addition to the number. The profession and entire business of guarding were based on trust and human factors that kept people confident in the presence of a guard. These occurrences that precisely amount to breach of trust will devalue them and bring undesirable bearings to the industry. The cause calls for an urgent attention by all stakeholders – the Government, the industry and the enforcement agencies. The PSAR Act 2005 provisions to hold the employer accountable for an offence committed by its employee, which is neither reasonable nor practical for the industry to uphold. However, the industry needs to take responsible steps to preserve the value of the business. This is the time of integrated security deployment, and a concerted enforcement thereof is necessary to produce a sustained result. Proper verification, adequate training, value education and designed deployment of personnel at each hierarchy are a must to keep the business going in a respectable way.
Circulation Sanju Singh
On the same lines, Home Minister Rajnath Singh emphasized that detection is the most effective deterrent against crime, and forensics is a key factor in criminal investigation. He asked the police to acquaint themselves to the latest technologies. The Government is adding more forensic laboratories, and with the CCTNS to be fully operational soon their capabilities would be enhanced. The Government has also decided to establish a cybercrime reporting portal to report cybercrimes against women, and a cybercrime laboratory to stop crimes against women and children.
The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher.
Till next month, stay safe and happy reading! With warm regards,
Santosh Pathak Mob: +91 9968172237
Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014.
(The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
FORM IV Statement about ownership and other particulars about SecurityLink India
1. 2. 3.
4.
10
Place of Publication: New Delhi Periodicity of its Publication: Monthly Printer’s Name: Santosh Pathak Nationality: Indian Address: H-187/5, First Floor, Jeevan Nagar Market, Kilokari, Near Maharani Bagh, New Delhi-110014 Publisher’s Name: Santosh Pathak Nationality: Indian Address: H-187/5, First Floor, Jeevan Nagar Market, Kilokari, Near Maharani Bagh, New Delhi-110014
5.
6.
Editor’s Name: Santosh Pathak Nationality: Indian Address: H-187/5, First Floor, Jeevan Nagar Market, Kilokari, Near Maharani Bagh, New Delhi-110014 Names and addresses of individuals who own the newspaper and partners or shareholders holding more than one per cent of the total capital. Santosh Pathak: N-8, First Floor, Satyavati Colony, Ashok Vihar, Phase-III, Delhi-110052 I, Santosh Pathak hereby declare that the particulars given above are true to the best of my knowledge and belief. Signature of Publisher Date: 01 March, 2018
March 2018
CONTENTS White paper Security Considerations for Code Signing
38
FEATURE ARTICLES 28 Reducing False Alarms with Deep Learning
47 Global Study: Data Breach is Inevitable
32 Be Cautious: You are Sharing Password
64 The Value of Surge Protection
34 Smart IoT Industrial Park 36 Predictions in ID Technology
78 INTERPOL Digital Security Challenge 79 Changing Mass-Notification System Market 81 End-to-End Security, Day after Day
43 Sensors in the Security & Surveillance Market 44 Traditional Switch Port Security
82 School Security Systems Industry in US
NATIONAL ROUNDUP 16 Corruption Perceptions Index 2017
22 Zicom Vehicle Passenger Safety Solution
18 Honeywell Vector Occupant App 19 Matrix COSEC APTA Portal
23 Infinova VT210-A2-B0 Series Camera
24 Vision Summit 2018
20
• DDS Protocol Analysis Software • Hikvision Showcases at Secutech India 2018
21 Synology Strengthens NAS Portfolio in India 12
25 Smiths Detection to Boost Aviation Security in India 26 Matrix NVR for IP Cameras 27 Videonetics Forays into Bangladesh
SecurityLink India ■ March 2018
Contact us at MEA Office:
Office#13, 5th floor, Deema Tower, Mirqab, Kuwait Telefax: +965 2247 5678 | Mobile: +965 9000 1133 Email: Sales-ME@infinova.com
India Office:
Office No. A1, A2, 2nd Floor, Sr. No. 14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Rd, Kharadi, Pune – 411014. Telefax: +91-20-6900-0630 Email: Teamindia@infinova.com
march 2018
CONTENTS Application/ case studies 48
Hikvision Assists SGMW Motors, Indonesia
49
Smiths Detection Protects Moscow Airport
50
Milestone Prevents Crime at Argentina’s VL District
57
West Yorkshire Police Goes Live with Motorola Solutions
51
Odyssey Complex Upgrades Axis IP Security Camera
58
Surveon Raises the Bar on Security for Campus
52
Vanderbilt Protects Physical Security against Cyberthreats
59
Wisenet Keeps Passengers & Vehicle Safe
53
Dallmeier Protects Drivers and Goods
54
3xLogic: Ted’s Pawn Protects Customer Assets
60
• Motorola Technology for Rail Project in Malaysia
• ST Brings D/N High-Resolution Vision to Cars
61
Elbit Deploys Border Security System
62
Axis for UK Public Transport Security
• Vicon’s Offerings for Retail & Hospitality Use
63
Milestone Secures University in Uruguay
55
56
Product showcase
International updates 14
• Uniview Protects Solar Power Station, Belarus • Chubb Secures Cheshire Service’s Estate
• SH Secures College of Medicine
84-97
68-77
SecurityLink India ■ March 2018
National Roundup
Corruption Perceptions Index 2017 Shows High Corruption Burden in More Than Two-Thirds of Countries India Stands on Place 40 Analysis of results from Transparency International finds crackdowns on NGOs and media are associated with higher levels of corruption
A
n index recently released by Transparency International, th which marks its 25 anniversary this year, reveals some disturbing information. Despite attempts to combat corruption around the world, the majority of countries are moving too slowly in their efforts. While stemming the tide against corruption takes time, in the last six years many countries have still made little to no progress. Even more alarming, further analysis of the index results indicates that countries with the lowest protections for press and nongovernmental organisations (NGOs) also tend to have the worst rates of corruption. The index, which ranks 180 countries and territories by their perceived levels of public sector corruption according to experts and business people, uses a scale of zero to 100, where zero is highly corrupt and 100 is very clean. This year, the index found that more than two-thirds of countries score below 50, with an average score of 43. Over the last six years, several countries significantly improved their CPI score, including Côte d’Ivoire, Senegal and the United Kingdom, while several countries declined including Syria, Yemen and Australia. 16
This year, New Zealand and Denmark rank highest with scores of 89 and 88 respectively. Syria, South Sudan and Somalia rank lowest with scores of 14, 12 and 9 respectively. The best performing region is Western Europe with an average score of 66. The worst performing regions are Sub-Saharan Africa (average score 32) and Eastern Europe and Central Asia (average score 34).
Every week a journalist is killed in a highly corrupt country
A
nalysis of the index results by Transparency International further examined the relationship between corruption levels, the protection of journalistic freedoms and engagement of civil society. It found that almost all journalists killed since 2012 were killed in corrupt countries. “No activist or reporter should have to fear for their lives when speaking out against corruption,” said Patricia Moreira, Managing Director of Transparency International, “Given current crackdowns on both civil society and the media worldwide, we need to do more to protect those who speak up.” The analysis, which incorporates data from the Committee to Protect SecurityLink India ■ March 2018
Journalists, shows that in the last six years, more than 9 out of 10 journalists were killed in countries that score 45 or less on the Corruption Perceptions Index. This means that, on average, every week at least one journalist is killed in a country that is highly corrupt. In addition, one in five journalists that died were covering a story about corruption. Sadly, justice was never served in the majority of these cases. The efforts of Transparency International and its first-hand experience working with more than 100 chapters worldwide confirm close linkages between corruption and freedom of the press. For example, in Brazil, which scored 37 on this year’s index, 20 journalists died in the last six years. Targeted for their investigations into local government corruption and drug-related crime, among other issues, reporters in Brazil risk their lives everyday by simply doing their jobs.
Corruption linked to shrinking space for civil society
T
ransparency International also looked at the relationship between corruption levels and the freedom with which civic organisations are able to operate and influence public policy.
National Roundup
The analysis, which incorporates data from the World Justice Project, shows that most countries that score low for civil liberties also tend to score high for corruption. “Smear campaigns, harassment, lawsuits and bureaucratic red tape are all tools used by certain governments in an effort to quiet those who drive anti-corruption efforts,” said Moreira, “We’re calling on those governments that hide behind restrictive laws to roll them back immediately and allow for greater civic participation.” Hungary, which saw a ten-point decrease in the index over the last six years, moving from 55 in 2012 to 45 in 2017, is one of the most alarming examples of shrinking civil society space in Eastern Europe. If enacted, recent draft legislation in Hungary threatens
to restrict NGOs and revoke their charitable status. This would have disastrous implications for many civil society groups already experiencing the constraining effects of a previous law that stigmatises NGOs based on their funding structures. “CPI results correlate not only with the attacks on press freedom and the reduction of space for civil society organizations,” said Delia Ferreira Rubio, Chair of Transparency International, “High levels of corruption also correlate with weak rule of law, lack of access to information, governmental control over social media and reduced citizens’ participation. In fact, what is at stake is the very essence of democracy and freedom.” India appears at the 40th position of CPI. SecurityLink India ■ March 2018
About the corruptions perceptions index
S
ince its inception in 1995, the Corruption Perceptions Index, Transparency International’s flagship publication, is the leading global indicator of public sector corruption. The index offers an annual snapshot of the relative degree of corruption by ranking countries from all over the globe. Their latest analysis, which looks at the relationship between corruption and freedom of the press, association and expression, uses statistics collected by the Committee to Protect Journalists, Reporters without Borders, the Varieties of Democracy Project and the World Justice Project. 17
National Roundup
Indoor Navigation to Connected Building Occupant App As demonstrated in the Minneapolis Skyway System, new Honeywell Vector Occupant App lets users easily navigate a building and rate spaces to promote improved comfort using Internet of Things (IoT) connectivity
H
oneywell has recently added new capabilities to the Honeywell Vector Occupant App that give occupants more control over their experiences within a building with the swipe of a screen. The most significant new feature is indoor navigation, which uses GPSlike technology to help users find their way around complex buildings that are difficult to navigate without directions. The benefits of the indoor navigation feature have been demonstrated in the Minneapolis Skyway System, a complex interlinked network of enclosed pedestrian walkways spanning 80 city blocks. The walkways protect Minnesotans from the harsh winter elements and summer humidity, allowing them to comfortably walk between more than 30 buildings
in downtown Minneapolis. “For anyone who’s not a local, and for even some who are, finding your way around the skyway system can be a big challenge,” said Steve Cramer, President and CEO, Minneapolis Downtown Council, “With our initial use of the Honeywell Vector Occupant App, we’ve seen an immediate impact. The interactive map makes it really easy and intuitive to know exactly where you’re going, and how to get there.” In addition to the indoor navigation feature, the app also now includes a location-based feature to rate spaces, allowing those within a building to highlight comfort issues to building staff for quick resolution. Both features combine the convenience of today’s mobile devic-
es with Internet of Things (IoT) building connectivity to help improve a user’s experience inside a building. “Much of a building’s success hinges on how happy and satisfied its occupants are. They’re the lifeblood of an organization, and their experience within a building is what keeps them coming back,” said Aseem Joshi, Country General Manager, Honeywell Building Solutions, India, “The Honeywell Vector Occupant App has given users more power to shape their building experiences from their smartphones. Now, we’re adding even more features to deepen the connections between occupants and the spaces around them so they can be as comfortable as possible, and can more easily and efficiently move about a building.”
Indoor navigation
E
nabled by strategic partner Insiteo’s indoor location solution for smart buildings, the indoor navigation feature offers accurate indoor location, mapping, routing, presence, proximity notifications and analytics – all embedded into an integrated platform. Backed by location technology installed within a facility and software, the app’s indoor navigation provides easy-to-use way finding, with turn-by-turn voice assistance and location accuracy up to five feet. The app promotes better 18
SecurityLink India ■ March 2018
National Roundup
collaboration and improved safety via its ‘share my location’ feature, which gives users a way to more easily find each other in a building. For building owners and managers, in addition to promoting occupant satisfaction, the app also provides insights into foot traffic patterns, which building personnel can use to better inform measures like messaging placement to better serve their occupants.
pability, which lets users raise comfort issues with building personnel for resolution. Building owners and managers can view ratings and feedback on dashboards to pinpoint where building spaces need attention and improvements. They can also visualize longer-term trends and space rankings to uncover patterns and improvement opportunities to promote occupant comfort, satisfaction and productivity.
Location based space rating
Vector occupant App capabilities
T
he rating feature builds on the app’s original one-click hot/ cold call ca-
T
he new capabilities build on the Honeywell Vector Occu-
pant App’s base functionality, which includes digital identification, mobile access control and the ability to communicate temperature discomfort to prompt adjustments by facility teams. The Honeywell Vector Occupant App is part of Honeywell’s connected services portfolio, which leverages the connectivity of buildings to improve how they operate and the experiences they offer for those who visit and work within them. The Honeywell Vector Occupant App works with Apple and Android products.
COSEC APTA M
obile devices have become an important and key player for enterprises, since there are various applications developed that make lives of employees and supervisors far easier. Mobile based applications have found use as a management tool for employees’ time-attendance, and leave and access control options. Matrix too, has taken advantage of and adapted this technology in their enterprise grade solutions. Matrix COSEC APTA is a comprehensive mobile based employee portal that allows COSEC users to monitor and manage their time-attendance and leaves. Employees and managers can access their time-attendance information easily and perform related tasks remotely, which reduces a significant amount of time they usually spend on these issues. The portal can also be utilized in controlling unauthorized access into restricted and risk prone areas within the organizational premises.
The key features of COSEC APTA are as mentioned below: ●● Automatic attendance marking using Wi-Fi/ GPS. ●● Location tracking through GPS. ●● Bluetooth and QR code based access control. ●● Attendance on move for field employees. ●● View daily and monthly attendance, leave and shift details. ●● Employees can add/ edit personal details directly on the portal. ●● Email and SMS notifications. ●● Visitor pre-registration. ●● Cafeteria management. ●● Convenient virtual ID card.
SecurityLink India ■ March 2018
19
National Roundup
DDS Protocol Analysis Software Announces its latest Protocol Analyzer for Digital Data Service (DDS)
I
n late 1970s to late 1980s, ATT offered a pure private line digital data service called Dataphone Digital Service, or DDS. Supported rates of 2.4, 4.8, 9.6, and 19.2 were standard with higher rates such as 56kbps; and nx56kbps also possible but rarely. These circuits although legacy, are still quite common today – because they really work. Specialized channel cards called OCU-DP (Office Channel Unit Data Port) are connected to standard CSU/ DSUs with datacomm interfaces. Both synchronous and asynchronous data is formatted and fit cleanly into a 64kbps time-slot (by repeating the data bits or bytes). The bit repetition had the added advantage of providing error correction and thus better performance. The channel data is then inserted into time-slots of a standard T1. In this manner many data circuits can be packed into a private line T1.” “GL supports non-intrusive monitoring and analysis of DDS frames using T1 Analyzer hardware. The captured data can be decoded and analysed by GL’s DDS Protocol Analyzer,” Vijay Kulkarni, the CEO of the company said, “Non-intrusive TAPs are used to passively duplicate the signal between two end points on a network link without disturbing the actual network activity. GL’s T1 Analyzer hardware can be used with RJ48 Y Bridge – splits one RJ48 into two complete and non-intrusively tap and capture the DDS frames on a T1 line.” He added, “The DDS data is formatted into frames separated by one or more bytes. The data channel may utilize multiple, all or a fractional timeslot of the T1 line. Also, there may be multiple data channels within the T1 line. The captured data is analyzed using GL’s DDS Protocol Analyzer.”
Showcasing AI & Deep Learning Technologies at Secutech India 2018
H
ikvision is exhibiting their latest innovations in surveillance at Secutech India 2018, to be organised at Bombay Exhibition Centre, Mumbai, during 5-7 April, 2018. They will showcase their latest products and solutions based on AI & Deep Learning technologies. “Secutech India is one of the leading exhibitions related to the security industry in India. We have been associated with it since its inception. We will showcase Hikvision’s latest products and innovative technologies, including deep learning, artificial intelligence (AI), AI Cloud, Big Data and IoT. Hikvision has an impressive line-up of new launches for the show,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. This year Hikvision team has planned to set up an impressive display of their latest product offerings. Hikvision will present a whole new range of vertical specific solutions, including smart city solution, intelligent traffic solution, mobile solution, education solution, retail solution, PPOG solution and banking solution. The Hikvision booth will prominently display the live demos of some of the latest technologies like cloud computing, big data, deep learning and artificial intelligence (AI). Hikvision partners will also showcase the innovative solutions for various advanced applications at the booth. 20
SecurityLink India ■ March 2018
National Roundup
Strengthening NAS Portfolio in India Rolls out its cutting-edge series of NAS solutions in the country that will help in the transformation of data management
S
ynology® the global leading provider of network attached storage (NAS), IP surveillance and network equipment solutions, forays into India market with the rollout of its cutting-edge series of NAS solutions in the country. With a proven history of transforming the way users manage data, perform surveillance, and manage the network in the cloud age, Synology has set new benchmarks in the enterprise IT space, leveraging latest technologies and unprecedented innovation coupled with an exceptional customer service. The company has announced strategic partnerships with both online as well as offline channels to make its solutions available in the country. Synology’s offline distributors in India include Supertron, EBM, while Amazon will serve as the company’s online retailer. Four complete product lines of industry-leading NAS that are designed to meet different requirements and needs from personal users, small offices, SMBs, and enterprises (including XS/XS+ series; Plus series; Value series and J series) provided by the company are now available in India. The company will also be unveiling the latest DiskStation Manager 6.2 (DSM6.2) OS update along with new applications and services in the country soon. The company has registered a historic 30 percent CAGR growth in India since the year 2015 with SMBs contributing to a major chunk of this growth.
India is aggressively marking its presence as a growth engine in the global economy, owing to an unparalleled growth in the SMB segment as well as ambitious government initiatives like Smart City Programme. We at Synology are committed to aiding this growth in the country with our industry-leading NAS solutions which help organizations gain more agility and streamline their work processes – Mike Chen Marketing Director, Synology
Synology will also ink new partnerships in the country in the year 2018 along with organizing reseller events and trade shows as well as studying consumer behavior to ensure last mile market presence in the ongoing year. Synology creates network attached storage, IP surveillance solutions, and network equipment that transform the way users manage data, conduct surveilSecurityLink India ■ March 2018
lance, and manage network in the cloud era. By taking full advantage of the latest technologies, Synology aims to help users centralize data storage and backup, share files on-the-go, implement professional surveillance solutions, and manage network in reliable and affordable ways. Synology is committed to delivering products with forward-thinking features and the best in class customer services. 21
National Roundup
Street Smart Vehicle Passenger Safety Solution Apart from basic features of tracking, this safety solution prevents any danger to one’s personal vehicles as well as themselves, while travelling
Z
icom Electronic Security Systems, pioneers in the electronic security services industry, has for the first time, ventured into the automobile segment and launched a first-ofits-kind vehicle passenger safety solution – Street Smart. Since 1995, the company has been a household name in the field of safety and security. Zicom has strived to provide and ensure all-round security and therefore peace of mind to all
its customers. The company in 201314, identified the power of IoT and leveraged it to benefit consumers with its offerings. Following this Zicom’s core focus has been towards creating IoT based safety solutions for everything that is a part of a person’s daily life. A recent report by the Consumer Association of India (Jan 2018), has highlighted that India being the 6th largest car market with 2.03 million
Since our inception, we have been committed towards our goal of making India a safer place to live in. As our journey towards this endeavor continues, we are identifying different areas that require our expertise. The automobile segment is a great opportunity for us to deliver a significant layer of safety to a consumer’s most valuable asset – personal vehicle. Our latest innovation, Street Smart grants the user an undeniable advantage in the security of their vehicle. Apart from the ability to track one’s vehicle, Street Smart follows the preventive approach towards accidents, thus granting a user a premium safety and security advantage – Pramoud Rao Promoter & MD, Zicom Electronic Security Systems Ltd. 22
SecurityLink India ■ March 2018
passenger cars sold in the country, has the highest road accidents in the world. Also, about 30 per cent of the deaths are caused due to lack of safety features in Indian cars. Having shared this, Zicom has identified the importance of an expert security and safety system for vehicles. Towards this, the company has leveraged the power of IoT and specially designed Street Smart to cater to the emerging needs of a discerning road traveler. Through the innovation of Street Smart Solutions, Zicom is ensuring that the owner of the vehicle is in control of his personal vehicle in case of a theft, speed or breakdown. Street Smart possesses unique features to ensure the safety of its user mentioned below: ●● Accident SOS alert: An alert sent to emergency contacts in case of an accident. ●● Roadside assistance: In case of a breakdown even in the most isolated areas, Street Smart can connect a user to the Zicom Command Centre which is available 24/7 and 365 days of the year. This center which is one of the best of its kind, is well-equipped to provide a user real-time assistance anytime, anywhere. ●● Rash driving alert: As Street Smart follows a preventive ap-
National Roundup
proach towards safety, it senses the speed over a pre-determined speed limit and sends a rash driving alert to the user to prevent any chance of an accident. ●● Air conditioner alert: Street Smart feature alerts the owner about the usage of the air conditioner in the vehicle – whether he is present in the vehicle or someone else is using it. ●● GPS tracking: Tracking the vehicle’s real-time location along with its speed on one’s mobile speed, irrespective whether you are in the vehicle or elsewhere. ●● Towing alert: Street Smart notifies the user when their car is being towed or in attempt of theft or break-in. This feature especially helps when the user has parked his or her vehicle away from their home due to parking space limitations. Additional features are car diagnostics, performance and trip log and fuel efficiency report. ZICOM aims to capture 30% of the 210 million vehicle passenger safety segment using the IoT platform to capture the market over the next five years. The company is undertaking a go-to-market strategy to touch-base with consumers. Street Smart will be the first available online (Amazon + Flipkart + Snapdeal) for B2C consumers, and the company is in talks with manufactures, OEMs, insurance and corporates to capture a larger market in the B2B category. With a history of offering high quality products and solutions to the most complex projects in the country, the name ZICOM has now become synonymous with electronic security in India.
VT210-A2-B0 Series SECONA Award Winning H.265 HD Megapixel Smart Starlight WDR IP Box Camera Serving security industry with technology and dedication
I
nfinova’s VT210-A2-B0 series H.265 HD megapixel smart starlight WDR IP box camera allows image output resolution up to 1920x1080@30fps. The camera provides excellent resolution and color reproduction, acquires richer and more accurate details, and guarantees intelligent analysis accuracy in a more effective way, which caters for different application needs. The camera boasts of rich intelligent functions, such as wire cross detection, regional invasion detection, field of view change detection, defocus detection, too dark detection and too light detection. VT210-A2-B0 series camera is designed for safe city, rail transit and municipal construction. Particularly, it is widely used in city public security, highway, metro, station, exhibition hall etc. ●● 1/2.8” progressive scan CMOS sensor. ●● IR-Cut removable (ICR) filter for day/ night switching. ●● Star-grade sensitivity: 0.0015 lux. ●● Supports frame integration WDR, with dynamic range up to 132dB (True WDR). ●● High-resolution image signal output: 1920x1080@30fps. ●● Auto back focus (ABF). ●● Smart functions for perimeter protection (wire cross and regional invasion detection) and feature protection (field of view change, de-focus, too dark, and too light detection). ●● Three simultaneous video streams: Dual H.265 & M-JPEG or dual H.264 & scalable M-JPEG. ●● Supports built-in storage/ NAS. ●● Support alarm recording and event recording (including broken network). ●● Supports alarm snapshot and event snapshot. ●● Bi-directional audio, G.711a and G.711u. ●● 2 alarm inputs, 1 on-off output. ●● Support multiple ways to trigger and handle alarms. ●● Up to four definable privacy mask areas. ●● Up to eight ROI (Region of Interest) areas. ●● Support simultaneous access and parameter setting via Web Server from multiple clients. ●● Compatible or able to integrate with digital video surveillance software, and other video surveillance software. ●● ONVIF Profile S & G compliant. ●● Standard SDK is provided for easy integration with other video surveillance software. ●● Wide voltage design. SecurityLink India ■ March 2018
23
National Roundup
Vision Summit 2018 IESA Semiconductor Fabless Startup report unveiled Revealing huge market growth of about USD32.35 billion by 2025 for the Indian semiconductor component market
I
ndia Electronics and Semiconductor Association (IESA), the premier trade body representing the Indian electronic system design and manufacturing space in collaboration with MarketsAndMarkets launched an industry report on Indian semiconductor fabless startup ecosystem at the this year’s Vision Summit. The report was launched by Ashwini K Aggarwal, Chairman, IESA; Anilkumar Muniswamy, Director, SLN Technologies Ltd., and Jitendra Chaddah, Chair, Fabless CIG and Senior Director, Strategic Relations and Operations, Intel India. It reveals that the Indian semiconductor component market is expected to be worth USD32.35 billion by 2025, growing at a CAGR of 10.1% between 2018 and 2025.
The inaugural session was presided over by Priyank M Kharge, Honorable Minister for IT, BT and S&T, GoK. H.E. Ms. Dana Kursh, Consul General of Israel to South India and Shailendra Tyagi, Director, STPI Bangalore, were also shared the stage. The Vision Summit is a global leadership conclave for the Electronics System Design & Manufacturing (ESDM) industry. This year the theme is ‘Resurgent India: Electronics, Entrepreneurship and Economy,’ which attracted a powerful line-up of industry experts, thought leaders, policy makers, government officials, business and technology experts, venture capitalists, entrepreneurs who shared their views and vision on the future of the ESDM industry as well as the trends, challenges and oppor-
Vision Summit 2018 inaugural lamp lighting
24
SecurityLink India ■ March 2018
tunities shaping the Indian industry. Ashwini K Aggarwal said, “We are witnessing the rise of a new India with a stable government clearing policy logjams, taking bold decisions and ambitious targets. With digital as the growth hack and aggressive engagement from the government’s ‘Make in India’ campaign, the ESDM industry will benefit and is projected to see investment proposals over $1.5 bln over next 2 years. We believe that now is the time to build the future of design led manufacturing. The fabless report clearly highlights the opportunities for the Indian fabless ecosystem. This year’s theme at IESA Vision Summit 2018 is dedicated towards building the industry success by highlighting opportunity areas and addresses the challenges being faced.” Highlights of the Indian Semiconductor Fabless Startup report: ●● The key trends identified in the report include smart industrial automation, defense and rural broadband. ●● It elaborates on the Indian semiconductor design ecosystem, and highlights the various opportunities for major global semiconductor players to consider India as their global R&D destination. ●● It revealed that India is a highly attractive destination for global R&D centers owing to the availability of talent, as well as lower cost (compared with the US and Western Europe).
National Roundup
to Boost Aviation Security in India Airports Authority of India awards multi-million contract Global tender valued over USD50 million to deploy security technology solutions at 11 sites
S
miths Detection, a leading player in threat detection and screening technologies for aviation, ports and borders, urban security and military markets, has recently been awarded a multi-million contract to boost aviation security in India. The Airports Authority of India (AAI) has placed an order for multiple CTX 9800 DSi™ systems at a combined value of over USD50 million. Through a global competitive tender process conducted by AAI, Smiths Detection won the bid to install and integrate high-speed explosives detection systems (EDS) for hold-baggage screening at 11 sites across nine airports in India including Chennai International Airport and Netaji Subhas Chandra Bose International Airport in Kolkata. “The Indian market is forecast to be the third-largest aviation market in the world by 2026, and so security is
a mission-critical factor in enabling India’s airports to be futureready. Smiths Detection is honoured to partner with AAI – supporting airports to stay ahead of the evolving threat landscape with a technological solution that is fully compliant with regulatory requirements,” said Jerome de Chassey, General Manager of Smiths Detection in India. AAI manages a total of 125 airports in India and is responsible for creating, upgrading, maintaining and managing civil aviation infrastructure both on the ground and in the air. The organisation is also responsible for building new terminals for the many new small airports under development by the Government of India. Working
SecurityLink India ■ March 2018
in partnership with Smiths Detection, AAI will implement ECAC Standard 3 screening of hold baggage at Level 1 for inline systems across the country. This complies with regulations set by the Bureau of Civil Aviation Security (BCAS), the regulatory authority for civil aviation security in India. Powered by leading-edge computed tomography (CT) technology, CTX 9800 can be configured to deliver throughput of up to 1,800 bags per hour and can be tailored to meet the specific needs of any legacy or new baggage-handling system. Approved by the European Civil Aviation Conference as meeting Standard 3 requirements, CTX 9800 is also certified by the U.S. Transportation Security Administration and the Civil Aviation Administration of China. Smiths Detection has installed over 4000 hold baggage solution units worldwide and are located in more than 70 percent of the world’s 100 largest airports. 25
National Roundup
NVR for IP Cameras A
network video recorder (NVR) is primarily used to record the video streams of cameras. In medium and large scale enterprises where a huge number of cameras are installed, it becomes a necessity to incorporate a network of NVRs. It provides a systematic log of various camera video recordings and the space required to store the same. However, with the advancement in technology, NVRs are now able to assist or perform many other functions which enhance the security and ease of operation. Some of these features are unique with respect to IP NVR system, while some are found in most of the NVRs produced these days. Matrix NVRs hold one of the unique features called Cascading that eliminates the need of a server to operate CMS (Centralized Management System) as it works on client-server architecture where each NVR is divided into two parts, client and server. The client of one NVR can communicate with the other one’s server and vice versa. Therefore, each network video
26
recorder can supervise and interface with several other NVRs, bypassing the need of a server to do the same, which makes this solution very cost-effective. For example, if multiple NVRs exist in a network, they can still be governed from one of them locally. A single device can act as the server (or a master device) and can control 19 other client (or slave) NVRs. Similarly, there can be multiple master devices as well, monitoring various sets of other (slave) NVRs. Finally, the master device can be directly connected to a screen and output from all slave NVRs can be monitored. One of the major concerns of an IP NVR manufacturer is the storage space to store the recordings. Required storage capacity is determined by the number of factors such as IP cameras in the network, resolution, type of recording and retention duration. If many cameras are connected, optimizing storage becomes indispensable. To resolve this problem, following three features in a NVR come in handy:
SecurityLink India â– March 2018
Motion based recording: There are instances when there is no motion at all but are still recorded, hogging storage space unnecessarily. With motion based recording enabled, the NVR stops recording when there is no motion. Therefore, the storage space is utilized for only those recordings in which motion has been observed. Adaptive recording: According to Indian Government policies for public areas, it is mandatory to record video streams persistently, irrespective of motion. To approach this requirement, NVRs have the option of adaptive recording, in which the number of frames per second change, adapting to the motion. This means, when there is no motion the NVR for IP cameras will still record, but with less frames as compared to when there is motion. Adaptive recording can economize storage space by as much as 50%. Camera-wise recording retention: Each area in an industry fulfils a unique purpose and thus, the priority of camera recordings vary. Camera-wise recording retention provides flexibility to configure the number of days for retaining recordings based on the predominance of a camera and the area where it is installed. For example, recording retention for canteen can be set to 15 days, that of reception area, to 30 days while for the parking area recording retention can be set to 40 days. These are some of the many features that NVRs with modern technology come equipped with. There are, however, still a large amount of functions that a NVR can perform.
National Roundup
Securing a Manufacturing Plant in Dhaka Videonetics forays into Bangladesh market by securing one of the largest manufacturing plants
V
ideonetics, the world-leading visual computing platform development company, announced its entry into Bangladesh by deploying its state-of-the-art solutions comprising intelligent video management software (IVMS), intelligent video analytics (IVA) along with automatic number plate recognition (ANPR) system at one of the largest manufacturing plants, located at Dhaka. Having the production capacity of 2500 MT/ day, the factory contains valuable raw material, machinery, assembly floor or/ and manpower that need around the clock monitoring and vigilance. Prior to deploying the solution, the plant was majorly monitored by manned security, resulting into underlying challenges such as assets loss, equipment misuse/ theft, chances of leaking confidential information, negligence in maintaining employee safety and security, and much more. To address the critical security requirements of the plant, Videonetics designed and developed a unified combination of the IVMS, intelligent video analytics and specially customized ANPR system to read and capture Bangla License Plates. The solution is not only securing various areas such as assembly plant, warehouse, process, dispatch area, loading and unloading of hazardous materials along with employees monitoring but can also respond to potential security issues in a proactive manner. The 24/7 real-time
We are glad to make our entry into Bangladesh and honored to be associated with one of the most reputed and largest industrial house by securing their one of the manufacturing plants. I am sure that our state-of-the-art solution will set a benchmark in the country for securing such large premises – Avinash Trivedi VP – Business Development, Videonetics monitoring is being held at the command control centre by the authorized officials and they can always search, analyse and playback footage of any event/ incident. Designed for manufacturing plant, Videonetics deployed IVMS solution to help in recording and viewing over 500 cameras over IP network in an efficient and elegant way. In addition, it provides investigation-friendly monitoring software at the front-end, while relegating to the back-end all the complexity of the server software. Enabling intelligent video analytics at various locations helps in intelligent monitoring of vehicles, crowds, infrastructure, people and objects, for automatic detection and analysis of events of interest. To monitor vehicle movement at the exit and entry gates, ANPR system was installed to not only read license plates written in Bangla, but also capture the license plates of any vehicle(s) in the field of view (FOV) of a camera and store them in a database with time-stamp that can be reSecurityLink India ■ March 2018
viewed for future use. Videonetics is one of the fastest growing Indian tech giants, pioneering its way up with the help of a longterm vision. The ground-breaking and state-of-the-art technology allows Videonetics to help its clientele achieve the most as their return on investment. They design, develop and provide ultra modern surveillance products like intelligent VMS integrated with video analytics software that empowers video surveillance systems. The visual computing platform that they utilize lays its foundation on the principle of green computing. They are offering the power to process more number of video channels when one compares with the competing brands, making much lower computational and memory footprint. The pioneering offerings help the customers considerably reduce the operating and capital costs for a video surveillance system while improving its overall performance and reliability. 27
feature
Reducing False Alarms with Deep Learning Ashish P. Dhakan – MD & CEO, Prama Hikvision
T
he Deep Learning phenomenon continues to excite the IT world, with computing power now at the level where it can be properly used in practical applications. Hikvision has been at the forefront of applying the technology in the surveillance industry and beyond, and has already released its first set of products that harness the power of artificial intelligence (AI).
The concept of deep learning takes inspiration from the way the human brain works. Our brains can be seen as a very complex deep learning model. Brain neural networks comprise billions of interconnected neurons; deep learning simulates this structure. These multi-layer networks can collect information and perform corresponding actions according to an analysis of that information.
In the past two years, the technology has excelled in speech recognition, computer vision, voice translation and much more. It has even surpassed human capabilities in the areas of facial verification and image classification, and hence has been highly regarded in the field of video surveillance in the security industry. Its ability to enhance the recognition of human beings – for example, distinguishing them from animals – makes the technology a great addition to the security arsenal. This is especially relevant in a world where false alarms account for 94%-99% of all alarms, according to police and fire service statistics.
How deep learning works
D
eep learning is intrinsically different from other algorithms. The way it solves the insufficiencies of tradi-
●● Deeper Intelligence. Deeper Surveillance ●● Hikvision Deep Learning solutions are available at three levels: ●● DeepinView camera can conduct target tracking, grading and capturing when an alarm is triggered. ●● ‘Traditional’ IP camera using a DeepinMind NVR will add the function of searching intelligently by picture, saving time on searching for targets compared with a regular NVR. ●● DeepinView camera and a DeepinMind NVR delivers a full power solution, with the camera sending the information to the NVR, which can then analyse it. This accelerates recording and false alarm filtering. 28
SecurityLink India ■ March 2018
feature
tional algorithms is encompassed in the following aspects. The algorithmic model for deep learning has a much deeper structure than the traditional algorithms. Sometimes, the number of layers can reach over a hundred, enabling it to process large amounts of data in complex classifications. Deep learning is very similar to the human learning process, and has a layer-by-layer feature-abstraction process. Each layer will have different ‘weighting,’ and this weighting reflects on what was learnt about the images’ ‘components.’ The higher the layer level, the more specific the components are. Just like the human brain, an original signal in deep learning passes through layers of processing; next, it takes a partial understanding (shallow) to an overall abstraction (deep) where it can perceive the object. Deep learning does not require manual intervention, but relies on a computer to extract features by itself. This way, it is able to extract as many features from
the target as possible, including abstract features that are difficult or impossible to describe. The more are the features the more accurate the recognition and classification will be. Some of the most direct benefits that deep learning algorithms can bring include achieving comparable or even better-than-human pattern recognition accuracy, strong anti-interference capabilities, and the ability to classify and recognize thousands of features.
Challenges of existing systems
C
onventional surveillance systems, mostly detect moving targets, without further analysis. Even smart IP cameras can only map individual points on a shape one by one, making it difficult to calibrate some features (e.g., forehead or cheek), thus decreasing accuracy. For perimeter security, for example, other technologies can be (and are) used to provide more comprehensive security, but they all have their downsides. Infra-
SecurityLink India ■ March 2018
red emission detectors can be ‘jumped over’ but are also prone to false alarms caused by animals. Electronic fences can be a safety hazard, and are limited in certain areas. Some of these solutions can also be expensive and complicated to install. An object such as animals, leaves, or even light can cause false alarms, so being able to identify the presence of a human shape really improves the accuracy of perimeter VCA functions. Frequent false alarms are always an issue for endusers, who need to spend time to investigate each one, potentially delaying any necessary response and generally affecting efficiency. Imagine, for example, a scenario where it’s relatively quiet – a location at night where there are few cars and people around. Even here, there could be 50 false alarms in a night. Assuming it takes 2-3 minutes to check out a false alarm, and that just 3 out of the 50 warrant more attention – say 15 minutes each, a guard either needs to check the system
29
feature
and look back at the alert, or someone needs to be dispatched to the location and look around, checking if anyone has indeed ‘entered without permission.’ In most organizations, these would need to be reported/ recorded too, adding to the overall time spent on this ‘false alarm.’ So, those 50 false alarms could cost more than two hours each night of wasted time in that scenario. Deep learning, however, makes a big difference. With a large amount of good quality data from the cameras and other sources, like the Hikvision Research Institute, and over a hundred data cleaning team members to label the video images, sample data with millions of categories within the industry have been accumulated. With this large amount of quality training data, human, vehicle, and object pattern recognition models become more and more accurate for video surveillance use. Based on a series of experiments, the recognition accuracy of solutions using the deep learning algorithm increased accuracy by 38% – applying this to the previous example, that’s a saving of nearly one hour each night. This makes deep learning technology a great advantage in a perimeter security solution,
30
with much more accurate line crossing, intrusion, entrance and exit detection.
Other uses
T
he value of deep learning technology stretches further than traditional security. For example, tracking movement patterns of individuals can see if they are ‘loitering’ and a potential threat in the future. A threshold could be set to five meters radius of movement, or ten seconds of staying in the same place. If the person passes either threshold, an alarm could be triggered. The solution tracks the individual and compares this behaviour to a database to see if it recognizes a pattern. Another application would be in a scenario where ‘falling down’ could be a threat, like an elderly care home. If
SecurityLink India ■ March 2018
a height threshold was set at 0.5m and duration time 10 seconds, the solution would be able to see a person falling down (as they go below 0.5m) and might be in trouble (if they ‘stay down’ for longer than 10 seconds). The solution uses the parameters set to compare with its database and raise an alarm. With features and benefits like these, it’s easy to see how many smart applications could be catered for by deep learning technology. To sum up 10,000-strong R&D Centre is pushing the boundaries of surveillance solutions and bringing even more benefits to them. Artificial intelligence has massive potential, and Hikvision is always exploring new ways to apply this exciting technology throughout the security industry and beyond.
28-30 June 2018 Hitex, Hyderabad
Gateway to security markets of South India
• • • • • • • • • • • • • • • •• • • • • • • • •••
From the organizers of IFSEC India. PRODUCTS ON DISPLAY
CCTV
INTRUDER ALARMS
FIRE DETECTION SYSTEMS SURVEILLANCE SYSTEMS
METRICS & RFID
ACCESS CONTROL
CYBER SECURITY
INTEGRATED SYSTEMS
IT & NETWORKED SECURITY
Key features 4000+ Decision Makers and Influencers SI's, VARS, Dealers Architects and Solu�on Providors Representa�ve from the Government and Public Domain Solu�on Seeking End �sers from different ver�cal Knowledge driven conference and workshops 75+ Exhibitors Media Partners
Suppor�ng Associa�ons
CONTACT
Pankaj Sharma E: pankaj.sharma@ubm.com | M: +91 99713 65776
www.safeindiaexpo.com
feature
Be Cautious
You could be Giving out your Own Passwords By Puneet Bhasin – Advocate, Cyber Laws Expert, Founder – Cyberjure Legal Consulting
T
here are two types of hacking or unauthorized access to accounts. The first involves password cracking tools, but most organizations have cyber security features in place to prevent these attacks. However, it’s the second type of attack that can cripple any organization or person’s accounts and databases, and that is a social engineering attack. Social engineers are criminals who take advantage of human behaviour to pull off an online scam or hacking attack. Successful social engineers are confident and in complete control of the situation. Social engineers generally use two techniques – one is by simple obser-
Social engineers are criminals who take advantage of human behaviour to pull off an online scam or hacking attack. Successful social engineers are confident and in complete control of the situation 32
vation while the other is the proactive effort. In the first case, the social engineer simply observes a person’s social networking profiles such as Linkedin profiles etc., and all other data available about him. Most people have passwords that they can easily remember, and for that they use the words that are closely related to them. People share every detail of their lives on social networking sites including their date of birth, favourite colour, pet’s name and everything possibly related to them. This information is freely available. This makes it pretty easy for the hackers/ social engineers to guess passwords in such a scenario and fix it. It’s always advisable to be discrete with respect to the data shared on social media. Such data is also collected by the online questionnaires and market research forms that people request to fill in public places. In the second case, the attack is pre-planned and a complete checklist is made of the person or companies including likes and dislikes, passions, hobbies and professional credentials etc. The second stage of physical access now comes into the picture. For SecurityLink India ■ March 2018
example, three income tax officials turn up at your office for an inspection along with relevant badges and check all the office computers and documents. In the process they lodge key loggers into your computers, whereby they will receive an email of every key stroke made on the computers, thereby giving out your passwords and confidential data. An example of this kind of attack would be where a social engineer researches about a person let’s say Mr. A, and collects that the person is fond of foreign holidays. The social engineer calls up this person as the authorized representative from a reputed travel agency and offers a mind-blowing holiday package. He asks Mr. A the version of PDF reader he is using on his laptop. The conversation is very friendly and inspires trust in the mind of Mr. A. The social engineer sends the holiday proposal in a PDF format which is not compatible with the PDF reader installed by Mr. A, and along with the proposal sends a compatible PDF reader for Mr. A to download and read the proposal. The PDF reader has malware attached that gives the social engineer access into Mr. A’s computer.
feature
Another example of this type of social engineering attack is where a very pretty woman, who is a journalist, goes to meet the system administrator of a big company, to get his opinion on cyber security. She goes easy and flirts with him and after taking his opinion pushes off. In the course she ‘accidently’ leaves her pen drive behind with him. The ensuing impact of the girl would make him curious to know more about her and hence he accesses her pen drive. The pen drive is infected with key logger and Trojan malware, which make the company’s networks very vulnerable. The 4 basic principles which most social engineers follow are: ●● They project confidence: They do not sneak around, they proactively approach people and draw attention towards themselves. ●● They give you something: Probably just a small favor which creates trust and a perception of indebtedness. ●● They use humor as that is one tool which is endearing and disarming. ●● They make a request and offer a reason and research shows people are likely to respond to any reasoned request. Attacks by social engineers are offences in India under Section 43 of the Information Technology Act, 2000. This section reads as under: Penalty and compensation for damage to computer, computer system etc. If any person without the permission of the owner or any other person who is in-charge; a. Accesses or secures access to such computer, computer system or computer networkor computer resource; b. Downloads, copies or extracts any
A victim is required to make a Complaint in the prescribed format along with the applicable fees to The Adjudicating Officer, Information Technology Act, 2000. Under the provisions of the Rules for the conduct of Adjudicating Proceedings, the Adjudicating officer shall decide every application in 4 months and the whole matter in 6 months
c.
d.
e.
f.
g.
h.
data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; Introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; Damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network; Disrupts or causes disruption of any computer, computer system or computer network; Denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; Provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder; Charges the services availed by a person to the account of another person by tampering with or manipulating any computer, computer
SecurityLink India ■ March 2018
system, or computer network, i. Destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; he shall be liable to pay damages by way of compensation to the person so affected. A victim is required to make a Complaint in the prescribed format along with the applicable fees to The Adjudicating Officer, Information Technology Act, 2000. The fees are calculated in accordance with the damages claimed. Under the provisions of the Rules for the conduct of Adjudicating Proceedings under the Information Technology Act, 2000, the Adjudicating officer shall decide every application in 4 months and the whole matter in 6 months. The biggest weakness lies not in computer systems, but lies in human nature. Cyber criminals using social engineering techniques are experts in manipulation of the mind and know very well the weaknesses of human nature being greedy, lusty, gullible etc. It is extremely important to educate employees about these kinds of attacks as the weak link may not be your cyber security, but an unknowing employee himself. 33
feature
Smart IoT Industrial Park Brings Productivity & Quality to a New Level
By Balasubramanian Jayam – Head of Marketing (India & SAARC), Dahua Technology Co., Ltd.
T
o grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, Dahua Technology has put to use a new smart IoT industrial park in Hangzhou. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/ living in the 262 acres of phase one
area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level.
Faster production & adaption
T
he automatic production solution based on integrated information system not only grants a higher productivity that significantly
Dahua Smart IoT Industrial Park
34
SecurityLink India ■ March 2018
shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialized requests and ever-changing reality. The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production (preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning highend devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour,
feature
or 35 per second. X35 multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. The faster speed also applies to the development of new molding, since Dahua smart industrial park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organizing system is supported by topnotch equipment such as MAKINO highspeed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005mm, while also supporting CAD/ CAM/ CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days. By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors etc., all of which are proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business.
Higher quality
H
igher quality saves lots of time and economic costs for clients. Even more importantly, higher
quality results in less likelihood for products to malfunction especially when they are used in critical, notallowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons – first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, it has put together an effectively closed loop for quality control in the manufacturing process.
Accuracy enhanced
A
ccuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example – it can process components, in metric size, as small as 03015 (0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry. Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with SecurityLink India ■ March 2018
enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognize flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.
Reliability reinforced
R
eliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/ low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialized needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/ system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialized use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one, and in the future phase, it is expected to be more intelligent, to realize clientcentered flexible production and to enable a safer society and smarter living. 35
feature
Predictions in Id Technology
Top trends that are driving more intelligent, connected experiences in 2018
H
ID Global has identified the top trends in the identity technology industry for 2018. The company points towards increased cloud and mobile access adoption, more focus on securing the Internet of Things (IoT), and data analytics as some of the top trends that will take center stage in developing more intelligent, connected experiences this year. “Trusted identities will emerge this year as the fundamental building blocks for organizations to create environments that connect people, places and things,” said Samuel Asarnoj, Senior Vice President, Corporate Strategy & Business Development with HID Global, “The user experience will be redefined by mobile, IoT and cloud technologies, and deliver new capabilities for the future.” HID Global sees five significant trends in 2018 that will influence how organizations leverage the power of trusted identities.
cates in the IoT will draw upon the trusted cloud services to deliver and manage certificates across thousands of devices.
Organizations embracing the benefits of the cloud
017 was the year when mobile access went mainstream and adoption will accelerate even further in 2018. Maturity in mobile solutions and integration into other systems, coupled with mobile’s ability to enhance user convenience, improve operational efficiency and provide higher security will drive accelerated growth for mobile access and mainstream adoption. Card emulation, the NFC mode most coveted for mobile access control, remains reserved exclusive to Apple Pay; this leaves Blue tooth as the communication standard for cross-platform mobile access support. Still, organizations will invest in readers and other infrastructure that supports NFC and BLE to prepare for future possibilities.
I
ncreased awareness of the cloud’s ease of deployment, flexibility, connectivity options and productivity benefits will escalate adoption. Access control cloud platforms with APIs and SDKs will fuel new software solutions that expand choices for organizations to get the most out of their investments. Cloud-based card issuance will drive adoption due to its simplicity, security and cost structure, while governments increasingly investigate how printed IDs can be complemented by cloud-issued mobile citizen IDs. Cloud authentication and credential management will further integrate mobile devices, tokens, cards and machineto-machine endpoints. And digital certifi36
More connected devices and environments drive focus on securing the IoT
D
igital certificates will become a core component for adding trust in the IoT by issuing unique digital IDs to printers and encoders, mobile phones, tablets, video cameras and building automation systems, plus a broader range of things like connected cars and medical devices. Apple iOS 11 ‘read’ support of NFC will fuel adoption of IoT-based applications such as brand protection, customer loyalty programs and other use cases that will further drive the need to enhance security in the IoT.
Mobile access reaches tipping point for mass market adoption
2
SecurityLink India ■ March 2018
Convergence of physical and digital security
T
he concept of physical identity & access management (PIAM) will drive convergence of physical and digital security to a single credential, putting identity at the center of all use cases. Government, finance, energy and other regulated markets will emerge as the forerunners using these solutions for secure access to buildings, email, websites and VPN. The new converged identity models that use cloud authentication and mobile devices are also emerging such as the ability to verify a person’s presence at a location, mobile IDs that validate physical citizen IDs, and smart cards that authenticate users to enterprise resources.
Data analytics will drive risk-based intelligence for predictive models and new capabilities
D
evices, access control systems, IoT applications and other solutions connected to the cloud will provide robust data for advanced analytics. Insights from these analytics can be used to optimize workflow solutions and provide more seamless access for end users. Predictive analytics and biometrics will play a crucial role in people-centric security and address employee demands for workplaces to deliver premium, more individualized services. Analytics will also help reduce downtime in the enterprise, spur factory automation and improve compliance via condition monitoring that is based on real-time location and sensing solutions.
white paper
Security Considerations for Code Signing R
ecent security-related incidents indicate the need for a secure software supply chain to protect software products (also referred to as code) during the development, build, distribution, and maintenance phases. Of particular concern is provisioning and updating software that plays a critical role in platform security. A wide range of software products including firmware, operating systems, mobile applications, and application container images must be distributed and updated in a secure and automatic way to prevent forgery and tampering. An effective and common method of protecting software is to apply a digital signature to the code. Digitally signing code provides both data integrity to prove that the code was not modified, and source authentication to identify who was in control of the code at the time it was signed. When the recipient verifies the signature, he is assured that the code came from the source that signed it, and that it has not been modified in transit.
NIST plans to develop further guidance to help organizations evaluating, deploying or managing code signing systems. The high-level recommendations described in this document are expected to form the basis for more detailed recommended practices for code signing 38
This white paper targets software developers and product vendors who are implementing a code signing system or reviewing the security of an existing system, with the goal of achieving improved security and customer confidence in code authenticity and integrity. System integrators and administrators who are concerned about the trustworthiness of the applications that are installed and run on their systems will learn the properties they should expect from a code signing solution to protect their software supply chain. This white paper describes features and architectural relationships of typical code signing solutions that are widely deployed today. It defines code signing use cases and identifies some security problems that can arise when applying code signing solutions to those use cases. Finally, it provides recommendations for avoiding those problems, and resources for more information. Properly applied, these recommendations will help to ensure that the software supply chain is resistant to attack. NIST plans to develop further guidance to help organizations evaluating, deploying or managing code signing systems. The high-level recommendations described in this document are expected to form the basis for more detailed recommended practices for code signing.
The basics of code signing
T
his section provides high-level technical details about how this process
SecurityLink India ■ March 2018
works. There are multiple roles in the process: developer, signer and verifier.
Developer
T
he developer is the entity responsible for writing, building, and/ or submitting the code that will be signed. This entity maintains a secure development environment, including the source code repository, and will submit code to the signer after it has completed the organization’s software development and testing processes.
Signer
T
he signer is the entity responsible for managing the keys used to sign software. This role may be performed by the same organization that developed or built the software, or by an independent party in a position to vouch for the source of the code. The signer generates the code signing private/ public key pair on a device that is sufficiently protected, as the security of this process relies upon the protection of the private key. In many cases, the signer then provides the public key to a certification authority (CA) through a certificate signing request. The CA will confirm the signer’s identity and provides a signed certificate that ties the signer to the provided public key. Anyone can use the public key associated with this certificate to validate the authenticity and integrity of code signed with this key pair. If no CA is used, the public key must instead be distributed using a trusted, out-of-band mechanism. The signer ensures through techni-
white paper
cal and procedural controls that only authorized code is signed. When code is submitted by developers for signing, the signer verifies their identities and their authority to request a signature. The signer may also take additional steps to verify the code is trustworthy. Ultimately, two or more trusted agents of the code signing system may be needed to approve the request and generate a digital signature. In some cases, the signed code may also be provided to a time stamp authority to indicate when the code was signed.
Verifier
T
he verifier is responsible for validating signatures on signed code. The verifier may be a software component provided by the same developer as the signed code (e.g., for a signed firmware update), or it may be a shared component provided by the platform (e.g., the operating system).
Architectural components
T
he code signing architecture is composed of a set of logical components that are responsible for different aspects of the code signing process. The code signing/ verifying architecture rep-
resented in Figure 1 potentially has four distinct components: the code signing system (CSS), the certification authority (CA), the time stamp authority (TSA), and the verifier(s).
Code signing system (CSS)
T
he first component, the CSS, receives code submitted for signing, authenticates and authorizes the submitter, and generates the signature. To generate these signatures the CSS has one or more private signing keys, which need to be carefully protected from extraction or unauthorized use.
Certification authority (CA)
T
ypically, a CSS utilizes a CA to enable authenticating the identities of signers. CAs issue certificates to signers in accordance with certificate policies, which specify the security controls and practices the CA follows when issuing certificates, and impose requirements on the subjects of the certificates. NIST Interagency Report 7924 is a reference certificate policy that specifies most of the requirements for a CA that issues code signing certificates. There are also industry groups such as the CA/ Browser Forum and the CA Security Council,
that have published requirements documents for the issuance of code signing certificates
Time stamp authority (TSA)
S
ome code signing architectures use a TSA to demonstrate when a particular piece of code was signed. When a TSA is used, signatures are sent to the TSA which applies its own signature and signing time to the package. The TSA operates independently from the CSS and keeps its clock synchronized to an authoritative time source. This allows an entity verifying code to accept the signature on the code as valid if the signing key was valid at the time the code was signed, even if the key has already expired at the time of verification or the key was compromised sometime after the code was signed.
Verifiers
V
erifiers are responsible for validating the signature and any certificates and time stamps used by the signers. The verifiers also manage any trust anchors that are used to validate certificates. Either the signer or an independent party may be responsible for the verification component.
Trust anchors
A
critical aspect of managing the verification component is the management of trust anchors that are used to validate signatures, usually by verifying code signing certificates. Trust anchors are data objects, generally public keys, that are installed and securely stored on the verifying platform. The trustworthiness of a trust anchor is based on the method of its installation, storage and management. Trust anchors are generally not used to verify code directly, but are typically
SecurityLink India â– March 2018
39
white paper
public keys of root CAs that sign over certificates of code-signing-CAs. This provides a means to recover from incidents resulting in the theft of loss of a private key owned by individual code-signingCAs or code signers. While trust anchors must be stored in a protected manner, it is not advisable that trust anchors be permanent – if the corresponding private key were compromised, this would render the platform vulnerable without a means to remediate that vulnerability.
Code signing use cases
T
he organization establishes a policy that defines the developer(s) authorized to submit code to be signed by the CSS at particular stages of development. The implementation of the system is dependent on the use case for the CSS. This section describes four example use cases: firmware signing, driver signing, trusted application stores, and application software signing. Please note that these examples are for illustrative purposes; they neither reflect all instantiations of each use case nor are they comprehensive of all code signing use cases.
Firmware signing
S
ecure distribution of firmware is an example of a software supply chain where all aspects of the code signing activity – software development, authorization of the code to be signed, administration of the CSS, and development of the verifier – are typically under the control of a single organization. A typical work flow includes a team of developers who track contributions to the project in a version control system before the code is passed along to a build system. During development, the CSS might sign nonproduction versions with development or test keys. These signatures would be used in testing but would not be used for 40
The driver developers do not obtain their own code signing keys and certificates. Instead, they submit their code to the central trusted authority (e.g., the OS vendor or OEM), who verifies the identity of the developer and provides a signature for the submitted driver verifying code in fielded products. When the code is ready to be shipped, the developers submit it for signing. An authorized approver (or multiple approvers) examine the code per organization policy and submit the code, along with an approval. The CSS inspects the package (code, approvals and metadata) to determine whether all requirements are met. The package is then signed with a production key. This key can be unique per project. All production keys are centrally held, likely in a hardware security module (HSM). Each corresponding public key is securely installed in the verifier component on the platform for which the firmware is intended.
Driver signing
D
evice drivers are privileged processes that run close to a computer’s system kernel, controlling and communicating with hardware components. A typical personal computer will have several hardware devices with associated drivers. While drivers are typically developed by the associated hardware vendor, all other aspects of the code signing activity are still typically controlled by a central authority. While details vary SecurityLink India ■ March 2018
from platform to platform, device drivers often are signed by a central, preconfigured trusted authority. For operating system (OS) drivers, the approval and signing process is often performed by the OS vendor. Firmware-level drivers (e.g., unified extensible firmware interface (UEFI) drivers) often rely on a central, third-party signing service, with the trust anchor managed by the original equipment manufacturer (OEM). In this example, the driver developers do not obtain their own code signing keys and certificates. Instead, they submit their code to the central trusted authority (e.g., the OS vendor or OEM), who verifies the identity of the developer and provides a signature for the submitted driver. If a driver is later discovered to be untrustworthy or malicious, the trusted authority has mechanisms to revoke the particular signature or signatures issued to that developer.
Trusted application stores
M
odern computing devices use application stores to distribute signed applications (apps) to users including software developed by third parties. Different platforms perform code signing in different ways, but in most cases, application stores are operated by the OS or platform vendor to distribute only those applications that have undergone some level of vetting based on a defined policy. While individual developers may have their own signing keys, either for development purposes or to authenticate to the store, the private keys used to sign applications are under the control of the store, which serves at the CSS. Developers submit their applications to the store, and their identities are verified before the apps undergo vetting. If everything is in order, the store signs the app and publishes it, making it available for download.
white paper
Devices can be configured to only install apps that have been signed by a key controlled by the application store.
Application software signing
O
perating systems generally include support for applications developed and distributed by independent vendors. Depending on the configuration of the system, a valid code signature may be a prerequisite to installation, or the OS may grant access to protected system resources only to signed applications. For these signatures to be accepted by the OS, application developers must obtain a code signing certificate from a CA that is trusted by the OS vendor. The OS vendor may operate a CA for this purpose, or it may partner with commercial CAs to provide this service. The developer generates a code signing key pair, and requests a public-key certificate from the CA. The CA verifies the identity of the developer before issuing the certificate. The developer uses its private key to sign any applications it develops for that OS. These signatures establish the identity of the developer, and allow the OS to verify that the application has not been tampered with. The developer may also obtain time stamps from a TSA so that the OS will be able to verify the signatures even after the corresponding certificate has expired. The platform OS can determine the provenance of the application. The system administrator or user may be asked to decide whether to trust code from the developer, since the OS vendor does not vet the application. The trusted CA(s) may, however, aid the user by refusing to issue certificates to developers who are known to have signed malicious code in the past.
ď ˝ If code needs to be signed regularly as part of development, create a physically or logically distinct CSS that will be used during development and not used for signing production code. As part of this separation, development keys should not chain back to the same root keys that the production keys do ď ž Threats to the CSS
T
his section enumerates some potential threats to the CSS. Theft of private signing key: Private signing keys that are not properly protected are at risk of theft, allowing a successful attacker to sign arbitrary code. Limited revocation mechanisms in some systems that rely on code signing exacerbate this threat. Issuance of unauthorized code signing certificates: Weak protections on CA private keys used to issue code signing certificates, or weak vetting procedures used to issue those certificates, could allow an attacker to obtain one or more unauthorized code signing certificates. Misplaced trust in certificates or keys: Verifiers could trust certificates or keys for code signing that were never intended to be used for code signing or that otherwise should not be trusted to sign code from a particular source. In some cases, verifiers may allow users to extend trust to untrustworthy certificates or signers. Signing of unauthorized or malicious code: Code signing procedures could allow malicious or unauthorized code to be inadvertently signed, either as the result of a legitimate mistake, poor governance controls, an insider attack or a successful intrusion into software/ firmware development or code signing systems. Similarly, intrusions into deSecurityLink India â– March 2018
velopment systems or the code signing infrastructure itself, could result in malicious code being signed. Use of insecure cryptography: Use of weak or insecure cryptographic algorithms or key generation methods could allow cryptanalytic or brute-force attacks to recover private keys or obtain fraudulent certificates. Future developments such as new cryptanalysis, implementation vulnerabilities, or the development of a cryptographically-significant quantum computer, could render a previously-deployed system insecure.
Recommendations
T
his section presents recommendations for improving the security of the software supply chain by protecting the code during the development, build, distribution, and maintenance phases. Identify and authenticate (I&A) trusted users: Implement an I&A scheme that adequately identifies the users who have the ability to sign code or submit code to be signed. Authorize trusted users: Determine who has authorization to submit code for signature. Maintain and regularly review/ audit a list that specifies who can submit code and what code they can submit (e.g., for what projects they can submit). Consider requiring two people to approve code for signing and/ or the use of multi-factor authentication. 41
white paper
Separate roles within the CSS: Separate critical roles for running the CSS and assign them to different people. In particular, separate the administration role of the CSS from the role of authorized submitter of code. Establish policies and procedures for reviewing, vetting and approving code: Signed code reflects an organization’s acceptance of that firmware or software. Prior to signing code, organizations should review and vet code to ensure it is trustworthy. Organization’s existing secure software development and build processes should support these procedures. Use strong cryptography: Use a well-designed, tested and maintained cryptographic library, and choose NISTapproved algorithms for hashing and signing. Protect the signing keys: The secrecy of the signing keys must be maintained. They should be isolated on a machine that has minimal applications and connectivity. If possible, the keys should be stored in an HSM with minimal functionality (e.g., signing). Use a separate CSS for development: If code needs to be signed regularly as part of development, create a physically or logically distinct CSS that will be used during development and not used for signing production code. As part of this separation, development keys should not chain back to the same root keys that the production keys do. Isolate and protect the CSS: The CSS is a foundational security system and should be protected as a critical asset. To the greatest extent possible, isolate the CSS from the production network (as well as any external networks). Utilize auditing and periodically review logs: Audit the use of signing keys. Review the logs regularly for anomalous usage of keys. Protect the logs so 42
that a breach of the CSS does not allow past entries of the log to be overwritten. Utilize a reputable CA: If a CA is being utilized to establish trust in the binding of the signer and the public key, then either operate a secure CA or purchase certificates from a reputable CA. If a CA is not being utilized, then trust is established by possession of the private signing key alone. In this case, protection of the signing key is paramount as it cannot be easily updated later. Utilize a reputable time stamp server: If a time stamp server is being utilized to ensure the integrity of the time of code signing, then either operate a secure time stamp server or use the services of a reputable time stamp server. Manage trust anchors: In many cases, the trust anchor can be updated. If this is the case, care should be taken that the trust anchor only changes when properly authorized. It needs to be stored in such a way that it cannot be changed outside of a well-defined update process. Manage code versions: If protection against rollbacks is desired, the version of the code should be signed as part of the metadata in the package, and verified by the verifier during a software update process. The update should proceed only if the supplied code is newer than what is already present on the system. Validate certificates: If a CA is utilized, the verifier must be able to determine that the certificate containing the public signature verification key is valid. It should check that the signature on the certificate is valid and from an authorized CA. Critical fields including the validity period and key usage fields should also be checked. Validate time stamps: If the signed code includes a time stamp, the verifier must be able to determine that the time stamp was signed by a TSA that it trusts, SecurityLink India â– March 2018
particularly if the signature on the code was valid at the time specified in the time stamp but is no longer valid at the time of verification. Validate signatures: The verifier must be able to validate the signature and determine that the public key associated with the signature can be chained back to an authorized signer. Note that in some cases, there will be no CA, and the public key determines authorization. Check certificate revocation: Sometimes certificates need to be revoked before the end of their validity period. The verifier should either be able to check revocation or have a secure mechanism for updating the trust anchors.
Conclusion
T
his white paper describes the security considerations for a code signing solution to protect the software supply chain. Code signing provides assurance that the software is authentic and has not been tampered with during the development, build, distribution, and maintenance phases, and the verifier can validate these properties at runtime. The use cases dictate the deployment model but the core components of the solution include the CA, the TSA, the CSS, and the verifier. By David Cooper Andrew Regenscheid Murugiah Souppaya Computer Security Division Information Technology Laboratory Christopher Bean Mike Boyle Dorothy Cooley Michael Jenkins National Security Agency Ft. George G. Meade, Marylan
feature
Three Big Predictions
Sensors in the Security & Surveillance Market The market is expected to reach $12,012.1 million by 2023
T
he Internet of Things (IoT) is bringing about a new era of connectivity in the digital age, connecting critical business sectors through a network of secure data flow, analytics, and management. It’s also bringing numerous opportunities for sensor participants through security technologies required for remote services and enhanced accessibility of devices. The total sensors market in security and surveillance applications was worth $6,267.9 million in 2016, with image sensors holding the largest market share at 23 percent. The market is expected to reach $12,012.1 million by 2023. North America and EMEA dominate the market, driven by aging infrastructures, but APAC is the fastest growing due to rapid infrastructure development, strong economic growth, and favorable government regulations. However, challenges for sensor manufacturers and suppliers include increased competition, leading to pricing pressures, lack of product differentiation, and lack of common global standards. Frost & Sullivan’s recent analysis, Sensors in Security & Surveillance, Global Forecast to 2023, covers global trends for sensors used in security and surveillance applications across industries such as industrial, commercial, institutional, building automation, infrastructure, and security and defense. The analysis also explores the impact of the Internet of Things (IoT) and Industrial Internet of Things (IIoT) on security and surveillance.
The growth of IoT is contributing to rapidly evolving security requirements, with the areas of robotics and biometric and RFID sensors offering the greatest opportunities. Robotics is expected to be the future of security and surveillance, with considerable investments in research and development in this space. In addition, the demand for drones and AGVs remains strong, especially in defense, commercial, and institutional spaces. “In commercial and residential applications, biometric recognition used in access control systems is also witnessing a gradual increase in interest,” said Ram Ravi, Industry Analyst, Frost & Sullivan, “In addition, cloud networking, a revolutionary two-way interactive service delivery platform, is expected to create a technological explosion in the homes and buildings services market, particularly in commercial and residential security applications. This will enSecurityLink India ■ March 2018
able homes and buildings participants to adopt new business models to provide attractive cloud-based services through a secured network.” Three big predictions for sensors in the global security and surveillance market: ●● Internet of Things (IoT) is paving the way for industry convergence and enabling machine-to-machine (M2M) communications for better business decisions. Sensors form the physical layer of the IoT architecture; ●● Development of new communication protocols will ensure interoperability and provide standardization, particularly in applications for perimeter security, intrusion detection, and access control systems; and ●● Retail, healthcare, and finance are all expected to offer considerable growth opportunities for sensors in biometrics. 43
feature
Traditional Switch Port Security By Tom Exley – Technical Head, ComNet
W
ith Cybersecurity becoming an increasingly important factor in designing modern Ethernet networks, ComNet have launched an industry first edge security feature that is both simple, secure and easy to configure and use. The ComNet exclusive Port Guardian feature has the capability to physically disable a port if unauthorized access is detected. The value in Port Guardian comes in situations where network intrusion is attempted by disconnecting an IP addressable device at the edge to connect to the network. When Port Guardian senses this disconnect, an SNMP notification is sent to the head end and the affected port is physically locked out, preventing access. The network administrator can re-enable the port once the threat is eliminated. This feature also thwarts access through ‘Spoofing’ by disabling the port as soon as an interruption is sensed. Layer 2 managed switches can typically implement port security which consists of checking incoming packets for a matching MAC address. If a packet with a valid MAC address is received on a particular port then the switch will allow that packet to pass through the switching fabric of the switch as normal.
MAC = 11:11:11:11:11:11
44
Only MAC 11:11:11:11:11:11 Allowed on Port 1
If a packet with an invalid MAC source address is received on the switch port then that packet is dropped by the switch and is not allowed to proceed any further and therefore, this provides a basic level of security as only traffic from the user defined MAC address is allowed on that port.
MAC = 22:22:22:22:22:22
Only MAC 11:11:11:11:11:11 Allowed on Port 1
With this method it is therefore possible to easily implement basic port security against a potential intruder from removing the original device and replacing it with a device designed for network intrusion or from cutting the cable that went to the original device and connecting this cable to their own network intrusion device to gain access to the network. This level of protection is common amongst most layer 2 managed switches on the market today and indeed all ComNet managed switches support this capability as standard. This feature is referred to by many names including (but not limited to) the following: ●● Port locking. ●● MAC locking. ●● Port security. ●● MAC filtering.
SecurityLink India ■ March 2018
feature
What’s wrong with traditional switch port security?
T
he issue with the traditional Layer 2 MAC filtering/ locking as previously described is that it can be defeated with relative ease in a matter of minutes by using readily available software which can artificially alter the MAC address of the sender to match whatever the potential intruder wants. In the example below the intruder will alter the MAC address of their laptop to use the same MAC address of the authorised camera and gain access to the network.
MAC = 22:22:22:22:22:22
Only MAC 11:11:11:11:11:11 Allowed on Port 1
How does port guardian prevent such intrusions?
A
t the basic level Port Guardian works as a layer 1 protection system so the actual data being sent on the port is not important and the switch does not need to know anything about it. Port Guardian constantly monitors the enabled ports and as soon as it detects that a cable has been unplugged or there is a link down event that port will be immediately disabled and the network administrator notified via an SNMP alert (and optionally by a local contact relay if supported on the particular switch model) to the potential intrusion. MAC = 11:11:11:11:11:11
Only MAC 11:11:11:11:11:11 Allowed on Port 1
Contact Ouput Triggered (optional)
Fiber Optic Uplink To Main Network Port 1 Disabled System Alarm!
How would the intruder know what MAC to spoof?
What happens after Port Guardian locks out a port?
o how would a potential intruder know the MAC address of the camera (in this example) in order to be able to spoof that address from their laptop and gain network access? This could be done in several ways but one simple way could be to use a low cost network tap device so the camera is briefly unplugged and then connected to the tap and then quickly re-connected to the network again. The operator would see video loss for some seconds but would unlikely put this down to a potential intruder if it was even noticed at all.
nce Port Guardian has been triggered on a certain port then that port is in a permanent lock out condition and will appear to be dead to the potential intruder (no LEDs or anything will work on that port). The port will remain in this lock out condition even if the original legitimate device is re-connected. The lock out state can only be cleared by the network administrator through one of 4 possible methods as outlined below: ●● SNMP reset command issued. ●● Reset via Web GUI. ●● Port Guardian reset command issued from the local USB serial port CLI. ●● A contact input is closed (only available on models that have contact inputs). The contact input method is user configurable and is not enabled by default. What about cycling power to the switch? This is another user configurable option. The port lock out states can be set to clear on a power cycle or they can be set to go into lock out condition in the event of a power cycle (this would be the most secure option).
S
MAC = 11:11:11:11:11:11
Only MAC 11:11:11:11:11:11 Allowed on Port 1
O
SecurityLink India ■ March 2018
45
feature
So how can Port Guardian be used in networks?
T
here are really two distinct ways to use the Port Guardian feature and the correct implementation depends on how secure the location is where your remote ComNet edge switch (with Port Guardian feature) is located. An outline description and visual example of both scenarios follows.
Edge switch in secure location scenario
I
f the ComNet edge field switch is installed within a secure location then there is no concern about an intruder gaining access to the physical switch itself so one could enable Port Guardian just on the ports where he has edge devices connected that are physically located outside of the secure location and not enable Port Guardian on the uplink port(s) which are part of the secure network. In this scenario one could also set the option to have a power cycle clear any locked out ports as again he would not be as concerned with a potential intruder being able to power cycle the switch itself.
Edge switch in unsecured location scenario
I
f the ComNet edge field switch is installed within an unsecured location (such as at the base of a camera column etc.) then their would be a concern about an intruder gaining access to the physical switch itself to potentially access the network. There are 2 possible options for system configuration in this case which are as follows: 1. Enabling Port Guardian on all the ports of the edge switch and setting the power cycle option to force port lock out: This would offer protection on all ports, however, the downside is if there was a power failure the only way
to gain access to the switch again would be to send an engineer to the switch itself to reset it via the USB serial port CLI. 2. Using switches at both sides of the system that have the Port Guardian feature: The switch at the field side would have it enabled only on the ports with edge devices connected while the switch at the head end would have it only enabled on the uplink port that connects to the field edge switch. This offers full protection and allows recovery after a power failure as 1 port will always have access as Port Guardian will not be enabled. 46
SecurityLink India â– March 2018
feature
Global Study Cybersecurity professionals believe a catastrophic data breach to their organization is inevitable
A
new global cybersecurity study commissioned by Raytheon, in partnership with Ponemon Institute, reveals a majority of senior-level IT professionals fully expect their organization will experience a catastrophic data breach that could greatly impact shareholder value. The 2018 Global Megatrends in Cybersecurity survey of 1,100 senior-level IT and IT security global practitioners also shows that despite growing threats, IT professionals believe cybersecurity is still not considered a strategic priority among senior leadership. “Our hope is that CISOs and senior leaders can use this report as a tool to start a deep dialogue about the critical need for cybersecurity within their organizations,” said Raytheon Chairman and CEO Thomas A. Kennedy, “Every day the cyber threat is growing more sophisticated and aggressive, posing a real threat to global businesses across all sectors. To reduce risks, leaders must urgently work with their IT teams to identify potential vulnerabilities, develop an action plan and make the investments needed to protect the value of their organization.” The study looks at how cyber trends have evolved since Raytheon first sponsored the research in 2015. It also asks security professionals in the U.S., Europe, Middle East and North Africa to identify future trends
Key findings include: ●● 82% of respondents predict their workplace will suffer a catastrophic data breach in the next three years as a result of unsecured IoT devices. 66% say such an attack would seriously diminish shareholder value. ●● 67% believe cyber extortion such as ransomware and data breaches will increase in frequency and payout. ●● 60% predict nation-state attacks against government and commercial organizations will worsen and could potentially lead to a cyber war. ●● 46% believe their cybersecurity strategy will improve, down from 59% in 2015. ●● 60% expect their companies will have to spend more to achieve regulatory compliance and respond to lawsuits and litigation. over the next three years. Despite growing concerns about sophisticated and persistent cyber threats, only 36% of respondents believe senior leadership consider cybersecurity a strategic priority. Senior leadership are also seen as seemingly disengaged in the oversight of their organization’s cybersecurity strategy with 68% of CISO/ IT executives surveyed saying their Boards are not being briefed on measures taken to prevent or mitigate the consequences of a cyberattack. “Conversations around cybersecurity resiliency are happening among our nation's top intelligence chiefs, yet business leaders still have not made cybersecurity a business priority,” said Dr. Larry Ponemon, Chairman and Founder of Ponemon Institute, “This important research reveals an urgent need for executives SecurityLink India ■ March 2018
to appropriately address cyber threats against their organizations.” Raytheon Company is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 96 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. The Ponemon Institute is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors, and verifies the privacy and data protection practices of organizations in a variety of industries. 47
application/ case study
Assists SGMW Motors, Indonesia in Producing State-of-the-Art Vehicles Submitted by HIKVISION
S
pecified to provide a comprehensive security, health & safety and production management tool, SAIC General Motors Wuling (SGMW), is now operating a Hikvision based HD surveillance system at one of the world’s newest vehicle manufacturing plants. Established in 2002 by a joint venture and investment between SAIC Motor Corporation Ltd, General Motors and Guangxi Motor Corporation, SGMW is now an annual producer of 1 million commercial vehicles and passenger cars, including MPVs. SGMW has recently opened a third manufacturing plant located in Bekasi, Indonesia to meet its ambitious automotive production plans. Costing USD700 million, the new factory is built on a massive 60-hectare site and is expected to contribute to the creation of some 10,000 local jobs, producing its first vehicles under the Wuling brand. To provide the level of intelligent camera functionality and surveillance management required to meet the demands of the state-of-the-art SGMW
factory project, the automotive manufacturer enlisted the help of Hikvision distributor, Prima Inovasi Teknologi.
Smart surveillance
I
nstalled by Autojaya, the 172 Hikvision full HD smart video surveillance camera based system was designed from the outset to deliver the high quality of imaging and intelligent functionality required by SGMW. Integrating full HD capture, recording, decoding and display, the system utilises IP transmission over a local fibre video private network (VPN). Using a mix of Hikvision DS-2DF8223I-AEL 2MP WDR Darkfighter IR PTZ cameras with smart tracking & detection, DS-2CD6026FWD/ E-L ultra-low light Smart Darkfighters, DS-2CD4A26FWDIZ 2MP smart low light cameras and DS-2CD6986F-H 8MP multi-imager panoramic dome cameras with 180° horizontal view, the HD camera system supplies ultra-detailed imaging of every key internal and external factory location.
Across the entire site, the full HD smart camera network provides effective scene coverage and VCA alarm activation, providing HD imaging and automated situation alarm handling for the factory’s vehicle production areas, components warehouse, restaurants, data centre, offices, perimeter fence line, and exit & entry points, via a bespoke ANPR subsystem. Along with the HD surveillance cameras, the system uses Hikvision DS-3E1318P-E Web-managed PoE switches, DS-6916UDI HD decoders and DS-96128NI-I24 128-channel super 4K NVRs with up to 12 megapixel resolution recording, multi-format video encoding and HDD hot swappable storage to deliver ‘live’ and ‘recorded’ camera images to the factory’s Control Centre. To maximise the high level of image detail the HD cameras deliver, the system’s camera images are displayed on two massive video walls, consisting of multiple Hikvision DSD2055NL-B LCD HD ultra-slim 55” display monitors.
E-Map control
A
t the Control Centre, SGMW operatives view the entire factory site on a 3D electronic E-Map render, with intuitive smart control provided by Hikvision’s iVMS-5200 Enterprise Software. Using the 3D site map, operators can easily locate and select any system camera, and control specific camera live or recorded video, along with video preview of triggered alarms, 48
SecurityLink India ■ March 2018
application/ case study
with their precise locations displayed via graphical icons on the factory EMap. Using the Enterprise Class Hikvision HD camera based system, operators can monitor in real-time, every stage of the vehicle production line process in finite detail. In the event of an incident or anything unusual taking place, the operators can react quickly, and select and review video information for analysis and reaction to the case, to keep vehicle production safe, whilst maintaining production and management efficiency.
Multiple applications
T
he system’s archived video data can be accessed for use by many factory departments, to provide visual informa-
tion to remedy specific problems and support improved manufacturing and management efficiency, as well as the factory’s health & safety environment. Vehicular traffic is managed by a separate Hikvision ANPR subsystem with automated whitelist and blacklist alarm management, to ensure fast and smooth traffic flow in and out of the factory. “The Hikvision surveillance system supports SGMW’s site-wide management needs across many disciplines,” comments Bella, Lead Engineer of SGMW, “Using the cameras for multifunctional applications enriches the efficiency, security and implementation of best practice management across the whole factory, paying back its initial
return on investment and operational value many times.” “The system’s end-to-end unified hardware and software delivers advanced situation awareness of the factory’s personnel, vehicle production line, paint shop, data centre, offices and finished vehicles storage,” explains Arijanto, Director of Autojaya, “Using Hikvision Smart camera VCA alarm functionality, the system has been configured to provide the highest level of protection and safety for factory personnel, assets and site facilities. Any unauthorised access attempt to the site’s perimeter or internal restricted areas are all covered by the system, offering advanced protection whilst reducing the number of security guards needed.”
Protecting Moscow Sheremetyevo International Airport Smiths Detection confirm order of 91 advanced scanners for new terminals
S
miths Detection will supply a full range of security scanners for the new passenger Terminal B and Cargo Complex LLC (Moscow Cargo) at Moscow’s Sheremetyevo International Airport. The new facilities are part of the airport’s plans to handle the increased passenger volumes expected for the 2018 FIFA World Cup; and one of the most important stages in a larger-scale development of the airport, which will continue through to 2026. “In a relationship stretching back over 20 years, this is by far the largest single order we have fulfilled for Sheremetyevo Airport,” explained Tony Tielen, Vice President EMEA, Smiths Detection, “We look forward to help make the World Cup a safe and successful event and beyond that, safeguard the airport, its passengers and staff.” Negotiated by Smiths Detection distributor, NEOSCAN Russia, this substantial contract includes a total of 91 advanced Xray inspection systems delivering a broad array of screening functions, from passenger checkpoint and hold baggage through to cargo. It includes 30 HI-SCAN 5180si X-ray systems for screening passenger baggage at the entrance to the airport; 26 HI-SCAN 6046si checkpoint scanners for carry-on bags and personal belongings; and two HI-SCAN10080 XCT and four HI-SCAN 10080 EDX-2is for hold baggage. Seventeen HI-SCAN 100100T systems will screen larger, out of gauge items in the passenger terminal. In the Cargo Complex, seven HI-SCAN 180180-2is pro models will take care of large scale, consolidated and palletised goods; two HI-SCAN 100100V-2is scanners will handle break bulk and other cargo; and visitors will be checked using a further three HI-SCAN 6046si scanners. Terminal B has been developed for domestic airlines and is expected to cater for the potential 20 million passengers predicted to pass through the airport in 2018. The majority of equipment was installed by December 2017. SecurityLink India ■ March 2018
49
application/ case study
Argentina’s Vicente López District to Prevent Crime with
XProtect VMS Milestone XProtect video management software receives and distributes data from all of the municipality’s security tools, ensuring that information helps city officials make better-informed decisions
V
icente López, one of the 135 districts that make up the Buenos Aires province, started a project at the end of 2011 to modernize and expand the city’s video surveillance system. In addition to capturing criminal activity, the project’s main goal has always been to reduce crime through preventive measures. Stretching over 33 square kilometers, Vicente López is home to about 300,000 people. In recent years, the flow of population that moves through the district has risen considerably. Thousands move daily through the region on their way to and from the federal capital, via personal or public transport. These demands, together with other phenomena, made a high demand for the city’s video surveillance system to be improved. “Today, we have 1,000 cameras in public channels and another 100 connected in the local security guards’ and civil defense cell phones. In addition, we count on the urban monitoring center, the heart of our video surveillance system,
50
and ten local preventive detachments that use their own monitoring centers. This decentralizes security to key areas in the district,” said Martín Gasulla, Deputy Security Secretary of Vicente López while remembering that in the past the system had only 60 cameras, not all of which functioned properly. The city benefits from a wide array of cameras made by Pelco, Bosch and Axis Communications that range from PTZ to anti-vandalism, in both dome and fixed models. In addition, Vicente López has different alarm systems, panic buttons, lights and a digital dispatch console, which are connected to police cell phones.
Unifying technology
T
he project’s main challenge became finding a platform that supported all these security systems. “The first step was to unify the three existing video management systems into one, which worked until we reached a certain growth point, when we opted for a more robust solution,” explained Gustavo A. Vilches, Director of Exanet S.A., the integrator company involved. Exanet chose Milestone XProtect Professional video management software (VMS) to manage the project’s demand for a growing number of cameras. “One of this solution’s biggest advantages as an open platform that allows us to offer additional soluSecurityLink India ■ March 2018
tions to our clients,” Vilches explained. The Vicente López system is connected by fiber network optics: the cameras capture an image, the content moves through the network to the VMS and is displayed in the urban monitoring center, which also includes a data center and storage servers. Normally, the protected information remains there for 30 days, unless there is a special petition by judicial authorities or police to use or view it. Santiago Espeleta, Vicente López Secretary of Security says, “One of the biggest changes in daily operations is being able to integrate other solutions like analytics technology, which has led to better results for crime prevention and decision-making.” According to him, one of the project’s biggest challenges was the financing by public resources. “This is our residents’ money, and for this reason every decision was made extra carefully. We couldn’t afford the luxury of making errors, so we searched for top-of-the-line providers, analyzed them and made a decision,” he affirmed.
The advantages
A
ccording to district authorities, the objective between now and 2019 is to increase the video system to 1,500 cameras that record in full HD, 365 days of the year. Vilches says they are studying the possibility of upgrading to Milestone XProtect Corporate VMS to leverage its federated architecture.
application/ case study
The Odyssey Complex Upgrades IP Security Camera Visitor safety gets major boost at belfast’s premier events venue New system propels The Odyssey Complex into the future of security with low-light technology that assures superb image quality, even during concerts and sporting events
T
he Odyssey Complex, a premier entertainment venue in Belfast that plays host to many of the city’s high-profile concerts, exhibitions and sporting events, has installed a futureproofed IP security solution that ensures its 1,000,000 visitors each year can enjoy the facilities in a safe and secure environment. The vast 23-acre site comprises the SSE Arena; a pavilion including restaurants, shops and a cinema; the W5 Science and Discovery Centre; as well as a 1,500-space car park. The new system, consisting of more than 140 IP cameras from Axis Communications, replaces an analogue CCTV solution which was nearing the end of its technical life cycle. It produces better quality images and makes it easier for the onsite security teams to investigate crimes and identify individuals of interest. The IP camera system was installed by Diamond Systems, an Axis Partner and specialist in electronic fire and security solutions. The inclusion of HD IP cameras, which feature Axis’ innovative Lightfinder technology with extreme light sensitivity, provide security teams with more life-like colours in low-light conditions, vital within the arena during sporting events and concerts. Brian Hughes, Group Head of Facilities at The Odyssey Complex, states, “The safety of our patrons is of paramount importance to the complex, which
The Odyssey Complex in Belfast
is why we have taken this step to invest in a future proof system. Upgrading to HD IP camera technology made complete sense to us as we strive to maintain our status as the leading event facility in Northern Ireland. “Through the use of intelligent applications such as Lightfinder we can be confident that we have the technology to support our unique security needs. Working closely with Axis and Diamond Systems, we were also keen to ensure the system had capacity to include analytics in the future. This could include customer footfall and queue management, bringing benefits in terms of operational effectiveness, guest satisfaction and, of course, visitor safety,” says Steve Snoddon, Managing Director at Diamond Systems, “We installed the original CCTV system 17 years ago when the complex SecurityLink India ■ March 2018
was first developed. While providing value at the time, technology has progressed at such a rapid pace since that it was time for us to re-evaluate the technology available to support its requirements.” Peter Dempsey, Key Account Manager at Axis Communications, comments, “We wanted something that would not only incorporate today’s leading technology and maintain a high level of cybersecurity, but also prepare the complex for its security needs in the future. As the leading entertainment venue of its kind in Northern Ireland, the Odyssey’s security requirements are continuously evolving. Our commitment to really understand the business, and partnering with organisations such as Diamond Systems, ensured we could deliver a solution that was tailored to its needs.” 51
application/ case study
Protecting Physical Security Against the Threat of a Cyber World The rapid gains technology has made into everyday living has also changed how the security industry operates. In short, systems have moved from being very simple inputs and outputs that turn on bells, to now being alwaysconnected devices making the industry very much part of the IoT world. Of course, this leads to the question – how does physical security protect itself from cyber vulnerabilities? Who protects the protector, so to speak
T
his ethos has changed how Vanderbilt think over the last few years when designing and developing their own security systems, in particular SPC. FlexC, the company’s communications protocol, was redesigned from the ground up solely with cybersecurity in mind. The entire protocol has been designed to ensure everything is encrypted, all communications are monitored, and multiple types of attack are considered for defensive purposes to provide the best security possible.
Multiple lines of defense
S
PC has built-in protection mechanisms whereby if the system is attacked, it will go into protection mode. The system will remain operational and it will still be able to communicate out, but it will start to shut down elements of itself to protect the system from the
52
attack. Again, no system is completely invincible. SPC has also been designed so that should an attack penetrate, the system has multiple communication paths available as backup. Therefore, if one server is taken down the system can immediately switch to a backup server and then switch communication paths to bypass the attack and ensure messages are still operating successfully.
Best practices
T
echnology in day-to-day life might be growing at a rapid rate leading to fears of potential security breaches. But
SecurityLink India ■ March 2018
one must remember that technology’s growth also means that security defenses are developing in parallel. At its core, security is about being continuously observant, always following best practices, and being ready and able to react against a security issue. Best practices to combat the threat of a cyberattack can be quite straightforward. The most obvious place to start is to choose equipment from reliable suppliers that have a knowledge and interest in cybersecurity and are focused on protecting data. It might sound simple but buying products with a built-in security focus greatly reduces the risk of a cyber attack. When your security system is designed from the ground up to protect against cyberattacks, then naturally your organization will be in a much better place.
application/ case study
Protecting Drivers and Goods Euro Rastpark – Premium Parking Areas
I
n recent years, a particular form of criminality has become more widespread on Europe’s major highways: the theft of valuable commercial goods, vehicles and their cargoes. The financial cost is enormous: German insurers pay an average of a million euros per business day for lost commercial goods alone. On top of this, property damage must be considered, and no less important are the threat and uncertainty felt by many drivers. Even the fuel tanks on lorries have been targeted by organised crime, and accordingly theft of fuel has become a regular cause of annoyance to drivers and hauliers alike. In recent times, the police have been called to investigate as many as nine criminal offences a week at the Theeßen Euro Rastpark on Eastern Europe Route A2. The company has recorded high crime rates elsewhere too. Respected logistics companies were even compelled to warn their driving personnel about less safe routes. The situation could not be allowed to continue, and Euro Rastpark began working with other members of the Association of German Off-motorway Truck Stop Owners (VEDA) to combat the problems by developing a security concept that addressed actual conditions.
The solution: Premium parking areas
E
uro Rastpark now offers premium parking areas that are screened and monitored according to VEDA standards for lorries at seven of its truck stops. Their aim was to develop a security solution that could be implemented quick-
ly and without prohibitive expense. Managing director Johannes Witt explains the concept, “We have not relied on expensive construction, but rather on pragmatic detection and deterrent measures such as restricted approach roads, the best possible lighting and complete documentation of all movements by vehicles and people.” For the full-coverage detection of all movements, they decided to use an economical and top-quality video observation solution offered by another Regensburg-based company, the technology pioneer Dallmeier. Accordingly, DF5200HD-DN/ IR type high resolution infrared cameras have now been deployed to improve security on the approach and departure roads to the separate lorry parking areas at the Theeßen Euro Rastpark. The video system is set up so that the vehicle licence plates are clearly readable not only by day, but also in night recording mode. The video data is backed up reliably by the DMS 2400 appliance, one of the most powerful recording solutions in Dallmeier's inventory. During the project, Euro Rastpark seized the opportunity and commissioned Dallmeier to install cameras for observing the refuelling lanes as well as the retail area and cash registers in the service station shop. In all, 24 camera systems are now operational and SecurityLink India ■ March 2018
between them they monitor all critical areas. The 96 lorry parking spaces at the Theeßen truck stop now constitute a further precinct of safety and calm within a zone that is fully protected by video technology.
Protection for drivers and goods
T
he number of thefts of vehicles, goods and fuel from the secured parking area has fallen dramatically. These new security zones also mean that the drivers can work with more peace of mind, since they do not have to worry about the safety of their valuable cargoes, or even their personal safety on top of the normal cares of a demanding job. “Since we started this initiative, the number of robberies has fallen massively,” confirms Witt. More protection and comfort for drivers, theft prevention for goods and operating equipment – video technology from Dallmeier ensures that the logistics chain does not break down on the roads and highways. 53
application/ case study
Ted’s Pawn Protects Customer Assets With Verified Video Surveillance Sophisticated technology catches would-be thieves before they can do damage
T
ed’s Pawn, located in Norwood, OH, has successfully been using video verification technology to reduce false alarms and catch the bad guys before they’re able to gain entry to the store and adjoining storage lot. “Ted’s Pawn has been a long-time customer for us,” explained Wayne Lisle, VP and GM for Sonitrol SW Ohio, “They’ve had analog video surveillance for about eight years, and we had been utilizing audio verification of alarms for the inside of the store. The outside lot was a different story.” The Ted’s Pawn outdoor lot is filled with vehicles, motorcycles, boats, and high value items that they must protect. “We wanted to do video verification for the lot,” said Lisle, “but until recently there were many challenges – complicated installation, connectivity, reliability, and eliminating false alarms.” “Now with a 3xLOGIC hybrid DVR, we can use analytics to associate existing outdoor cameras – two cover the yard, two cover the shop’s roof – to the Sonitrol panel and seamlessly provide video
54
alarm feeds to our Sonitrol central station to detect and verify any threat. Going forward, Ted’s can install IP cameras and even thermal cameras to the existing network covering the lot.” In the most recent incident at Ted’s, the Sonitrol operator received a video alarm feed showing a man entering the outdoor lot. The operator dispatched police and the suspect was apprehended in short order. “One of the most important aspects of our business is taking care of our customer’s valuable items,” said Ralph Tincher of Ted’s Pawn Shop, “One of the ways that we’ve taken the extra step to ensure we’re taking care of their precious goods is partnering
SecurityLink India ■ March 2018
with Sonitrol Verified Video security. Years ago, at our former location we had a break-in. The thief was able to get into the building and do some damage. After talking to other members in our industry, we found out there are ways to catch thieves before they get into your building.” “Here at our new, larger location where we deal with a lot of high-dollar items, we’ve had three attempted breakins in the last six years. Every single time, thanks to Sonitrol verified video, powered by 3xLOGIC technology, those thieves were caught before they got anywhere near to entering the building,” Tincher concluded.
application/ case study
Bringing D/N High-Resolution Vision to Cars
S
TMicroelectronics, a global semiconductor provider serving customers across the spectrum of electronics applications, and AdaSky, an Israeli-based start-up bringing far infrared (FIR) technology to the automotive market to enable vehicles of tomorrow to see further and better, has announced a collaboration, in which AdaSky’s FIR thermal camera embeds custom silicon co-designed with and manufactured by ST in its proprietary 28nm FD-SOI manufacturing technology. The complete sensing solution from AdaSky, called Viper, aims to enable autonomous vehicles to see and understand the roads and their surroundings in any condition. ●● Far-Infrared thermal camera extends ADAS sensor fusion capability with a new layer of information, paving the way to fully-autonomous driving in any condition.
●● P rototypes are now under evaluation by carmakers with initial production targeted for 2020. Having complete sight and perception of the roadway, other vehicles, roadside infrastructure, and obstacles, especially in challenging lighting or weather conditions, is fundamental to the safe operation of next-generation autonomous cars. To achieve 24/7 autonomous driving, vehicles will rely on the fusion of complementary information streams provided by different sensors. No sensor or camera in operation today can capture all of the information on its own and each has challenges in certain lighting or weather conditions. Passive infrared vision, like that in AdaSky’s Viper, when used in a fusion solution, can help close the gaps to provide accurate sight and perception without fail in dynamic lighting con-
ditions, in direct sunlight, in the face of oncoming headlights, and in harsh weather. The new camera uses an FIR microbolometer sensor to detect the temperature of an object. In an ADAS solution, Viper uses proprietary algorithms based on Convolutional Neural Networks to classify obstacles and show them in a cockpit display to give the driver an early warning. This warning comes several seconds earlier than it would when using a conventional sensor in the visible wavelength and is even faster than what is possible with the human eye. Viper has been designed in ST’s proprietary 28nm FD-SOI manufacturing technology and uses ST IP that is fully qualified for automotive applications. Prototypes are under evaluation by carmakers, targeting a start of production in 2020.
New Turret Cameras Offering unique advantages for retail and hospitality use
V
icon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components, is now shipping its new 2MP and 4MP turret cameras, ideal for retail and hospitality applications. The V930D and V9500D Series are turret, or ‘eyeball,’ cameras featuring H.264/ H.265 compression, wide-dynamic-range, IR LEDs and low-light capabilities. They can be surface, wall or ceiling mounted, are suitable for indoor and outdoor use, and offer extreme ease-of-installation and adjustment due to their innovative form factor. Turret cameras offer the compact size, mounting flexibility and 360 degree range of camera domes, but with the ease-ofpositioning and extended IR range of a bullet design. In addition, the lack of a clear dome housing improves image quality by eliminating the reflection of IR LEDs that can ‘bounce’ off the inside of the dome and condensation that can form on the exterior. For retail and hospitality applications, where cameras are often ceiling or in-ceiling mounted, turrets offer aesthetics similar to dome models but easier access for positioning and maintenance. They are also affordable for installations that require large quantities for use throughout an entire facility. “With the introduction of an entire new line of H.265 cameras, we are pleased to include these turret models, which offer customers a unique set of benefits related to performance and usability, and do so at a very cost-effective price point,” said Bret McGowan, Senior V.P., Sales & Marketing. SecurityLink India ■ March 2018
55
application/ case study
Protecting Solar Power Station, Belarus S
olar Power Station at Bragin was built in August 2016 and is currently the biggest solar power facility in Belarus. Its power capacity amounts to 18.48 MW with an area equal to 60 football fields. The project is implemented not far from Chernobyl and serves as an example of alternative development of the territories affected by the nuclear disaster. Solar Power Station at Bragin has won the nomination ‘Technologies and projects based on renewable energy sources’ and also the 1st place at the Republican contest ‘Leader of Energy Efficiency 2016.’ Uniview provided video surveillance solution for the Solar Power Station.
Solution highlights
●● Anti-static: Usually, a power station generates a lot of static which would influence devices’ working. UNV IP cameras are all certified by CE and tested through ESD (Electronic Static Discharge). All of cameras are able to bear 4KV contact discharge and 8KV air discharge which are in the highest level of the industry. ●● The project used NVR516 which features 32/ 64ch strong decoding ability and redundant design, and RAID for the highest level data safety. ●● Perimeter protection: UNV IP cameras are mainly used along the fence. Occupying such a huge area, it would be difficult for security staff to discover if someone breaks into the area. With intrusion detection, UNV IP camera would send and alarm within seconds and help security staff react quickly.
56
SecurityLink India ■ March 2018
Protecting Cheshire Service’s Entire Estate Chubb wins significant contract with Cheshire Fire and Rescue Service for 32 locations
C
hubb is helping to protect employees, visitors and property through a significant new contract with Cheshire Fire and Rescue Service to install, upgrade, maintain and monitor fire alarm systems throughout the Service’s entire estate. Chubb, a leading provider of security and fire-safety solutions, is a part of UTC Climate, Controls & Security, a unit of United Technologies Corp. Michael Johnson, Environment, Energy and Engineering Officer, Cheshire Fire and Rescue Service, says that Chubb was chosen over four other suppliers because it scored highest against benchmarked requirements: “The presentation was highly informative and professional, which has proven to be the hallmark of the service we receive from Chubb,” said Michael. The contract includes 28 fire stations, two community safety centres, Cheshire Fire and Rescue’s Sadler Road site and the new innovative safety centre based in Lymm. Each site is a different size and specification, requiring detailed individual assessments. Some stations required new custom systems to be de-
application/ case study
signed; in other buildings, existing systems were upgraded. A combination of addressable fire alarm systems and conventional alarms were used, depending on the individual site’s requirements. “The fact that Chubb is a national brand with a local office was another important factor in our supplier decision. The service we have received has been second to none. Communication has been excellent with regular updates, and challenges were met with a common sense approach. I felt my requirements were always championed by our Chubb account manager. We have found that the customer is at the forefront of the Chubb approach,” said Johnson. The primary goal of the new contract is to ensure all sites meet BS5839 L2 fire alarm safety standards. These standards are designed to provide automatic fire detection on all escape routes within a building and rooms leading onto those escape routes. For Cheshire, it was also important that the supplier have the expertise and capacity to complete installations and upgrades on a very tight deadline. “The Service has been extremely impressed with the speed in which the contract has been mobilised. Even though we needed to add another fire station, all works were completed safely,” said Johnson. All alarms are monitored by Chubb’s alarm receiving centre, which notifies keyholders and relevant emergency services if a fire is detected and alarm raised. The contact also includes maintenance and servicing requirements.
WYP Demonstrates UK-First Biometrics Technology N
orthern England’s West Yorkshire Police has gone live with real-time, automated, mobile biometrics technology from Motorola Solutions. Following a recent demonstration, it will now roll out to 250 frontline police officers. The application runs with Pronto, which delivers comprehensive and flexible mobile information solutions to police forces across the UK. West Yorkshire Police is the first to implement the biometrics solution, which will allow officers to check fingerprints against national fingerprint database records in less than a minute. It does this via handheld scanners that attach to an officer’s phone, which then accesses a new Biometric Services Gateway system. West Yorkshire Police is the fourth largest police service in the country, serving approximately 2.2 million people in rural areas and large metropolitan districts such as Bradford, Leeds and Wakefield. ●● Fingerprint scanning added to Pronto mobile application suite that is used by a third of UK police forces. ●● Real-time access to digital database streamlines workflow and improves accuracy. Until recently, identifying or collecting data from individuals involved costly outdated devices and paper-based processes. This new system, developed in partnership between West Yorkshire Police and the Home Office, is available via the force’s existing mobile devices and allows access to the live database from the field to get results in real time. This creates a seamless workflow by removing the need to travel between the field and office or station to process information. As officers are able to obtain the right information about suspects quickly, accuracy is also greatly improved. “Almost instantly after deployment we found how valuable rapid biometric identification can be,” said Ian Williams, Chief Inspector, Digital Policing lead for West Yorkshire Police, “We have already been able to identify a seriously injured individual, enabling medical staff to quickly offer accurate treatment and contact the family. In another case, we’ve identified a disqualified driver, summoned him to court and seized his vehicle on the scene – all without the need to travel to the station and practically disable an Armed Response Vehicle for hours.” “Biometrics is an exciting addition to the Pronto offering and demonstrates the type of advancements that will see the complete digital transformation of public safety agencies. West Yorkshire Police is at the forefront of this shift, along with the other 17 forces using Pronto to work more effectively and collaboratively,” said Phil Jefferson, Vice President for Western Europe and North Africa, and Country Manager UK and Ireland at Motorola Solutions. The biometrics capability builds on the success that the force has already seen with Pronto, namely crime scene investigation applications, which was recognised at the Public Sector Paperless awards last year with a win in the ‘Process and Workflow – Project of the Year’ category for its use of digital technology to support all frontline policing. SecurityLink India ■ March 2018
57
application/ case study
Raising the Bar on Security for Campus S
afety remains a critical concern for schools with violence, burglaries and shooting incidents appearing frequently on the headlines. To capture, alarm, track crimes and create safer learning environments for students and faculties, schools are progressively looking toward integrated and smarter surveillance solutions. Surveon provides education solutions with complete product lines, including high-resolution cameras with extremely low RMA rate, NVRs with premium-grade RAID function as well as feature-rich VMS with real-time video analytics and notifications, ensuring rapid and accurate actions can be taken to protect the students and faculties from threats in time.
Intelligent cameras with immediate alert
I
n order to upgrade and design a suitable system for schools, system in-
58
tegrators might face some challenges such as wide area monitoring and the integration of access control. Surveon’s 3MP cameras provide 1.5-time larger area coverage at 30 FPS and support 3-axis adjustment for flexible hardware installation, offering the best C/P value solution for monitoring wide area. Moreover, Surveon’s Video Analytics Series cameras can be installed for areas that might need extra attention, such as hallways or building entrances, to send the immediate alert for possible actions if any.
RAID NVR with solid data protection
A
reliable storage system that supports 24/7 continuous recording is necessary for school projects. Surveon NVRs provide patent RAID protection and allow partners to easily expand the storage via local SAS port
SecurityLink India ■ March 2018
or iSCSI interface to fulfill the demand of campus surveillance.
Enterprise VMS with multi-access management
S
urveon Control Center (CMS) can collect data to receive events such as intrusion detection and fire alarm with high I/O, warning the teachers and students across departments and make things under control. The multiple accesses from web, remote, and mobile clients allow security guards to manage surveillance from every concern of the school so that incidents such as theft and vandalism can be stopped in time.
Smooth integration with access control
S
omeschools might have campuses more open than the others in terms of boundary so school authorities expect the surveillance solution to offer one easy and consistent access, making security system more efficient on campus. Surveon’s products are fully compatible with major third party access control systems, providing both efficient and economical solution for school surveillance. Surveon’s education solutions have been successfully safeguarding the Kainan University in Taiwan. “The megapixel video quality and industrial grade designs of Surveon cameras were already very attractive to us. However, we were absolutely sold on the versatility of the CMS solution. We believed this type of setup was beyond our price range before being presented with Surveon’s solutions.” said the partner in Taiwan.
application/ case study
Keeping Passengers and Vehicle Safe for Istanbul City Lines Ferries Challenge
W
ith over 166 years’ experience of seaports, ships and ferries, City Lines offer comfortable and safe sea transportation services to tourists and those who live and work in Istanbul. Over 150,000 passengers use City Lines services every day. Having decided to offer a new ferry service between Istinye and Cubuklu, which are both part of the Istanbul conurbation but on different sides of the Bosphorus, City Lines asked security systems integrator InfoMET Technologies, to recommend video surveillance cameras which could help keep passengers and the ferries safe and secure. The cameras would be required to cope with sea conditions as well as capture high resolution images day or night.
Solution
2
50 Wisenet cameras have been installed throughout 20 City Lines ships. In addition to keeping a close eye on passengers, the cameras are also used to monitor the movement of 2,000 vehicles which are transported daily and are a valuable navigational tool for captains, as they enable them to view blind spots which cannot be seen from the bridge. The majority of the 250 cameras installed are Wisenet QNO-7080Rs which are part of the Wisenet Q series. These 4 Megapixel bullet cameras have built-in IR illumination and are packed with innovative features such as H.265 compression and WiseStream, a complementary compression technology
which dynamically controls encoding, balancing quality and compression, according to movement in the image. When WiseStream is combined with H.265 compression, bandwidth efficiency is improved by up to 75% compared to current H.264 technology. This ensures the Wisenet Q series is one of the most bandwidth friendly camera ranges available. The QNO-7080R also features Hallway View, True Wide Dynamic Range, Tamper Detection, Defocus Detection, and Lens Distortion Correction, to deliver optimized images in every situation. Hallway View provides a highly effective way to monitor narrow vertical areas such as corridors, tunnels and aisles. It enables cameras which can generate images in the 9:16 x 3:4 aspect ratio, to work effectively in tall and narrow spaces.
Result
“
One of the biggest factors in choosing Wisenet cameras is they do not have any problems in the environments we operate,” said Cuneyt Danaci, IT Specialist for City Lines, “Equally important, whilst we did not want to compromise on quality, we needed cameras which had a high price/ performance ratio. Wisenet came ahead of many other camera brands in respect of price, perSecurityLink India ■ March 2018
formance and technology and it is one of the reasons why we are thinking of working with Hanwha Techwin on other new projects in the future.”
Partnership in trust is our success key
“
We had worked with Hanwha Techwin on other projects and we were confident they would be able to provide cameras which would be able to deal with the demanding conditions such as salty water vapor and a high level of vibration,” said Oguzhan Kahraman, Project Engineer, InfoMET Technologies, “The pre-sales team for Hanwha Techwin in Turkey were extremely helpful and were able to recommend the best Wisenet camera models for each required camera location.” 59
application/ case study
Advanced Technology for Rail Project in Malaysia Innovative communications system will make daily transportation services smooth, safe and reliable
M
otorola Solutions will help make daily rail transport in Malaysia safe, efficient and reliable for the country’s first Klang Valley Mass Rapid Transit (MRT) line. The landmark rail modernisation project will bring significant benefits to Malaysia, including greatly improved transport services while reducing traffic congestion in the Greater Kuala Lumpur metropolitan area. As a technology partner to the APLG consortium, Motorola Solutions will deliver a highly secure and reliable TETRA two-way radio communications network for the project. The 51 kilometre SBK line comprises 31 stations including seven underground stations. It is part of an integrated mobility project that will provide seamless urban transportation for 1.2 million residents in the Greater Kuala Lumpur and Klang Valley region. Modern rail transportation systems are vital to economic growth. According to professional services firm PwC, transport infrastructure investment will grow by around 5 percent globally to 2025 with Asia Pacific being the largest transport infrastructure market. Byung Il Park, Project Director for the APLG consortium said, “Cooperating with Motorola Solutions enables our companies to combine their local and global expertise. Working together, we will deliver a highly-customised communication system providing timely and secure transportation services for the Malaysian public.” Datuk Mohd Rauf Nasir, Country President, Motorola Solutions Malaysia said, “Resilient and reliable communication will ensure the Klang Valley Mass Rapid Transit (MRT) line project is delivered without compromising the safety of commuters and rail workers.” “Throughout the project’s four-year construction and into its daily operational use, our communication network will provide security, safety and convenience for workers and users of the urban transportation system,” said Datuk Mohd Rauf. Motorola Solutions will supply, design and install the complete, digital two-way radio communications network for the new MRT line, including more than 500 TETRA radio devices and base stations. “Motorola Solutions has a strong track record of innovation and exceptional engineering talent in Malaysia. This is the first time that our all Malaysia-based team of engineers will manage an entire metro rail project from end-to-end,” said Datuk Rauf. Public rail transportation represents a key part of Malaysia’s economic development program in the Kuala Lumpur and Klang Valley area with two additional MRT lines proposed under the Klang Valley MRT project. Line 2 is expected to be completed by 2022. 60
SecurityLink India ■ March 2018
FAU Secures College of Medicine with C•CURE 9000
F
lorida Atlantic University, based in Boca Raton, Fla., has selected the Software House C•CURE 9000 security and event management platform to secure a new building that is part of the Charles E. Schmidt College of Medicine, a facility which houses research, administration, and a medical clinic. Florida Atlantic University is one of 12 schools that is part of the state’s university system. The Boca Raton campus boasts 3,200 faculty and staff, providing educational services and support to 4,000 students. The College of Medicine, though small in size with 373 students, required a robust access control system that enabled the integration of video surveillance and the ability to partition access to specific areas of the facility. With C•CURE 9000, Florida Atlantic University can easily manage
application/ case study
student access to classrooms and laboratories, which can range from 24-hour access to the building to limited facility access during examination time. In addition, the university needed to restrict access to medical record rooms, the pharmacy and other sensitive areas. The access control system is also part of the Florida Atlantic University’s Schmidt Biomedical building, with C•CURE 9000 providing coverage for all exterior entrances, research labs and elevators leading to animal research floors and the anatomy labs. According to Patrick Garmon, Director of Security Technology for Florida Atlantic University, it was important to implement a system that enabled the university to manage student access to buildings by floor and room, not just to restrict overall building access. “Florida Atlantic University has harnessed the vast capabilities that C•CURE 9000 has to offer when it comes to security and access control management,” said Jason Ouellette, Global Product General Manager, Access Control, Building Technologies & Solutions, Johnson Controls, “Whether managing access to laboratories, the pharmacy or medical records, C•CURE 9000 provides flexibility to easily manage and adjust the system based on current needs.”
U.S. Customs and Border Protection Accepted
Third Successfully Deployed Border Security System U
.S. Customs and Border Protection (CBP) accepted the latest Integrated Fixed Tower (IFT) border security system deployed by Elbit Systems of America, LLC. This IFT system, located in the Sonoita, Arizona, Area of Responsibility (AoR), marks the company’s third successful deployment of the system. Other previous deployments of IFT accepted by CBP were for the Douglas and Nogales, Arizona AoRs. “Our advanced technologies provide U.S. Customs and Border Protection with trusted border security capabilities,” said Raanan Horowitz, President and Chief Executive Officer of Elbit Systems of America, “America’s Border Patrol agents rely on our operationally proven solutions for greater situational awareness and enhanced safety.” As the system integrator, Elbit Systems of America furnishes the sensor towers with radar, day/ night cameras, and command and control software that combines data into a single operating picture. Information from all the towers is networked into Border Patrol Station command and control centers, which increases situational awareness for Border Patrol Agents. IFT has proven to be a reliable system and provides CBP with 24/7 surveillance coverage. The system also provides CBP with a platform to integrate existing and future sensors to further improve border protection and agent safety. On the path to system acceptance, significant milestones must occur. Several months of construction, integration, test activity, and system verification ensure each IFT meets performance requirements. Each system must detect, track, identify, and classify border activity. Elbit Systems of America continues to meet customer performance and schedule requirements, as well as adhering to cost goals for this program. SecurityLink India ■ March 2018
61
application/ case study
UK Public Transport Security To benefit from growing shift from forensic to real-time video surveillance
A
move away from legacy analogue CCTV technology to IP video solutions will enable critical transport networks to effectively deter, detect and delay threats to ensure passenger safety. More than 85% of transport net-
works across Western Europe are planning to install IP cameras in the near future. That’s according to a recent survey commissioned by Axis Communications, the leading provider of network video and audio technology, in partnership with the global public transport organisation The Union Internationale des Transports Publics (UITP). Globally, the transport industry has led the way in using network video for both security and commercial applications. IP video surveillance is also increasingly playing a crucial role in the smooth and efficient running of significant parts of the UK’s rail network, highlighted by the successful deployment of network camera technology at Canary Wharf Station. This helped the station 62
facilitate 24-hour rail operations and improve passenger safety. The shift to IP video surveillance is helping operators utilise real-time analytics to enhance decision making, ranging from common platform changes to the more infrequent critical scenarios such as a station clearance in response to a security threat or other emergency. For example, machine learning technology is helping turn vast transport surveillance infrastructures into live monitoring systems. This software identifies what is ‘normal’ activity within a scene, automatically creating an alert if ‘abnormal’ activity is recognised. However, despite this migration trend, the UK has struggled to keep pace with developments in such technologies. Although 97.3% of survey respondents said they had some degree of video surveillance installed, 66% cited either other priorities, funding difficulties, or no clear business case as the main barriers for not investing in more innovative IP technology. Interestingly, approximately 75% of those who responded no clear business case relied on outdated analogue technology to meet their surveillance needs. SecurityLink India ■ March 2018
Lucas Young, Business Development Manager, Transportation, Axis Communications states, “These results are incredibly important. The perceived lack of a business case highlights that many transport operators are unaware of the security and efficiency benefits realtime video surveillance can offer. To respond to security events as and when they happen; a proactive rather than reactive approach is required. That just isn’t possible with legacy CCTV equipment. “When analysing security footage in real-time with advanced IP technology, operators are faced with hundreds of live feeds. This may seem daunting, but automated alerts can assist in managing the increased amount of data real-time video creates, helping to identify potential threats as they happen, preventing them from becoming security incidents. This is also freeing up staff time, so they can concentrate on improving the passenger experience.” Lucas Young continues, “While the benefits of connecting once offline technologies to a network creates an array of benefits for transport networks, it is also important to note that all devices connected to the internet are potentially vulnerable to cyber-attack. Cybersecurity is a huge issue for the transport industry and could prove a costly oversight if technology is not implemented correctly. We aim to protect our transport networks not only from physical threats, but also online ones.”
application/ case study
University in Uruguay Achieves High Quality Security Leveraging Existing Equipment, at a Lower Cost
W
hen moving to a new headquarters four times larger, the School of Information and Communication of the University of the Republic of Uruguay in Montevideo needed to implement a video monitoring system that provides high performance and reliability. The University is a structure of 8,500 square meters and four floors that now house nearly 4,000 students, 200 teachers and 80 administrative and logistics staff on a daily basis. As Yonathan Benelli, IT Manager at Udelar states, “The new headquarters greatly increased the vulnerability points for security. Without a video system like the one now implemented, it would be unfeasible to maintain an acceptable level of security.” Benelli adds that despite the need for a professional video surveillance system for the educational institution, it was unthinkable to carry out a traditional CCTV installation with coaxial cabling, due to its high cost. Therefore, the installation of a Milestone IP video management system within the existing IT network infrastructure versus performing a coaxial interconnection resulted in a very significant cost reduction. The savings were not only in technology acquisition, but also in hardware and human resources. “We estimate that without this system, we would have needed at least four added employees dedicated to surveillance. Also, we took advantage of existing hardware,” said Benelli.
A custom-made solution
F
oxsys, the company managing the technology integration for this project, proposed the implementation of the XProtect Professional solution from Milestone Systems. It is an open interface application designed for IP network video management software with easy, intuitive and powerful functions. The XProtect Smart Client interface has advanced search tools that combine with an easy-to-navigate video timeline, allowing users to quickly and accurately examine events. It also offers sophisticated export options, including the Storyboard feature, which helps consolidate relevant video evidence to gain a complete view of incidents. According to Juan Martín González, Commercial Director of the Foxsys Integrating Firm, “The XProtect Professional software was selected because of the system’s alarm notifications which were important in this application.” He said the solution was complemented by two virtual machines that operate on an HP server and are managed by the software Promox, which proved highly reliable. Digital Watchdog and Hikvision cameras were used. “In particular, the DW cameras allowed us to have a 180-degree panorama of some specific areas and the HK cameras were extremely useful because Milestone recognizes the video analytSecurityLink India ■ March 2018
ics’ algorithms of crossing a perimeter line that run in the camera. A data network was implemented on Cat 6 UTP and HPE PoE 1920 switches. In terms of storage, we used the NAS QNAP brand with eight bays of 4TB each, implementing a RAID 5 for more protection and data writing speed. We were surprised how well Milestone worked on a Proxmox virtual machine,” says Gonzalez.
Advantages and high satisfaction
“
The implementation was a success in every sense, not only from the point of view of the service provided by the system, but also by the guidance, suggestions and labor that the company provided beyond the installation and configuration, in which all the required and additional goals were met,” concluded Benelli. 63
feature
The Value of Surge Protection for Surveillance System in Multiple Sectors A
t first glance, warehouses, sports stadiums, datacenters, convenience stores and healthcare facilities may not have much in common. Yet, they all house expensive equipment including security equipment, that is at risk due to power surges that can damage, degrade or destroy that equipment, and result in downtime and financial losses. While insurance may cover the cost of repairing material damage to a security system, the downtime is often not covered by insurance and can quickly surpass the cost of surge protection devices or the cost of the damaged equipment. The protection provided by a surge protector on a security system and its devices is essential to protect and to lengthen the life of a physical security system. Surge protection needs to be
64
an integral element of the planning and design of a security system and not just an afterthought. It’s also key to choose the right surge protection that will not only deliver the right level of electrical absorption to handle regular spikes and surges, but will also work for specific situations and sector requirements.
Warehouses
M
any businesses that need to keep a large array of merchandise on hand maintain and operate immense warehouses with significant infrastructure requirements. For many warehouses, refrigeration is an essential function to keep produce and other fragile products fresh. With advanced refrigeration technology these devices now have a great deal of complex operability – some can maintain temperature to a tenth of a degree, allowing storage of much more delicate products, and many are now networked to enable remote management and monitoring. While this new functionality brings convenience and efficiency to users, it also increases the possibility of a surge event that can damage large amounts of merchandise. Surge events have historically damaged any device connected to the electrical grid, but the relative isolation of refrigeration equipment on the network has protected it from surges affecting other parts of a warehouse. SecurityLink India ■March 2018
As the use of network-enabled refrigeration equipment grows, so does the likelihood of surge damage being transferred from other devices to this essential infrastructure. Surge damage to refrigeration equipment can take a number of different forms. Although the refrigeration capability may still be present, remote control of the device or internal temperature monitoring may no longer be functional, resulting in damage to refrigerated merchandise as temperatures fluctuate without operator knowledge. In the event of a more powerful surge, the entire device could be badly damaged or even destroyed entirely, necessitating its replacement and possibly the replacement of all of the goods it contained. Power surges can come from within a facility as well as from outside through a lightning strike, so it is essential to protect each individual device, especially connected devices such as smart refrigeration. Electrical equipment can generate power surges that then transfer to other devices on the same network, which causes damage similar to a surge caused by a lightning strike or other external electrical fluctuation. Surge protection should be installed at the refrigeration equipment itself as well as at any cables that run between the inside and outside
feature
of a facility. To protect temperature-sensitive goods and equipment, it is essential to keep refrigeration equipment functional. Installing surge protection throughout a warehouse and on refrigeration equipment can help you prevent a costly meltdown.
Sports stadiums
S
ports stadiums and other event venues are complex facilities, featuring a myriad of systems that all must work in tandem during concerts, sporting events, conventions and large-scale public gatherings. A stadium needs lighting systems, security, POS, ticket collection, video displays and many other systems to function optimally and continually. A power surge that damages electronic systems is dangerous for these systems, causing downtime or even destruction of equipment. Should one of these systems go down, issues are created beyond the loss of the system functionality. A POS system not functioning during an event means that sales cannot go through, resulting in financial losses from concessions and merchandise. Should ticket collection mechanisms not properly function, tickets could be counted inaccurately, resulting in unauthorized persons sneaking into an event or authorized persons not being granted access. A very public display of stadiums systems suddenly becoming nonfunctional took place at the 2013 Super Bowl in the New Orleans Superdome, when a partial power outage stopped the lighting from functioning during the nighttime game, stopping play for 34 minutes. A newly installed relay tripped, resulting in the power outage, during which only emergency lighting functioned. The incident showed the stadium’s inability to
cope and the city’s inability to plan. As stadiums may host a variety of different events, there are diverse risks with systems not operating. A stadium hosting a hockey game needs to keep the ice constantly cooled, while a concert requires electronic microphones and amps to broadcast the artist’s music, as well as plotting complex lighting and pyrotechnics that could become dangerous if improperly set off. And with any system downtime, security is at risk. Without security cameras to monitor situations, security officers cannot properly respond to incidents, and it is much easier for unauthorized persons to enter sensitive areas or bring restricted items into the stadium. The correct surge protection is essential to prevent damaging surges from creating security events in a stadium environment. Most surges in a stadium environment are internally generated, caused by the large electronics needed to properly run such a large venue, including HVAC and power generators. These large surges can then be distributed to smaller devices such as cameras and POS. In determining the precise surge protection to protect stadium systems, it’s essential to consider each system individually as well as the stadium as a whole. Ensuring that there is surge protection on individual electronics and larger machinery can help protect smaller devices from larger surges. In a stadium or event venue, many systems of electronics come together to create a singular experience for attendees, and protecting the systems in the SecurityLink India ■ March 2018
event of a surge requires implementing the correct surge protection products.
Data centers
W
ith the advent of cloud technology, data centers are increasingly used to house greater amounts of precious data, from iPhone photos to national security information. For any organization that uses digital technology, data centers are a critical element of business operations. While some organizations choose to maintain their storage in house, more often data centers are separate facilities, housing hundreds or thousands of servers for multiple businesses. Maintaining uptime is a foundational function of any data center – ensuring that all organizations who house valuable data in their servers maintain constant access and that none of the data is lost, changed, accessed, or stolen. Data centers also require constant protection from downtime. Any issue with the functioning of the servers or the physical and cybersecurity that protects them opens a data center to liability – 65
feature
from thieves breaking into the facility itself, loss of data on the servers, or surge events that cause damage to essential infrastructure. Installing surge protection on critical systems for data centers can help manage some of the risk. Even more, installing an uninterruptible power supply (UPS) can help mitigate one of the most dangerous risks to a data center – that a loss of power will take down servers. A UPS installed on the system safeguards that power is maintained during an unforeseen power disruption, and that data is not lost or corrupted. Several types of UPS are available on the market, including standby and interactive battery backups; but for data centers, the most functional battery backup is an online UPS. A lower grade UPS doesn’t isolate a power supply well enough to protect critical data center servers from damage or corruption, while an online UPS supplies power from the battery directly to connected devices, converting outside power to battery power to ensure systems are protected when other power events disrupt the power supply. Keeping data available, safe and uncorrupted is the paramount 66
mission statement of a data center. Surge events can easily disrupt this essential functionality and create liability issues, corrupt data, or even damage the servers themselves. Keeping an online UPS on a data center’s critical systems can help to ensure the consistent protection of the facility and its contents.
Convenience stores
T
he risk of damage caused by electrical surges is familiar to anyone working in the convenience store industry. With electrical devices installed both indoors and outdoors throughout a location, the chance is high that an electrical
SecurityLink India ■ March 2018
surge will affect one or more devices. Video surveillance and security, AC power devices, POS and pay-at-pump machinery are only some of the vulnerable points at which a convenience store or truck stop might be affected by an electrical surge. Smaller, less obvious internal surges account for most of the surge damage done to electrical devices, and often are caused by basic usage – for example, turning on another power source such as HVAC on the same grid can cause power fluctuations that may damage equipment. In addition, the advent of the Internet of Things has led to an influx of interconnected devices that share a single network. With these networked devices, the chance that a surge at one point on the grid will affect other equipment is even higher. A single lightning strike can destroy the device it strikes and then travel along the power supply, damaging or destroying expensive equipment and causing costly downtime. Security cameras, intercom systems, electronic safes, pump controllers, ice boxes and mechanical signs are just some of the devices that could be easily damaged by surges. All of these are expensive to replace, and having to repair or replace them would necessitate downtime for a business. Low-cost, easily changed, rugged surge protectors can help ensure that important equipment remains functioning in the event of a surge, and that power fluctuations do not cause unnecessary wear and tear. Adding surge protection on all of essential devices helps protect them from surges and
feature
prevent them from disseminating surges along their network. To ensure proper protection, surge protectors should be installed between devices, as well as at each device, to prevent surges both from damaging equipment and from travelling between devices.
Healthcare
F
rom heart rate monitors to medication pumps, much of what keeps patients alive and healthy in hospitals is dependent on a steady flow of power. However, there are other critical systems in healthcare facilities that require the highest level of protection from power disruptions as well such as video surveillance and access control systems. Should these stop functioning, the results could be catastrophic or even fatal. It is essential in healthcare facilities to protect the systems from damaging power spikes and surges. The most obvious outcome of a video surveillance system not operating is the potential loss of video data. However, there are other possible outcomes that are far more damaging. Video surveillance cameras going offline due to a surge event could result in a hospital missing vital footage of a patient wandering into an unauthorized area or harming themselves. Downtime on access control systems presents a similar risk – without proper access control, hazardous equipment or high-security areas like neonatal wards or drug closets containing controlled medications may be freely accessible. It’s essential that surveillance, access control and other security systems remain online at all times. Surge protection can help ensure that these critical systems avoid downtime. Loss of critical video surveillance and access control systems can create
tremendous liabilities for hospitals in addition to the danger it presents for patient care. If these systems go offline, other security functions may also cease to function properly. In healthcare facilities with maternity wards, for example, a variety of access control and other electronic solutions exist to protect newborns from abduction. Should these systems go down due to a surge, newborns may suddenly be at risk, additionally creating a liability risk to the facility. If a newborn is abducted, a lack of video surveillance data around the time of the incident greatly magnifies the severity of both the catastrophe and the liability. All of this can be prevented by making sure these systems remain up and running in the event of a damaging power surge. As more services move to the cloud and devices join the network, the risk of damaging surges migrating to other parts of a facility increases. When all devices are networked across systems, a surge could move from a surveillance camera, for example, through a digital network to a device on another system. Putting surge protection in place on these devices, and especially at locations where the network moves from outside the facility to the inside, can help prevent surges from spreading SecurityLink India ■ March 2018
across a network and damaging or destroying multiple devices or systems. Healthcare facilities need to be able to keep all of their systems up and running. Protecting video surveillance and access control from damaging power events with surge protection can help to protect a facility, its employees and its patients.
Conclusion
T
here is no such thing as a facility or organization that is free from the risk of power surges or lightning strikes. Sudden, severe voltage surges like those from lightning can cause almost immediate and total failure of security equipment. However, even small power voltage surges can deteriorate sensitive circuitry over an extended period of time. For every type of organization, whether it’s a sports stadium, warehouse, hospital, convenience store or a data center, the cost of surge protection for essential security systems is an intelligent investment that delivers tangible ROI by protecting from power surges and lightning strikes and avoiding costly downtime. Incorporating surge protection into a facility is easy and affordable, and is the best way to ensure that security equipment is safe. 67
International Updates
Facial Recognition
Nets Most Wanted Murder Fugitive
P
olice in Buenos Aires have arrested an internationally wanted murder suspect after his image was identified as a likely match by INTERPOL’s facial recognition unit. Kristian Danev, a Slovak national aged 33, is wanted internationally by Czech authorities under an INTERPOL Red Notice following a murder ten years ago. As part of an investigation by police in Argentina, INTERPOL’s National Central Bureau in Buenos Aires submitted images of the suspect to INTERPOL’s General Secretariat headquarters for comparison against records in its facial recognition database. After the search result came up as a
potential match, police in Argentina detained the suspect for further questioning, resulting in the suspect confirming his identity. “In less than 48 hours, INTERPOL’s global police cooperation platform helped locate, identify and arrest an international fugitive who had evaded justice for a decade,” said Harald Arm, Director of Operational Support and Analysis at INTERPOL. “This illustrates the fundamental role of INTERPOL’s policing capabilities and forensic data in international police investigations. We need to ensure that vital information moves faster than fugitives,” added Mr Arm. INTERPOL’s Fugitive Investigative
Support unit was supported by its Command and Coordination Centre and its regional bureau in Buenos Aires. They worked closely together with the INTERPOL National Central Bureaus in Bratislava, Buenos Aires and Prague to ensure the quick exchange of information on the case. INTERPOL launched its facial recognition biometric service in November 2016. It already contains more than 44,000 images from 137 countries. Police forces across the globe use INTERPOL’s facial recognition tool daily to make connections between criminals and crime scenes, identify fugitives and missing persons or to compare mugshots.
Launching New Website & Online Community Digital transformation focused on seamless user experience across devices; collaboration among security professionals
A
SIS International has unveiled a refreshed, mobile-centric website and online community focused on improved and personalized content, user-centric search and commerce, and improved information sharing and collaboration among security professionals worldwide. The website, www.asisonline.org, features a dramatically enhanced user experience including powerful search capabilities, an extensively researched taxonomy that drives content organization, and a more intuitive navigation structure. An exciting new feature is the 68
launch of ASIS Connects, the Society’s new online community. Designed exclusively for security professionals, it provides a robust, user-friendly platform for peer-to-peer problem solving and collaboration. “These technology upgrades are just the start of a multi-year effort that will transform how the Society engages with members and the security profession as a whole,” said Peter J. O’Neil, CEO, ASIS International, “By creating a search-centric site and secure community platform, ASIS will be able to help security professionals at their ‘moment SecurityLink India ■ March 2018
of need’ by providing relevant, timely resources in a device agnostic interface.” Community features include a resource library stocked with case studies, best practices, book excerpts, security management articles, and education recording; an easy-to-use discussion forum for security professionals to engage with and learn from each other; and a robust online directory to allow for thoughtful relationship building. “ASIS members work each day to create safe workplaces and communities worldwide,” said Richard E. Chase, CPP, PCI, PSP, 2018 President,
International Updates
ASIS International, “This shared commitment and desire to see each other succeed is what makes our profession so unique. And, ASIS Connects is designed to help facilitate this exchange of ideas and information. Members can
leverage the diversity of experience and expertise from their global peer network to get fresh perspectives on daily challenges and expert insight on new and emerging threats.” In the months ahead, ASIS Con-
nects will feature topic-based discussion forums and chapter and event management tools, making it easier for security professionals to engage with the Society on the local, national, and global levels.
Nec Asia Pacific Successfully Completes 3 Safety and Security Trials with Singapore Government N
EC Corporation and NEC Asia Pacific announced the successful completion of three Safety and Security test bed projects, held in and near Jurong Island, under the Safety and Security Industry Programme (SSIP) 2020. The SSIP 2020 is led by the Ministry of Home Affairs (MHA), Singapore Economic Development Board (EDB) and done in collaboration with JTC. The three trials were conducted over a period of 12 months from September 2016, and are aimed at using data analytics and security insights to address Singapore's safety and security needs. The trials involved early detection of suspicious behaviour, off-site security clearance of authorised personnel and on-the-spot enrolment for first-time visitor access to controlled areas. In the first trial, NEC provided and tested a system that utilised its high performance NeoFace® Facial Recognition software together with the Intelligent Complex Event Processing engine which correlates audio and video analytics, to detect suspicious behaviour and identify Persons of Interest (POIs) in both indoor and outdoor areas. The second trial facilitated off-site
security clearance for entry of authorised personnel into Jurong Island, thus reducing congestion at checkpoints. NEC provided and tested a Bus Sensors Monitoring Management System using customised tamper-proof security sensors to prevent un-authorised opening of vehicle doors during bus journeys. The third trial tested the feasibility of an automated system to provide a more efficient method of enrolling first-time visitors for entry into Jurong Island. The system leveraged NEC’s world-leading biometric solution to expedite clearance of such visitors via onthe-spot facial and fingerprint recognition enrolment at car inspection bays. For all the 3 trials, the technologies provided real-time monitoring and alerts to the simulated Command Centre, to inform the authorities of activities which may require law enforcement action. As one of the world leaders in ICT and Public Safety solutions, NEC hopes to further collaborate with the government to address heightened security threats in the areas of critical infrastructure, border control and city surveillance for a safer and more secure Singapore. SecurityLink India ■ March 2018
“Our safety and security agencies are continuously seeking to make use of new technologies and innovation to keep up with challenges and maintain our operational excellence. Testing innovative solutions through the SSIP provides a useful platform to do so, and we look forward to more collaboration with solutions providers to address safety and security challenges, and to serve the public better,” said Mr Ng Yeow Boon, Senior Director of MHA’s Ops-Tech Group. “JTC is always on the lookout for new solutions to ensure a safer environment in our industrial space. A key example is how we achieved better security operations by improving biometric access control at Jurong Island. We are pleased to support these latest efforts to testbed new security innovations,” said Heah Soon Poh, Assistant Chief Executive Officer, Engineering and Operations Group, JTC. In June 2014, an NEC-led consortium completed the first phase of the Safe City Test Bed initiative at Orchard Road for the Ministry of Home Affairs and the Economic Development Board. 69
International Updates
Honored as ‘CSR Brand of 2017’ D
ahua Technology has recently been crowned with the ‘CSR Brand of 2017’ for its dedicated support to the course of public welfare and well-regarded reputation at the 7th China Charity Festival held in Beijing. Originated in 2011 as the first media selected award to honour organizations/ individuals that make significant contribution to the charity course, China Charity Festival set up 12 awards in total and CSR Brand of the Year is the highest honor granted to a company. The decision was jointly made by charity organizations, major media and renowned institutions/ persons, based not only on the amount of money donated but also on the degree of engagement and effectiveness of the practice. Out of over 1200 companies listed, Dahua Technology was honored with the title.
Dahua CSR through job offering & innovation & green products
M
aintaining its commitment of ‘Enabling a Safer Society and Smarter Living,’ Dahua gives equal importance to both its business growth and fulfillment of its social responsibilities, which helps the enterprise develop in a healthy way and sharpens its competitiveness. Amid its business growth and expansion, Dahua has created more than 12,000 jobs (as of September 30, 2017) and has made considerable contributions to boosting growth of the local economy and social stability. Adhering to its principles of sustainable development, Dahua executes strict management and control throughout its whole business processes including product design, component selection, manufacturing and after-sales service to help protect the environment. For this, Dahua has received the China Environmental Labeling certificate from Ministry of Environmental Protection of P.R.C., and was included in the first government procurement list for green products.
Dahua Technology: CSR Brand of 2017
Dahua global charity footprints
I
n response to government encouragement for poverty alleviation, the company has donated funds to poverty-stricken villages and supported students from impoverished families. Through its great passion for public service, Dahua has initiated various activities such as bike rides for charity, blood donations and reading to blind children, encouraging more people to participate in public service campaigns and give back to the community. Dahua is also active globally in its CSR efforts. Burma was hit by the worst-ever flood in August 2016. Dahua Asia-Pacific subsidiary took the initiative to collect and donate relief supplies to local people, helping them through this time of hardship. In April 2017, together with its staff, Dahua Peru subsidiary was at the forefront of fighting against a severe flood disaster in a northern region of Peru. 70
SecurityLink India ■ March 2018
Ranks in Sunday Times 100 Best Companies to Work for 2018
P
axton, the global brand of electronic IP access control and door entry systems, has been named as one of the UK’s top employers with its 49th placed ranking in The Sunday Times 100 Best Companies to Work for 2018 list. The annual survey run by the ‘Best Companies’ organisation, recognises organisations and managers who genuinely value and respect their employees. The company was the only security manufacturer that made it onto the prestigious list. The ranking was achieved following direct feedback provided by Paxton employees, covering 8 key areas of leadership; my manager, my company, personal growth, my team, wellbeing, fair deal and giving something back. Highlights from the employee survey provided an excellent insight into what it’s like to work at the company: ●● 96% of staff believe they can make a valuable contribution to the success of the company. ●● 93% agree the organisation is run on strong values & principles. ●● 90% of people feel proud to work for Paxton. Commenting on the news, Adam Stroud, Paxton’s Chief Executive said, “We’re absolutely delighted to feature on the best companies to work for list. This is the first time we have entered, so to appear at number 49 is a fantastic achievement.”
International Updates
Showcases AI Technologies at Intersec 2018
H
ikvision exhibited their latest innovations in surveillance at the recently held Intersec 2018. Hikvision's exposition at Intersec Dubai was a huge success, with record-breaking attendance, and with Hikvision MENA picking up some exciting accolades. Artificial Intelligence has become the most trending technology in the security industry. This year, under the theme ‘AI+ Empowering Partners,’ Hikvision showcased a series of their latest and most advanced technological innovations with AI technologies – the signature DeepinView series IP cameras and DeepinMind series NVRs outlined the AI trend in the MENA region.
Hikvision’s AI Cloud
H
ikvision’s AI Cloud is a highly efficient distributed computing network incorporating the advantages of both cloud computing and edge computing. This hybrid computing structure helps relieve the concurrency stress on the cloud by moving huge amounts of data processing to AI-enabled edge devices – a more reasonable and efficient resource allocation that can solve the network congestion and low reliability problems typically inherent in a conventional cloud structure. At the exhibition, Hikvision showcased the signature DeepinView Series IP cameras and DeepinMind Series NVRs and the latest features powered by AI technology. These products aim to tackle basic security challenges in the areas of object detection, facial recognition, and people counting, as well as human body search.
Ecosystem partnership program
H
ikvision has been devoted to seeking and developing the long-term and steady cooperative partner all the time, and take the fulfilling and exceeding of partners' expectations as our value. At the exhibition, Hikvision invited partners including WD, Seagate, Axxon, Milestone and Intel to showcase integrated collaboration and applications in various fields.
Industry solutions
H
ikvision has already successfully applied AI technology in many vertical markets such as smart cities, intelligent traffic systems, and integrated security solutions. Hikvision introduced the most complete and innovative intelligent traffic system (ITS) solution to demonstrate how it helps reduce traffic congestion, identify violators, and intercept suspicious vehicles – all with a smart and data-driven approach.
The DarkFighterX
A
t Intersec, Hikvision exhibited the DarkFighterX series cameras, which expand upon the human sense of sight by first mimicking the human eye – two distinct sensors for capturing and combining brightness and colour – then extending that ability in extremely lowlight environments. The technology results in colourful, bright, and accurate imaging, making night time surveillance video appear nearly as clear as daytime video. SecurityLink India ■ March 2018
71
International Updates
Partners with
Newly Branded Global Security Exchange Event reinforces commitment to innovation and multiplying value and experience
A
SIS International, the leading association for security management professionals worldwide, has made the brand reveal of its flagship security event, Global Security Exchange (GSX). Formerly known as the ASIS International 64th Annual Seminar and the Exhibits, the refreshed name and brand promise reflects the Society’s commitment to unite the full spectrum of security – cyber and operational security professionals from all verticals across the private and public sector, allied organizations and partners, and the industry’s leading service and solution providers – for the most comprehensive security event in the world. “GSX is setting a new bar for education, networking, and security product and service excellence – addressing the issues critical to all sectors of the global marketplace,” said Ron Rosenbaum, Chief Global Marketing and Business Development Officer, ASIS International, “In 2017, we saw the beginning of this transformation, and with our 2018 event focus, Security Solutions Multiplied, we will deliver a best-inclass environment for education, networking, and business building, resulting in year-round benefits for attendees and exhibitors alike.” GSX will take place in Las Vegas, Nevada, September 23-27, in partnership with InfraGard and the Information Systems Security Association (ISSA). The event will offer attendees enhanced opportunities for collaboration and engagement, with a focus on diversified programming, experiential learning, and hands-on access to the newest technologies and solutions on the market. ASIS International President Richard E. Chase, CPP, PCI, PSP, noted, “As the global voice for the security profession, ASIS is focused on year-round success in the form of professional development, certification, fostering peer-to-peer communities, and the development of standards, white papers, and best practices. Convening the industry at GSX is a critical component of our mission to advance security worldwide.” 72
Delivering in-Depth Security Assessment Services for Digital Transformation As a FICO® Enterprise Security Score partner, Innovus will make empirical cybersecurity risk scores part of digital transformation offerings
I
nnovus has joined the FICO® Enterprise Security Score partner program, whereby they will incorporate the FICO® Enterprise Security Score into its portfolio of solutions and services. The FICO Enterprise Security Score enables Innovus clients to accurately assess cybersecurity risk within their own organization, as well as monitor the risk of their vendors. “Executive leaders are looking for a trusted benchmark to help them quantify cybersecurity risk as well as measure the performance of their cybersecurity investments,” said Doug Clare, Vice President of Cybersecurity Solutions at FICO, “Innovus Consulting Services’ capabilities in digital transformation – including penetration testing, security process and posture assessment, remediation and customer awareness – enable outcome-based solutions that are greater than the sum of their parts. Our Enterprise Security Score complements these capabilities with an empirical, data-driven approach to ongoing cyber risk quantification.” “Our customers are embarking on a digital transformation journey, and it’s imperative that they know where they are in the process, what they need to do and who they are doing it with, especially in regard to cybersecurity,” said Lou Cirillo, Sr. Partner, Innovus Consulting Services, “The FICO Enterprise Security Score enables customers to get a sense of their current risk and benchmark their journey to accelerate risk mitigation and monitoring across the enterprise. The industries where we are most active, including smart cities, mining, retail, health and government, will benefit from the empirical risk assessment and visibility that the FICO Enterprise Security Score provides.” The FICO® Enterprise Security Score provides an easy-tounderstand metric that facilitates empirically informed boardlevel risk assessment, third-party vendor management, and cyber breach insurance underwriting. The FICO Enterprise Security score gives organizations a quantitative measure of the likelihood of significant cyber breach in the next 12 months. The solution outlines current threat profile characteristics and granular insights into potential security issues to facilitate security posture remediation and continuous improvement processes.
SecurityLink India ■ March 2018
International Updates
to Acquire
A High-Performance Door Manufacturer
A
llegion plc, has agreed to acquire Aurora Systems, Inc. (AD Systems) through one of its subsidiaries. The transaction is expected to close in the first quarter of 2018, subject to customary closing conditions. AD Systems – founded in 2013 – designs and manufactures high-performance interior and storefront door systems, specializing in sliding and acoustic solutions. AD Systems’ portfolio includes sliding and swinging doors, perimeter frames, door hardware, gasketing, seals and sidelite panels under its ExamSlide™, OfficeSlide™ and InsetSlide™ product brands. The company is based in Everett, Wash. “AD Systems is an innovator in door solutions,” said Tim Eckersley, Allegion Senior Vice President and President of the Americas region, “These solutions are sought across U.S. healthcare, storefront and commercial office spaces because of their distinct designs that provide acoustics control, privacy and ADA compliance. AD Systems is a natural fit with Allegion’s already strong door and door control brands – like Steelcraft®, Republic® and LCN®, to name a few – and will further enable both of our teams to offer the best full-suite solutions to customers.” Eckersley also noted that, like recently acquired Technical Glass Products®, AD Systems will leverage the strength of Allegion’s existing specification writing capabilities to help accelerate growth. Following the closing of the transaction, AD Systems is expected to operate within Allegion’s Americas region, and no immediate changes are planned for the business. “With our strong ties to the same high-quality distribution network as Allegion – servicing the largest U.S. end users, general contractors and architects – as well as our complementary product offerings, this is a positive evolution of the AD Systems business,” said AD Systems President Curt LeMaster. AD Systems generated approximately $18 million in net sales in 2017. Terms of the transaction were not disclosed.
SAFETY Act Certification for AntiTerrorism Technology Security center named the only unified security platform technology to be designated for ‘Approved Products List’ for the U.S. Homeland Security
G
enetec™ Security Center, the flagship unified security platform of Genetec has been granted the SAFETY Act Designation and Certification by the U.S. Department of Homeland Security. Built on an open architecture, Genetec Security Center technology combines video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics in one unified system. Genetec received this exclusive certification and designation after meeting stringent qualifications outlined in the SAFETY Act of 2002 (Support Anti-terrorism by Fostering Effective Technologies Act), which provides incentives for the development and deployment of antiterrorism technologies and establishes liability limitations for claims resulting from an act of terrorism where qualified anti-terrorism technologies (QATTs) have been deployed. “Having held the DHS SAFETY Act Anti-Terrorism technology designation for our video management system, Genetec Omnicast™, for the past several years, we take great pride in now having Security Center approved as the only unified security technology platform designated by the SAFETY Act,” said Alain Côté, Executive Vice President at Genetec, Inc., “This U.S. government certification confirms liability protection to Genetec and its customers in the event of a terrorist act and offers further evidence to our government customers that Security Center meets the highest possible quality standards for video surveillance, access control, ALPR, communications, and analytics.”
SecurityLink India ■ March 2018
73
International Updates
Motorola to Acquire Avigilon By Jon Cropley Principal Analyst, Video Surveillance, IHS Markit
M
otorola has entered into an agreement to acquire Avigilon, one of the world’s largest suppliers of professional video surveillance equipment. Rumors about Avigilon being acquired have been circulating in the industry for years. Many expected one of Avigilon’s competitors to acquire it. Instead, Motorola Solutions, a company with limited current involvement in the video surveillance market, has stepped in. Motorola’s focus on public safety projects is likely to have been a major motivation for the acquisition. City surveillance is an important element of public safety. Professional video surveillance equipment revenue has been growing faster in the city surveillance sector than in the rest of the market in recent years. IHS Markit forecasts this will continue, with the city surveillance sector growing at a compound annual growth rate (CAGR) of 11.1 percent to 2021, and the total market growing at a CAGR of 6.8 percent. IHS Markit estimates that Avigilon was the eighth largest supplier of professional video surveillance equipment in 2016 with over 2 percent of a global market worth $15.4 billion. The announcement to acquire Avigilon comes after a string of acquisitions by Motorola over the past three years. Some notable recent acquisitions include the UK TETRA operator Airwave, the US-based 911 business of Airbus DS Communications, Kodiak (a push-to-talk provider) and Spillman (a public safety software provider). Given these deals and planned acquisition of Avigilon, it’s clear that Motorola is aiming to increase activity in the wider public safety and ‘safe city’ market, moving beyond its emergency communications focus of the past. Traction of national public safety broadband networks such as ESN and FirstNet, which facilitate video integration, further support this strategic play. IHS Markit estimates Motorola held approximately 7 percent of the nearly $5 billion command and control technologies and services market in 2017, making it the largest supplier to this market. 74
Unmanned Aerial Vehicle (UAV) Market Worth USD52.30 Billion by 2025
T
he increasing use of unmanned aerial vehicles in civil and commercial, and military applications is one of the most significant factors expected to drive the growth of the UAV market. Improvements in flight control systems owing to the development of sense and avoid technology, are expected to fuel the growth of the UAV market. Based on application, the civil & commercial application segment of the UAV market is projected to grow at the highest CAGR from 2018 to 2025. This growth can be attributed to the increased adoption of UAVs for various civil & commercial applications such as inspection, monitoring, surveying, mapping, and remote sensing. Properties of UAVs such as superior endurance, high efficiency, and low operating costs have fueled the use of UAVs in civil & commercial applications. Based on range, the Visual Line of Sight (VLOS) segment of the UAV market is projected to grow at the highest growth during the forecast period. Small UAVs falls under the VLOS category and are primarily used in civil & commercial applications. Relaxation of restrictions imposed on the commercial use of UAVs is expected to drive the growth of the market for VLOS UAVs. Based on mode of operation, the semi-autonomous UAVs segment is estimated to lead the UAV market in 2018. The growth of the semi-autonomous UAVs segment can be attributed to the advantages associated with semi-autonomous UAVs that include limited human intervention and pre-programmed features that aid in their smooth operations. The UAV market in the Asia Pacific region is projected to grow at the highest CAGR during the forecast period. This growth can be attributed to the high demand for UAVs from the commercial and military sectors of countries such as China, India and Japan. The military budgets of the abovementioned countries are increasing on a yearly basis, which has subsequently led to the adoption of military UAVs, as they assist in the collection of battlefield data. Key players operating in the UAV market include General Atomics (US), Northrop Grumman (US), Boeing (US), DJI (China), Parrot (France), Lockheed Martin (US), Textron (US), 3D Robotics (US), and Israel Aerospace Industries (Israel).
SecurityLink India ■ March 2018
International Updates
Forms Alliance with Changing New Leadership Acquisitions Acquires Dale A with Proposed Hardware and Excel Transaction Architectural Hardware
A
vigilon Corporation announces changes to its executive team in connection with the recent agreement to be acquired by Motorola Solutions, Inc. Upon completion of the acquisition by Motorola Solutions, Alexander Fernandes will retire as Avigilon’s Chief Executive Officer and Chairman of the Board. “I’m very proud of what we’ve accomplished at Avigilon, growing from a start-up to become an industry leader,” said Mr. Fernandes, “Avigilon has a strong and proven leadership team, and I’m confident about the company’s future.” In contemplation of the acquisition, Ric Leong has resigned as Avigilon’s Chief Financial Officer, effective immediately. Samuel Cochrane, Avigilon’s Senior Vice President of Finance, has been promoted to Chief Financial Officer and will stay on with Avigilon after closing. “Being Avigilon’s CFO has been a tremendous experience, and I’ve greatly enjoyed working with Alex and the leadership team over the past several years,” said Mr. Leong, “I’m in full support of the acquisition and look forward to Avigilon’s success with Motorola Solutions.”
in the United Kingdom
A
SSA ABLOY has acquired Dale Hardware and Excel Ar-
chitectural Hardware through its acquisition of the Progress Ventures Group (Dale & Excel). Dale & Excel are the leading suppliers of architectural hardware to builder’s merchants in the UK. “I am very pleased to welcome Dale & Excel into the ASSA ABLOY Group. Dale & Excel offer a comprehensive portfolio of architectural hardware products that effectively complement and extend the ASSA ABLOY offering in the UK and Middle East markets,” says Johan Molin, President and CEO of ASSA ABLOY. “Dale and Excel are an exciting addition to our UK business and I am delighted to welcome their teams into ASSA ABLOY,” says Tzachi Wiesenfeld, Executive Vice President of ASSA ABLOY and Head of the EMEA Division, “It offers an extensive high quality range of architectural hardware products with a strong track record of innovation. Their portfolio will extend the UNION offering into the commercial market in the UK.” SecurityLink India ■ March 2018
llegion has, through one of its subsidiaries, made a minority investment in European smart-home innovator Nuki GmbH. Founded in Austria in 2014, Nuki’s cornerstone product is a retrofit residential smart lock. The Nuki Smart Lock, which is easily installed on top of an existing key and lock, offers Bluetoothenabled smartphone and Nuki Fob credentialing and fits the majority of existing European locks. When used with the Nuki Bridge, it provides permanent internet connectivity and homeowner control from remote locations. With the Nuki Box, which is the latest addition to the company’s product portfolio, entrance doors of multi-family housing become smart access systems. Allegion Senior Vice President and President of EMEIA LúciaVeiga Moretti said the strategic investment in Nuki expands Allegion’s footprint in the growing European IoT marketplace. “Our alliance with Nuki is yet another example of Allegion’s commitment to leading the electro-mechanical convergence in the security industry,” Veiga Moretti said, “This business has innovative thought leaders at the helm who will make excellent collaboration partners. Nuki is truly a pioneer in the residential smart-lock space in Europe, and with both of our open ecosystems, we can work together to develop best-inclass digital platforms.” Through the alliance, Allegion and Nuki will work together to develop commercial initiatives that accelerate growth. 75
International Updates
Smartphone Face ID Meaning more than 1 billion fewer fingerprint sensors will be shipped from 2017 to 2021 By Jamie Fox – Principal Analyst, LEDs and Lighting, IHS Markit
T
he launch of Face ID means that Apple’s consumption of fingerprint sensors will most likely almost entirely stop by 2021. More than 200 million fingerprint sensors would have been required each year had Apple continued to support Touch ID in its iPhone releases. The launch of Face ID will also reduce fingerprint sensor shipments to other manufacturers already looking to replace fingerprint sensors with a new solution. Rather than replacing fingerprint sensors, some manufacturers will retain fingerprint sensors in at least some smartphones, or use iris technologies or 3D face solutions in addition to a fingerprint, rather than to replace it. This latest biometric shake-up is leading the sensor industry into a time of significant threats and opportunities.
76
●● The fingerprint sensors market is facing a major disruption following the introduction of Face ID, a facial recognition system designed and developed by Apple Inc. for its iPhone X, along with the forthcoming arrival of in-display sensors and Chinese vendors winning market share from Western vendors. ●● Overall, Apple’s decision to replace Touch ID with Face ID will lead to 1.1 billion fewer fingerprint sensors produced by the end of 2021 than if Apple had maintained Touch ID in iPhones. ●● This estimate is the combined total from both Apple and other competitors that will follow with their own 3D face-recognition solutions. This assessment is based on mobile handsets only; it does not include lesser effects of Face ID on other fingerprint sensor markets, such as notebooks and tablets.
Technology opportunities
F
ingerprint sensor suppliers now have to deal with significant internal disruption within the market for fingerprint sensors itself. As the market moves
SecurityLink India ■ March 2018
to under-glass sensing, ultrasonic and optical sensors will replace capacitive sensors that cannot send signals through glass. Qualcomm already had at least two ultrasonic design wins in 2016, with Xiaomi and LeEco; while Synaptics recently announced its first optical-sensor design win. Further announcements can be expected to follow on this front throughout 2018. Over the next two-to-three years, the fingerprint sensor market is likely to move toward a true ‘in-display’ solution, where the sensor is not just under the display, but also integrated into the display itself. These sensors will likely be able to recognize fingerprints in a large area of the display or even the entire display, rather than solely on a fingerprintsensor button.
International Updates
New competitors
I
n the early years of the fingerprint sensor market, Synaptics and Fingerprint Cards dominated – especially from 2014 through 2015. Although they comprised most of the shipments, Apple, which is purely a captive market, was also one of the leading producers. However in 2016 and 2017, new competitors also entered the market and gained share. Goodix is the largest of these companies, and it is challenging Fingerprint Cards for the lead position in the market in 2017. Silead has also won share in China in 2016 and 2017, while Egistec has gained design wins at Samsung. In 2018 there may also be newcomers to the market such as InvenSense, which was acquired by TDK. Recent competition has driven commoditization in capacitive sensors, leading to lower packaged sensor prices, which fell under $2 in 2017.
New markets
T
he market for fingerprint sensors in mobile phones is not forecast to grow as quickly as it did in 2015 and 2016. In fact, revenue and profits are actually forecast to decline through 2021. Fingerprint sensor makers are therefore looking for new markets, and they hope to see good growth in fingerprint sensor sales for smart cards starting in 2018. Other fingerprint sensor markets expected to grow in the future include automotive and door locks, which could turn out to be big long-term opportunities for the industry.
Fingerprint sensors overview report
T
his report tracks the market for fingerprint sensors in mobile handsets, tablets and notebooks, and covers the impact of other biometrics such as Apple’s 3D face technology. It contains market shares in both units and revenues for 2014 to 2017 and profiles of many suppliers. The report presents unit shipments, revenues and average selling prices (ASPs), showing data by end device – mobile phones, tablets and notebooks.
Strong Cloud Momentum Winning Over 550 New Cloud Customers in 2017 Record growth of CXone platform customer base demonstrates market leadership
N
ICE has added more than 550 new cloud customers in 2017, enabling these businesses to transform customer and agent experiences using advanced cloud and analytics solutions. New customers from across all industries, including large enterprise contact centers from Fortune 100 companies, migrated to NICE Cloud Solutions, in order to reap the benefits of the industry’s leading customer experience offerings in the cloud. The impressive customer growth delivered by NICE validates the fast paced need to move to a unified cloud contact center platform that provides a seamless, connected customer journey. The flexibility of the platform enables businesses to add new service channels and train agents quickly and easily, so businesses are always able to provide an enhanced, omnichannel experience for customers on their most preferred channels. Customers who selected CXone were looking for a robust contact center solution to help them win in the experience economy by delivering exceptional customer and agent experiences that attract and retain customers and grow revenue. CXone is an integrated and open cloud customer experience platform which enables customer service agents to respond faster and act smarter, delivering a smooth omnichannel customer experience. CXone brings together Omnichannel Routing, Workforce Optimization, Analytics and Automation and Artificial Intelligence on one enterprise-grade, cloud native platform.
By choosing NICE, customers benefit from an end-to-end offering that allows them to reliably move to the cloud via proven, enterprise class software. The added advantage of agility ensures customers can adapt, enhance or change the capacity of resources when required. The cloud platform provides enterprise scaling, coupled with the highest levels of data security, global coverage and disaster recovery protection as well as a lower total cost of ownership.
SecurityLink India ■ March 2018
77
feature
INTERPOL Digital Security Challenge ‘Internet of Things’ Cyber Risks Tackled
D
o you know how to protect your webcam from being hacked? Would you know if a cybercriminal was using your printer to carry out cyberattacks? While most of us are aware of the dangers that cybercriminals can pose to our computers and mobile phones and take steps to protect them, we seldom consider how these threats can affect the growing number of Internetconnected devices we use in our daily lives.
The ‘Internet of Things’
A
ll devices which can connect to the Internet – collectively called the ‘Internet of Things’ or IoT – are potentially at risk of a cyberattack. Everyday personal items like video cameras, refrigerators and televisions can be used by cybercriminals for malicious means. Tips for safeguarding IoT devices: ●● Change the factory default passwords – these can be the same for hundreds or thousands of devices, making it easy for criminals to hack; ●● Regularly update all software; ●● Disable features which allow the device to be accessed remotely; ●● Take extra care when buying used devices – you don’t know what the previous owner installed on the device. 78
Cyberattacks targeting or using IoT devices have increased significantly in the past two years, according to several reports from the private cybersecurity industry. An example was the Mirai botnet, which in 2016 infected tens of thousands of devices, mostly Internet routers, with weak password security. These were then used in coordinated distributed denial of service (DDoS) attacks against websites worldwide including a university and several media sites. In the world of cybercrime, the number of IoT devices a criminal has access to is seen as a sign of their status. Although police around the world are developing the skills necessary to forensically examine computers and mobile phones, they are often not aware of how to collect evidence from other connected devices. The latest edition of the INTERPOL Digital Security Challenge tackled this threat, with 43 cybercrime investigators and digital forensics experts from 23 countries investigating a simulated cyberattack on a bank launched through an IoT device. “Cybercrime investigations are becoming more and more complex and operational exercises such as the Digital Security Challenge, which simulate some of the hurdles that investigators face every day, are vital for the development of our capacities,” said Peter SecurityLink India ■ March 2018
Goldgruber, Secretary General of the Austrian Ministry of the Interior.
Meeting the challenge
I
n the scenario, cybercriminals attacked a bank in an attempt to steal large sums of money. The investigators analysed the bank’s computers to identify the date, time and files where the malware installed by the criminals. Through this digital forensic examination, the teams discovered the malware was contained in an e-mail attachment sent via a webcam which had been hacked, and not directly from a computer. This is an emerging modus operandi, as it is more difficult to identify the source of the attack. Once the teams accessed the digital data held by the compromised webcam, they identified the command and control server being used to remotely control the device to conduct the cyberattack. Further evidence led to the identification of a second command and control server, and the investigators identified technical vulnerabilities of the servers which could be used to prevent further attacks. Noboru Nakatani, Executive Director of the INTERPOL Global Complex for Innovation said the scenario provided a learning experience on how to conduct real-world investigations more effectively. “The ever-changing world of cybercrime is constantly presenting new
feature
challenges for law enforcement, but we cannot successfully counter them by working in isolation. “A multi-stakeholder approach which engages the expertise of the private sector is essential for anticipating new threats and ensuring police have access to the technology and knowledge necessary to detect and investigate cyberattacks,” said Mr Nakatani.
Sharing expertise
C
onducted annually, INTERPOL’s Digital Security Challenge helps police worldwide develop the skills necessary to tackle the latest cybercrime threats. The first two events in 2016 and 2017 simulated cyber blackmail involving bitcoin and a ransomware attack. This year’s three-day (19-21 February) event was organized in close
cooperation with the INTERPOL National Central Bureau in Vienna and private sector partners NEC Corporation and Cyber Defense Institute. “NEC has contributed as a strategic partner to INTERPOL’s commitment to improve the cybersecurity skills of investigators throughout the world. For the third year, NEC is honored to have helped develop the Digital Security Challenge by providing our expertise at this cutting-edge event,” said Kozo Matsuo, Vice President of NEC Corporation’s Cyber Security Strategy Division. Training sessions to develop participants’ practical knowledge on IoT device analysis and the latest trends in malware-related crime were delivered by specialists from NEC Corporation, InfoSec, Meiya Pico, SECOM, Kaspersky Lab and Trend-
Micro. Support was also provided by the UN Office on Drugs and Crime (UNODC). Kenji Hironaka, President of Cyber Defense Institute said, “We are proud to have provided forensic content and technical support during all three INTERPOL Digital Security Challenge events. We will continue assisting law enforcement around the world to enhance their cybercrime investigation capabilities.”
Protecting the device
M
ost people use anti-virus products and update their software and programmes regularly on their computers and mobile phones to protect them from cyberthreats. But few people take the same precautions to secure their connected devices, leaving them vulnerable to attacks.
How Catastrophic Events are Changing
Mass-Notification System Market By Robert Brooks – Analyst, Security and Building Technologies, IHS Markit
I
n the Americas, hurricanes, tornadoes and earthquakes are occurring more frequently, so unimpeded mass communication during these events is critical. MNS software is often employed so companies can communicate with their employees, federal agencies, university students and the general public. More channels of communication available in these types of events, means more people can reach safety faster and more lives can be saved. In Western Europe, the second-largest market for MNS software, weather-related incidents occur less often,
so the need for MNS software is lower than in the Americas. While individual countries might deal with specific weather threats – like blizzards and freezes in Sweden and flooding in the UK – in 2017 the United States alone experienced four major hurricanes. Mass-notification system (MNS) software used in emergency communication, the primary segment used during a catastrophic event, is expected to grow in the Americas at a compound annual growth rate (CAGR) of 6.8 percent from 2017 to 2021, reaching $293.1 million in 2021.
SecurityLink India ■ March 2018
79
feature
test-cycle option. While this is a dramatic example of human error, there is a continuing need to improve the user interfaces of these systems to avoid unnecessary public panic in the future.
Privacy laws and regulations slow cloud-based MNS software adoption across Europe
I
Due to heightened terrorist activity in Europe, and with US-based multinational companies moving to Western Europe, the MNS software emergency communication market in EMEA is expected to grow at a CAGR of 11.4 percent from 2017 to 2021, reaching $41.6 million in 2021.
Our Analysis
FedRAMP opens the door for cloud-based solutions
F
ederal Risk and Authorization Management Program (FedRAMP) is a US government program providing a new standardized approach to security assessment, authorization and continuous monitoring for cloud products and services. While this certification is not mandated by law, it will certainly affect how software-as-a-service (SaaS) and cloud vendors perform business with federal government agencies – increasing MNS software sales by the federal government, because nearly all vendors in this industry will switch to cloud-based solutions. 80
Once a company is certified by FedRAMP, additional measures to buy or maintain vendors’ solutions is required. This cost savings will appeal to many government agencies as they look at the total cost to own a system. Western European governments will continue to use on-premises or hybrid solutions, because they are constrained by local laws and regulations surrounding the use of personal information and privacy. A majority of cloud-based MNS software market leaders are located in the US, which creates additional lag time for cloud systems to be purchased in European countries.
New MNS platforms can reduce human error
T
here is an obvious and growing need for more user-friendly system interfaces. For example, during a regulated standard test of Hawaii’s emergency missile warning system in January 2018, an employee selected the option to send out a full missiledefense alert, instead of choosing the SecurityLink India ■ March 2018
ncreasing acts of terrorism across Western Europe and North Africa over the past two years have forced central governments to investigate new and innovative ways to keep the general public safe. While most investment goes toward security cameras, access control, security doors and tough perimeter security, some governments will also choose to buy MNS software to facilitate communication between first responders and security teams. Privacy issues need to be addressed on a country-by-country basis, including the location of servers hosting cloud-based platforms. In Germany for example, MNS software providers must comply with the ‘German work first’ rule. This rule was implemented by the German government, because it did not want any German citizen’s information to be contained outside the country. Each country in the European market has different rules about hosted systems, which adds another layer of complexity to selling cloud-based systems in Europe.
Security Technology
I
HS Markit provides extensive coverage of security technology markets, encompassing access control and fire, cybersecurity, digital ID, critical communications and video surveillance.
feature
and
End-to-End Security, Day After Day C
ybercrime – one of the world’s biggest crimes goes nearly unnoticed. The Internet of Things makes mobility, businesses and industries more connected, but it also leaves them more vulnerable to cybercrime. Online hacking has become so widespread that, by 2021, it is estimated that the cost of cybercrime damages will be $6 trillion annually.* All it takes for a hacker is finding a single weak link, from the outside or more commonly inside, in a surveillance network to gain access to, and jeopardize an entire data system. To cancel out this risk, employ a data security system that’s been configured by experts with vast cybersecurity knowledge to make it completely effective from end-to-end.
Partners in crime prevention
T
he reputation of Genetec and Bosch in the field of mission-critical video security projects is constantly growing. Having access to the video management system (VMS) expertise of Genetec and Bosch’s innovative surveillance cameras gives customers the upper hand over the hackers, because
Bosch cameras are fully integrated with Genetec systems, resulting in an endto-end data security solution incorporating all Bosch network video surveillance cameras, plus Genetec Archiver and Security Center. All network-wide communications between Bosch cameras and Genetec Archiver and Security Center are assigned an authentication key. This electronic signature enables the system to verify the legitimacy of network components like cameras or storage units, and viewing clients, ensuring that an infrastructure of trust is built before network-wide communications start.
The best form of protection is encryption
C
ybercrime is one of the greatest threat to every company in the world,* so an effective and reliable method of safeguarding the video security infrastructure is needed. This is why encryption of data streams and stored data is vital. All Bosch IP-cameras have a built-in Trusted Platform Module (TPM) to safely store cryptographic keys used for authentication ensuring trustworthy communications between all network components and encryption of all video data. All cryptographic operations, for authentication and encryption, are only executed inside the unique built-in Trusted Platform Module (TPM). Encrypted video data is then sent from the camera to the Genetec Archiver using SRTP (Secure Real-Time Transport Protocol). Additional security is established via a ‘permissioning’ scheme based on privileges accumulated by specific users.
Synchronized – Centralized – Better protected
B
ecause Genetec Security Center integrates with Active Directory,
SecurityLink India ■ March 2018
81
feature
user management can be monitored and centralized at Windows level. As well as individual users, user groups from Active Directory can be synchronized with Security Center, whilst new users will automatically inherit existing Security Center privileges defined for that group.
Securing cameras, management software, and clients
P
asswords are still an essential layer of security, but the Genetec Archiver also uses a client certificate (which
can be signed by a trusted third party and is factory-installed) to authenticate themselves to the Bosch IP camera. In addition, only Bosch-approved firmware updates will be accepted, and any cryptographic operations are only executed inside the unique built-in Trusted Platform Module (TPM). Certificates are less at risk from hacking, which is why Genetec uses certificate authentication for its Security Center management software and clients. The video management systems interact directly with the Bosch camer-
as using certificates for authentication, and because stored data stays encrypted and data is transmitted via SRTP (Secure Real-time Transport Protocol) confidentiality and data protection are guaranteed. Using SRTP throughout the whole video security infrastructure enables customers to set up a secured multi-cast network, and get security and good network scalability at the same time. Together, Bosch and Genetec provide one of the world’s best data security solutions.
School Security Systems Industry US Market Overview By Jim Dearing – Security and Building Technologies, Senior Analyst, IHS Markit
W
ith the growing number of schools in the United States with video surveillance, electronic access control and other traditional security systems, the number of potential “greenfield” projects for suppliers falls. Declining numbers of new security system installations will lead to slowing market growth over the next five years. Even so, security manufacturers are looking to implement the following new security technologies to improve school safety, which would also help reignite market growth:
ly lack any form of effective automated response. Adoption of facial recognition technology would allow the surveillance system to proactively search for potential threats, and alert school administrators and security staff about unrecognized individuals in the building. Unfortunately, affordable facial recognition technologies are often unable to adequately recognize the number of faces in a typical school; plus, these systems can place a large strain on a school’s information technology network.
1. Facial recognition technology
2. Logical and physical security identity management integration
M
any of the video surveillance systems currently used in schools are not actively monitored and also rare82
I
ntegrating the school’s access control database with a higher authority logi-
SecurityLink India ■ March 2018
cal database – for example, a student directory – would allow the access rights of former staff, and students who have been expelled or already graduated, to be removed automatically. However, access control providers may find it difficult to get permission to access student records and other sensitive data. Education administrators may also be uncomfortable with possibly creating a potential avenue of cyberattack.
3. High-security classroom doors with multipoint looking systems
H
igher-grade doors would create a far more effective barrier between students and potential attackers, creating
feature
●● The education sector of the market for security equipment and services reached $2.7 billion in revenue in 2017. As most schools have already implemented surveillance systems and access control systems, the market is expected to grow an average of just 1 percent annually, reaching $2.8 billion by 2021. ●● According to survey data from the National Center for Education tatistics, the proportion of schools deploying video surveillance systems has risen from 20 percent in 1999 to over 70 percent in 2013. Likewise, the proportion of schools actively controlling the entrances to their buildings has risen from 75 percent to over 90 percent. ●● Despite advancements in the level of security used on school premises, the number mass shootings at US schools has remained relatively constant throughout the past 30 years. When looking specifically at secondary schools, the number of mass shootings has reached an unprecedented high in the past five years. ●● New technologies are now currently being investigated to improve safety at schools, including facial recognition, logical and physical security identity management integration and high-security classroom doors. numerous safe spaces throughout the building in emergencies. It’s also true, though, that purchasing thousands of doors would be expensive. Fire regulations often dictate that key entrances and exits remain fail-safe during emergencies. Locking and unlocking doors multiple times would also disrupt teaching.
4. Weapons checks using metal detectors or x-ray machines at school entrances
U
sing metal detectors or x-ray machines at entrances along the school perimeter makes bringing weapons into the school much more difficult. However, schools often have multiple entrances, which means each school would require multiple detectors or x-ray machines – both of which are expensive. The school would also need to hire additional security staff to operate each machine. Securing entrances in this manner would also mean long queues would form after breaks and lunchtime, reducing the free time of students and staff.
Access control intelligence service
E
ntering its fourth full year, the IHS Markit Access Control In-
telligence Service provides primary analysis of the equipment market, plus thorough investigation of key technology trends affecting the industry. Current topics of focus inSecurityLink India ■ March 2018
clude mobile access, logical and physical identity management integration, adoption of biometric technology and security system convergence. 83
product showcase
Supporting cybersecurity
I
Device Manager New software for easy on-site device management and proactive cybersecurity control
A
xis Communications has released AXIS Device Manager, a comprehensive on-premise device management tool that offers an easy, cost-effective and secure way to manage all major installation and operational device management tasks. Moreover, in a world where security threats are becoming more common, AXIS Device Manager facilitates proactive device and network protection. It is suitable for managing up to a couple thousand Axis network cameras, access control and audio devices on one site – or several thousand devices across multiple sites. A further development of its popular AXIS Camera Management software platform, AXIS Device Manager demonstrates Axis’ commitment to help customers attain ease-ofinstallation, cost-effective operations as well as proactively protect their devices and networks against cybersecurity risks. The broad range of device management functions available include: ●● Automatically assign IP addresses. ●● Install, configure, replace and upgrade any single device. ●● Copy configurations between thousands of devices. ●● Connect to multiple servers/ systems. ●● Restore points and factory default settings. ●● Upgrade device firmware. ●● Manage and update user accounts and passwords. ●● Deploy, and renew HTTPS & IEEE 802.1x certificates.
mportantly, in an environment where technology is in a state of constant change and evolution, and threats from cybercriminals become more sophisticated, it is essential that any infrastructure related to safety and security is managed dynamically day-to-day. New AXIS Device Manager delivers significant enhancements to device security by enabling centralized account, password and certificate management as well as hardening device according to Axis hardening guide. This makes it easier and more cost efficient for system installers and administrators to proactively manage and implement important security management features. “Being able to access and efficiently install, adapt and secure all of the devices on your network saves a tremendous amount of time and effort. AXIS Device Manager is the goto tool for reaching all Axis devices – whatever stage of their lifecycle – and making needed adjustments,” commented Ola Lennartsson, Global Product Manager, System Management at Axis Communications, “In today’s fast-paced world, any device or network that is static is not only old-fashioned, it is potentially prone to cyber threats. Therefore it is important we ensure our customers can use a tool that allows them to easily, rapidly and decisively manage all of the devices on their network. AXIS Device Manager is that tool.”
XProtect 2018 R1 VMS New software release with focus on performance and privacy Introducing client-side hardware acceleration with NVIDIA and enhanced privacy masking
M
AXIS Device Manager facilitates on-site device management and proactive cybersecurity control
84
ilestone Systems, has released XProtect 2018 R1 the updated VMS in response to the market’s rising demands for cost-effective video business solutions with this first VMS update this year. In this release, Milestone pioneers the use of multiple NVIDIA graphics cards on top of Intel GPU acceleration (Graphics Processing Unit) to achieve ultra-high performance. The XProtect Smart Client 2018 R1 and Smart Wall now support hardware acceleration, where system performance
SecurityLink India ■ March 2018
product showcase
can be boosted just by adding a supported graphics card to take over the heavy lifting in decoding video, leaving room for the system to handle other tasks. This means that the user can view more high definition or ultra HD streams just by adding one or more supported graphic cards to the computer running the XProtect Smart Client or Smart Wall.
Cost-saving and preventing incidents with TV displays
T
he support for DLNA (Digital Living Network Alliance) video sharing technology allows users to directly connect their VMS system to any DLNA-supported TV and display video captured from cameras without needing a Smart Client or even a computer for display. The DLNA support is highly valuable for retail stores, kiosks, gas stations and law enforcement facilities who want to display video from a certain area. This feature can have a preventive function – showing malicious persons that video surveillance is present. This can be a discouraging factor to deter incidents and prevent loss. The feature will give users the ability to create a carousel flow of all or selected cameras in their installation for a flexible, visual representation.
Enhanced privacy masking
S
elective blurring of video image regions enables Milestone users to easily meet privacy requirements. The blurring can be permanently applied to the stored video or be liftable, depending on a user’s credentials. This gives Milestone customers free choice in optimal camera positions while meeting privacy regulations. It also helps maintain a level of situational awareness that is not possible if sensitive areas are blacked out.
New features in Milestone XProtect 2018 R1
A
mong the many operational enhancements in this XProtect release is an optimized software installer with automatic detection of hardware devices. There is a new structure for Milestone Device Pack releases, with drivers managed so that customers can choose to download only recent device drivers. XProtect 2018 R1 also includes a Mobile SDK that enables Milestone partners to easily embed video feeds into apps for Android and iOS devices. XProtect 2018 R1 is available through the Milestone Partner community now.
Connected Worker Solution Simple, cost-effective way to ‘connect’ safety equipment
H
oneywell has recently announced a simple cost-effective way for companies to improve productivity and regulatory compliance by connecting their existing inventory of personal protective equipment (PPE) using Honeywell’s cloud-based Safety Suite software and specialized electronic tags. This new Connected Worker solution uses Honeywell’s ultra-high frequency radio identification (RFID) tags that can be attached to any safety equipment and are designed to withstand the tough conditions characteristic of many commercial work sites. The tags can be scanned directly into Honeywell Safety Suite software, which means equipment can be tracked for usage, maintenance and training, resulting in better, money-saving inventory management decisions and compliance reporting. “Our newest Connected Worker offering allows customers to connect virtually any piece of personal protective equipment – hard hats, fall protection gear, gloves, ladders, fire extinguishers – and track the equipment with Honeywell’s cloud-based software,” said John Romano, Vice President and General Manager of High Risk Safety for Honeywell, “This cost-effective tracking solution leverages Honeywell’s Safety Suite software to extend connectivity to a company’s entire ecosystem of safety equipment to drive more productivity for safety managers.” Three types of tags are available to cover the broadest range of worker tools, safety devices and personal protective equipment – a tag that adheres to various flat, non-metallic surfaces; one that can be mounted to metallic surfaces; and a sealed, rigid RFID tag that can be attached even to devices with irregular or odd-sized surfaces. When equipment is scanned into Honeywell Safety Suite, safety managers can track and manage their inventory of PPE, making sure it is tested on schedule or repaired or replaced as needed, reducing the frequency of equipment failure or non-compliance. The data pulled from the tag can be compiled automatically into reports, thus eliminating
SecurityLink India ■ March 2018
85
product showcase
time-consuming manual audits and data logs. The ultra-high frequency RFID tags also enable longer-range scans, helping speed up and simplify scanning of multiple devices and workers. Honeywell is the global leader in personal protective equipment, including a broad line of Connected Worker solutions. Its products include equipment to protect workers from helmet to boot, including hearing protection, safety harnesses, respiratory and electrical safety equipment, turnout gear for first responders, and protective eye-, hand- and footwear.
Integrated VMS and Analytics Solution Solution provides security, operational and business intelligence
P
elco by Schneider Electric™ has introduced a new integrated solution based on the VideoXpert™ VMS integrated with Ipsotek’s VISuite 10.1 advanced video analytics platform. Ipsotek™ is a leading provider of scenario-based video analytics across a wide variety of industries. The integration provides a solution that increases security, reduces investigation time, and takes the complexity out of managing the video and associated analytics in an overall surveillance network. “This integration reflects the continued commitment that Pelco has to our customers to provide high-quality and innovative solutions that are also easy to set up and use,” said Dan Eslinger, Vice President Engineering, Pelco by Schneider Electric, “Ipsotek specializes in detecting target behaviors in the live video, delivering dependable alerts to operators while dramatically reducing false alarms. Combining this expertise with our enterprise-level video management system lets us offer our customers a powerful solution for efficiently mitigating security risks.” “Pelco is known for engineering the rock-solid security solutions that are required for any successful analytic overlay,” said Bill Flind, Chief Executive, Ipsotek, “Integrating the intelligent VISuite analytics with VideoXpert lets users tailor the automated system detection to their specific needs 86
by applying one or more defined target behaviors.” Pelco’s VideoXpert VMS is designed to deliver control with confidence. It incorporates the latest advancements in system navigation with a platform that enables console monitoring to improve operational efficiency and reduce incident investigation time. The intuitive user interface requires little training, while also allowing operators to quickly and easily collate video scenes from multiple angles, up to nine video scenes, for export into a single clip for effective case management. The result is real-time data with real-time video for a quick response and improved security. VISuite, Ipsotek’s video content analysis (VCA) solution, proactively uses video surveillance systems to identify predefined events and behavior from live video using the scenario based detection (patented) rule engine, a proven concept that significantly reduces the generation of false alarms. Once these events or behaviors are identified, alerts are automatically sent to the operators. As a result, the element of human error is eliminated and operators can quickly intervene. VISuite improves the efficiency of operators by allowing them to successfully monitor many cameras simultaneously and quickly react to any deviant behaviors.
New Flagship H.265 Cameras Enhanced cybersecurity protection and superior night vision
V
IVOTEK has revealed five new flagship H.265/ HEVC cameras to add to its H.265 product line. The release includes three 2-megapixel fixed dome cameras – FD9165HT, FD9365-HTV and FD9365-EHTV and two 2-megapixel bullet cameras – IB9365-EHT and IB9365-HT. The series of cameras are embedded with Trend Micro’s antiintrusion software, which empowers them to automatically detect and prevent credential-based attack as well as block suspicious events, enabling users to enjoy higher levels of network security. Moreover, the newly added H.265 cameras are equipped with the new generation of technology, including Smart Stream III and SNV II (Supreme Night Visibility II), making these cameras capable of optimizing both bandwidth and storage efficiency by up to 90% while
SecurityLink India ■ March 2018
product showcase
Unique Evolution 180 Range Customer demand drives development of novel and dedicated panoramic product range
ensuring safety and security around the clock. “Cyberattacks have recently become a serious issue for many different industries, and of course to the IP surveillance industry as well,” said Shengfu Cheng, Director of VIVOTEK Marketing and Product Development Division, “As the global leading IP surveillance provider, VIVOTEK places enormous importance on this issue. We aim to provide our users with products of the highest levels of reliability and quality. With this goal in mind, VIVOTEK is proud to launch this new H.265 series of cameras, and to continue to provide our users the experience of a safer and better solution.”
These latest flagship cameras have employed VIVOTEK’s Smart Stream III technology to maximize bandwidth and storage efficiency. By adopting Smart Stream III and H.265 technology, users will benefit from reduced bandwidth and data storage demands by up to 90% over systems employing traditional H.264 without smart stream functionality. In addition, the five 2-megapixel cameras feature SNV II, WDR Pro II and Smart IR II, providing users the best quality image during night by reducing IR hotspots and optimizing IR intensity control. Furthermore, the built-in IR illuminators are now effective up to 50 meters, placing VIVOTEK ahead of the field in H.265 IP surveillance solutions.
O
ncam has added the Evolution 180 product range to its portfolio, building upon the experience and heritage of the company's 360-degree technology. The addition of the panoramic 180-degree camera range meets the needs of customers in a variety of markets that require a purpose-built wallmounted camera with Panoramic+ views from a single sensor. Environments that benefit from this unique view include education, hospitality, casinos, banking, retail and transportation, which demand monitoring large walkways, open spaces and corridors without blind spots. “Customer demand for a dedicated high-quality 180-degree technology was the driving force in the development of our latest product. They wanted a camera that was tailor-made for true panoramic views. Currently, 180-degree views in the market are created with a single sensor 360-degree camera in panorama mode, which isn’t an ideal approach as it doesn’t allow the use of the full width of the sensor,” said Jon Marsh, Vice President of Product, Oncam, “This is why we’ve created the Panoramic+ view, which dictated the design of the product putting more pixels on target than any other panoramic camera. This innovation further boosts the capabilities of our product portfolio and builds on the proven track record of top quality imagery from a single sensor for which Oncam is known. Furthermore, the Evolution 180 enables us to reach a greater segment of the marketplace that requires and demands full coverage from their surveillance solutions.” The Evolution 180 camera range is introduced with the Indoor model, available immediately in black or white, and a robust and attractive outdoor model, which will be available in April. The Evolution 180 range offers a 12MP sensor and a 6MP dewarped panoramic image with Oncam’s angle compensation technology which provides adaptive dewarping. It is a true day/ night camera which doesn’t require SDK dewarping as the Panoramic+ view is created natively in the camera. The solution is ONVIF Profile S compliant for added integration flexibility with the leading video management systems on the market today.
SecurityLink India ■ March 2018
87
product showcase
Easy4ip Cloud and playback anytime anywhere. Also, Dahua Easy4ip platform supports IFTTT, which enables Dahua cameras to interact with other smart home applications, such as Philippe Hue, Amazon Alexa etc.
H.265 Wi-Fi Cameras A26/C26
D
ahua Technology has released its H.265 consumer series products earlier this year – the indoor cube model C26 and the pan & tilt model A26. In an era when people are less at home, they can connect to it with A26/ C26. C26 supports intelligent human detection and instant alert, keeping consumers aware of what is going on at home any time they want. Smart Tracking of A26/ C26 automatically tracks and keeps tracking any moving object around the camera.
Instant alert via motion detection
A
home surveillance camera that supports motion detection sends alerts whenever motion event hap-
pens.
24/7 protection with Smart IR LED
W
ith high quality IR LED and Dahua Smart IR algorithm the cameras automatically switches the night mode on and off, and they can adjust the brightness of the IR LED automatically when the light condition changes.
Two-way audio
D
ahua indoor Wi-Fi cameras support built-in Mic and Speaker so all the recorded motion or daily videos support Two-way Talk. When someone breaks in you’ll receive an alarm alert at the real time.
Special specifications of camera
A
Highlights
Fluent high-resolution video based upon H.265
W
ith 2MP image sensor, A26/ C26 delivers crystal clear image. The latest H.265 compression saves up to 50% bandwidth and storage, eliminating users’ worry about the network bandwidth or storage while enjoying better video.
Cloud services through Easy4ip App
W
ith an Easy4ip cloud account, one has access to camera through smart phone as long as Internet is available. One can record daily or motion videos on 88
26 supports 355° pan & 90° tilt, so it can rotate to see all directions with no blind points. Smart Tracking based upon advanced tracking algorithm enables the camera to automatically focus on and follow moving objects in both horizontal and vertical way, even when the camera is installed on the ceiling. C26, with super wide 130° horizontal field of view, can see a whole room through 1 camera. And with the magnetic base you can stick it to any metal surface. With Human Detection based upon powerful image processing technology, C26 detects people by recognizing human heads, greatly reducing false alerts to situations such as falling leaves and light change.
Applications
D
ahua A26/ C26 cameras are a perfect solution for vacant home and shops.
SecurityLink India ■ March 2018
product showcase
Cactus Concept An initiative to set focus on cyber security in video surveillance
M
OBOTIX has raised focus on cyber security by implementing the ‘MOBOTIX Cactus Concept,’ that aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments.
The objective of the Cactus Concept is to implement a multimedia cyber security campaign in order to raise awareness among potential and existing MOBOTIX customers of the importance of data security in network-based video security systems and how organizations can protect themselves through cost-efficient and intelligent solutions. End-to-end encryption with no blind spots is required, from the image source via the data cables and the data storage through to the video management system on the user’s computer. Like a cactus, whose every limb is covered in thorns, all of the modules (camera, storage, cables, VMS) in the MOBOTIX system have digital thorns that protect them from unauthorized access. “Modern video surveillance and access control technologies help protect people, places and property across the world but they are increasingly targeted by criminals aiming to infiltrate, take-over or disable these vital systems,” says Thomas Lausten, Chief Executive Officer of MOBOTIX, “With the internet of things trend adding billions of IP con-
nected devices each year, our industry must lead the way in creating secure platforms that can reduce the risk posed by these damaging attacks.” MOBOTIX believes in its ‘Cactus Concept’ that protects every element of the design, manufacture and operation of each device along with end-to-end encryption across the entire usage and management cycle. To ensure the highest levels of security, MOBOTIX uses the services of SySS, a highly regarded and independent third party security testing company that examines the security of both software and hardware elements. Sebastian Schreiber, SySS CEO said, “MOBOTIX has a contract with us to provide further penetration testing of its technology elements. The initial platform testing on a current camera model revealed very positive results and we will continue security testing as an ongoing process.” “Cyber security has been and will continue to be a core focus for MOBOTIX,” adds Lausten, “And we look forward to working with our peers in the industry, customers and government agencies to protect the very technologies and systems that help make society safer for all.”
Quad-core TS-253Be and TS-453Be NAS with M.2 SSD and 10GbE Expandability, Ideal for Professional Storage and Multimedia Applications
Q
NAP® Systems, Inc. has recently unveiled the quadcore Intel-based 2-bay TS-253Be and 4-bay TS-453Be. With a PCIe expansion slot, the functionality of both NAS can be expanded to meet application needs including M.2 SSD caching and 10GbE connectivity. The TS-x53Be also features HDMI output and 4K H.264/ H.265 transcoding to provide a greater multimedia experience while its snapshots function helps protect data against potential ransomware threats. “With the PCIe slot, the TS-x53Be series allows for extending NAS functionalities including adding SSD caching and 10GbE connectivity, which provides great long-term potential for the NAS,” said Jason Hsu, Product Manager of
SecurityLink India ■ March 2018
89
product showcase
QNAP, “For users who require a professional storage that can help streamline workflows and provide a great multimedia experience, the TS-x53Be series is the ideal choice with a reasonable price,” Hsu added. Powered by an Intel® Celeron® J3455 quad-core 1.5GHz processor (burst up to 2.3 GHz), 2GB/ 4GB DDR3L RAM (up to 8GB), dual Gigabit LAN ports, and supporting SATA 6Gb/s hard drives and SSDs, the TS-x53Be series provides dependable performance of up to 225 MB/s read/ write speeds and maintains the same outstanding performance with AESNI accelerated encryption. The TS-x53Be supports snapshots, allowing for users to quickly recover data in the event of accidental deletion/ modification or ransomware attack.
Users can install a QNAP QM2 card to the PCIe slot to add dual M.2 SSDs for enhanced SSD caching performance while also adding 10GbE (10GBASE-T LAN) connectivity. Coupled with the Qtier™ auto-tiering technology, the TSx53Be helps achieve optimum storage utilization ideal for small and medium business and organizations. Alternatively, users can install a 10GbE 10GBASE-T/ SFP+ card, a USB 3.1 Gen2 10Gbps card, or a QNAP QW-AC2600 wireless card based on their application requirements. The TS-x53Be provides a variety of useful applications for everyday tasks from the built-in App Center. ‘IFTTT Agent’ and ‘Qfiling’ help automate user workflows for improved efficiency and productivity; ‘Qsirch’ provides fulltext search for quickly finding files; ‘Qsync’ and ‘Hybrid Backup Sync’ simplifies file sharing and syncing across devices; ‘Cinema28’ allows for managing multimedia files and connected media devices from a single platform; ‘Surveillance Station’ offers 4 free IP camera channels (up to 40 channels by purchasing additional licenses); ‘QVR Pro’ integrates video surveillance features into QTS, providing user-defined recording storage space, cross-platform client tools, camera controls, and intelligent IoT-based event management functions.
90
Thermal By FLIR Powers Cat S61 The Next-Generation Thermal Imaging Android Smartphone Embedded FLIR Lepton thermal microcamera provides advanced thermal imaging and measurement in rugged environments
B
ullitt Group, a leading manufacturer of ruggedized smartphones, has embedded FLIR’s Lepton® thermal microcamera into the new Cat S61. Cat Phones’ most advanced ruggedized Android smartphone, the Cat S61 joins the ‘Thermal by FLIR’ partner program, which was created to fuel thermal innovation. Unveiled at the recently held Mobile World Congress 2018, the Cat S61 builds on the industry-leading capabilities of the first edition model Cat S60. Equipped with FLIR Lepton, the industry’s smallest, lightest and lowest cost thermal imaging camera core, this smartphone enables users to see in total darkness and visualize heat that is invisible to the naked eye. The new model includes a variety of technical improvements that enable expanded capabilities across industries. They are: ●● Increased temperature range of minus 20 to 400 degrees Celsius, opening up a new set of use cases New Cat S61 Android smartphone such as vehicle diagwith Thermal by FLIR nostics and asphalt monitoring. ●● Upgraded visible high-definition (HD) camera and thermal image processing to provide improved MSX® image detail and quality. ●● Updated MyFLIR® applications including interactive tutorials, tips and community forums for sharing the latest discoveries in thermal imaging
SecurityLink India ■ March 2018
product showcase
●● Live streaming, allowing users to share their own thermal imagery via Facebook Live to showcase their experiences, discuss use cases, and offer solutions “FLIR’s technology has played a crucial role in bringing thermal imaging to a variety of professionals, enhancing the capabilities and awareness of construction workers, electricians, first responders and anyone requiring a device built to survive the elements,” said James Cannon, President and CEO of FLIR, “FLIR’s mission is to save lives and livelihoods, and with the Cat S61 FLIR-equipped smartphone, we’re arming professionals with valuable thermal data that can help them save time and money while improving the overall effectiveness of their work or mission.” “Nearly two years ago, we unveiled the Cat S60, the world’s first thermal imaging smartphone. As customers’ needs have evolved, we are bringing forth the most advanced thermal-equipped smartphone ever to enable even more users to work in complex environments with ease,” said Peter Stephens, CEO Bullitt Group, Global Licensee for Caterpillar, “FLIR’s industry-leading Lepton sensor, coupled with the Cat S61’s advanced technical design and ruggedness, brings a superior level of awareness and functionality for practically any environment.”
port, this might include entrances to hangars, gates and other restricted areas including baggage halls. The virtual ceiling or panes can protect rooftops and open areas to create ‘sterile zones,’ as well as be able to detect objects thrown over partition walls between secured and non-secured areas such as passports and contraband. OPTEX REDSCAN is an extremely reliable system in any internal lighting or external weather conditions. The target object can be defined by its size and the speed it is moving with; when used in outdoor applications, it can ignore most wildlife such as rabbits, birds, and rodents. These sentiments were echoed by Ryosuke Miwa, Senior General Manager of Global Security Division from OPTEX Japan. He said, “We are delighted with the integration of our laser detection sensor within the Genetec™ RSA surveillance module. Intrusion detection along the perimeter, or a controlled area inside a building can play a critical role in an overall security solution, especially for airports and other high security sites that Genetec software is often specified for. The integration adds another layer of awareness and control to the system’s operator.”
New REDSCAN Laser Scanner Integrated to Genetec™ Security Center
I
nnovative OPTEXlaser scanning technology can now be integrated with the Genetec™ restricted security area (RSA) surveillance module to deliver a new era in security and detection in outdoor and indoor environments for airports and other critical infrastructure sites. Via the RSA surveillance module, OPTEX’s award-winning REDSCAN laser sensors can now send real-time events and alarm data to the Genetec™ unified security platform, Security Center, alerting control room operators to any intrusion in the surveillance area. Intrusions can be tracked on site maps to enable operators to respond to threats even more quickly and accurately. The REDSCAN laser sensors provide highly customisable virtual walls and ceilings which can be used to protect a perimeter line, but also specific areas. In the case of an air-
Extreme Edge Server Enables Remote vRAN and MEC Installations
A
t the recently held Mobile World Congress (MWC), Artesyn Embedded Technologies unveiled a powerful new network edge server that will enable service providers to cut the capital and operating cost of deploying a complete virtualized radio access network (vRAN). The MC1600 Series Extreme Edge Server uses Intel® Xeon® Processor D family devices to provide a flexible compute engine that operators can reallocate to any required load such as multi-access edge computing (MEC), when not required for vRAN processing. An on-board Ethernet switch eliminates the need for external switching and enables a standard Ethernet remote radio head connection, while a PCI Express slot can be used to add functionality such as a CPRI remote radio head connection
SecurityLink India ■ March 2018
91
product showcase
or offload media acceleration. The MC1600 Series Extreme Edge Server is designed to be deployed in remote installations with a wide environmental temperature range and side-to-side cooling found in many outdoor cabinets. While initially targeted at vRAN applications, the MC1600 Series Extreme Edge Server is ideal for industrial site monitoring, Internet of Things (IoT) gateways, and smart cities applications as well as private cloud installations both on-premise and remote.
Artesyn vRAN innovation
A
rtesyn has provided innovative computing platforms for virtualized and cloud RAN applications to some of the largest telecom operators, system integrators and equipment providers in the world. With public demonstrations supporting mini-cRAN, vRAN, multi-access edge computing, augmented and virtual reality, and autonomous vehicle control, Artesyn’s computing platforms are the foundation for emerging smart city infrastructure, 4G and 5G networks, and the monetization of new consumer services by operators.
colour LCD screen size options of 7”, 4.3” and 3.5.” The new system, which can be expanded up to 12 call buttons and comes in a new updated 4000 series design, and also provides either coded access or proximity access on the standard kit, which is integrated into the standard size door panel with the proximity reader concealed behind the name plate window. Additional entrances can also be added up to a maximum of eight. It’s an easy to install, extremely user friendly but highly functional door entry solution.
Demonstrating Advanced IP Technology At Hikvision Insight 2018
New Two Wire Videokits
V
idex introduces a new 2 wire video entry kit that boasts a selection of colour monitors, integrated proximity for up to 50 users or coded access, and expandable to multiple doors and apartments. The wiring of these systems is very simple, enabling quick and easy installation, so they’re a great door entry solution for houses, flats, apartments and small offices. They’re very flexible too so can be expanded to accommodate additional entrances or videophones, should the need arise. The system’s features include a day and night camera with illumination, call progress LEDs and an optional second camera input at each entrance for additional security. Up to four devices can be fitted within each apartment with the additional benefit of intercommunication between devices, meaning the video kit is a great choice for residential entry. A choice of videophones and handsfree monitors are available in both the 6000 series style and the Kristallo style with 92
G
JD, an official Hikvision Technology Partner will be showcasing its complete range of IP security solutions at the Hikvision Insight 2018 events, which are taking place throughout March. Hikvision Insight will visit five cities during March 2018 bringing the latest technologies to security installers and system integrators across the United Kingdom and Ireland. During each event, GJD will show visitors demonstrations of its products in real-world applications. Mark Tibbenham, GJD’s Managing Director commented, “We are really proud to join Hikvision’s group of partners. The GJD and Hikvision integration delivers world class IP solutions, which are suitable for a wide range of sectors.” Mark continues, “We are looking forward to exhibiting at the Hikvision Insight event series. We will demonstrate our IP solutions, while at the same time show visitors the advantages of connecting our technology with Hikvision.” Andy Keeley, Head of Marketing at Hikvision comment-
SecurityLink India ■ March 2018
product showcase
ed, “We’re looking forward to GJD joining us at our Hikvision Insight events across the UK & Ireland next month. As one of our technology partners we’re excited to see the seamless integration between Hikvision and GJD’s technologies bringing a total security solution.” GJD’s professional IP technology is perfect for perimeter surveillance. By combining GJD’s external detectors and illuminators with CCTV Surveillance, the security perimeter is moved out from the building, which deters intruders from entering the property.
video timeline and call up specific recorded video within the Playback mode. 3. Application server redundancy makes sure that Valerus users will never lose important data in case of a server failure. The redundant application server license is available free to Valerus PRO tier users. 4. Valerus-ViconNet Gateway provides users Vicon’s legacy ViconNet systems with a bridge to connect existing cameras to a new Valerus system. Users can take advantage of the Valerus interface, features and flexibility while preserving the value of their previous investment, and benefit from more affordable expansion options moving forward. “Since the launch of Valerus, the response from our customers has been universally positive, as they appreciate the simplicity the system brings to any size VMS installation. With the new features and H.265 support included with Valerus 18, we expect to further enhance the experience for all our customers, including those using older ViconNet systems who can now easily migrate to the Valerus platform,” said Bret McGowan, Vicon’s Senior V.P., Sales and Marketing.
Valerus VMS Version 18
Cloud Security Offering for Cloud Providers
H.265 support, plus new tools to simplify security and operation
V
icon Industries, Inc., has recently announced the upcoming release of Valerus 18, the most significant update yet to its popular video management software. With this latest release, Valerus provides enhancements to its user interface, new data backup and security options, and support for H.265 cameras. It also introduces a new module, ValerusViconNet Gateway, that provides a simple and affordable migration path for users of Vicon’s legacy platform to benefit from all of Valerus’ features and capabilities. 1. Support for H.265 compression allows Valerus users to take advantage of HEVC video from the latest generation of IP cameras. H.265 video can provide up to 50% savings in storage space and bandwidth usage compared to H.264, while maintaining the same level of video quality. 2. Interface improvements make it easier to navigate the
Simplifies deployment and management in Hybrid and multi-cloud environments
P
alo Alto Networks® welcomed more than 10,000 attendees to the Epic Cloud Security Event, and showcased how it is infusing new cloud capabilities into its next-generation security platform designed to prevent successful cyberattacks in the cloud. The forthcoming advancements, will provide customers operating in hybrid and multi-cloud environments with a comprehensive, consistent security offering that integrates directly with cloud infrastructure and workloads. In an upcoming study conducted by ZK Research, 86 percent of respondents indicated that their organization stores and manages data across multiple cloud infrastructure providers. Maintaining a consistent and effective security
SecurityLink India ■ March 2018
93
product showcase
Today’s organizations are challenged by the speed at which the shift to public cloud is occurring. Driven by the demands of the business, many organizations deploy cloud infrastructure quickly and develop cloud-based applications without consideration for the cybersecurity implications. The advancements announced today will enable our customers to fully embrace all of the benefits provided by the cloud while ensuring that their critical information is protected and that successful cyberattacks are prevented – Lee Klarich Chief Product Officer, Palo Alto Networks posture in these multi-cloud environments becomes especially cumbersome because the security capabilities that are native to cloud providers can only be configured to protect the infrastructure for which it was developed. These native capabilities must also be supplemented for effective cyber breach prevention, and failure to do so could leave an organization vulnerable to data loss or exposure. The cloud evolution demands a new model of cybersecurity that is specifically designed to address its nuances; provide frictionless deployment and management of effective security capabilities; and enable security, operations, networking and development teams to meet the demands of agile organizations. Customers of Palo Alto Networks benefit from consistent security for modern cloud environments including: ●● Consistent protections across locations and clouds: Palo Alto Networks Next-Generation Security Platform will extend cloud workload protections to the Google® Cloud Platform, in addition to enhanced capabilities for AWS® and Azure® environments. ●● Cloud-resident management: Panorama™ network security management will be supported in all major clouds, offering simplified and centrally managed deployment and management for all Palo Alto Networks next-generation firewalls and VM-Series virtualized next-generation firewalls, regardless of form factor or location. ●● Automation integrations for frictionless workflows in multi-cloud environments: Enhanced auto-scaling for AWS and added support for Azure security center and Google cloud deployment manager will simplify security deployments and enable scaling based on changing cloud demands. Integrations with Terraform® and Ansible® will 94
automate workflows and policy management. ●● Continuous data security and compliance for all three major clouds: New protections will be provided by Aperture™ security service to enable discovery and monitoring of cloud resources, guard against sensitive data loss, enable monitoring for risky or suspicious administrator behavior, and provide additional protection against security misconfigurations and malware propagation. ●● Prevention of zero-day attacks: Traps™ advanced endpoint protection will prevent zero-day attacks for Linux workloads across all major clouds, in addition to the existing support of Windows® workloads. Updates to VM-Series virtualized next-generation firewalls, Aperture security service, Panorama and Traps are targeted for general availability in March 2018.
New Line of Solutions for SMB Market Contact center workforce engagement offerings that are easy to implement, easy to use, easy to maintain. Small and medium-sized business solutions available through company’s extensive partner network
V
erint®Systems Inc., the customer engagement company™, has announced its contact center workforce engagement offerings specifically designed for today’s small and medium-sized businesses (SMBs). Verint’s purpose-built SMB solutions provide a simple, modern approach to customer engagement, and rapid time to value. Because they are easy to implement, easy to use and easy to maintain, companies can cost-effectively heighten contact center workforce engagement, enhance service quality, optimize performance and meet compliance requirements. The new Verint SMB offerings are available in the cloud and on-premises, and include: ●● Compliance recording: Captures, archives and retrieves interactions across channels – such as voice, including mobile, and instant message communications – and helps reduce risk to confidently meet strict compliance de-
SecurityLink India ■ March 2018
product showcase
mands. In addition to traditional voice calls, the solution records customer interactions across unified communications platforms such as Microsoft Skype for Business and Cisco Jabber. ●● Recording and quality management: Captures, replays and evaluates customer interactions across communications channels. Leveraging the technology, organizations can bring a focused approach to employee coaching and training. ●● Workforce management: Simplifies forecasting and scheduling, while helping manage and reduce costs, advance workforce efficiencies and drive operational excellence. As employees expect the work environment to adapt to their personal lives, Verint solutions are helping businesses evolve with mobile apps and built-in support for flex scheduling and adherence. ●● Workforce optimization: Combines recording, quality management and workforce management, bringing a holistic approach to ensuring the right employees with the right skills are available at the right time, supporting quality and compliance requirements, and sharing intelligence to improve workforce engagement and customer service operations. “Verint SMB offerings are changing how small and medium-sized businesses approach customer and workforce engagement,” says John Goodson, Senior Vice President and General Manager of products at Verint, “Our partners can easily integrate these offerings with other contact center solutions, providing customers maximum flexibility with low total cost of ownership.”
installed aboard helicopters, UAVs and fixed-wing mission aircraft. Its superior precision and target accuracy make it the sensor of choice for surveillance of large sea and coastal areas against piracy, trafficking or illicit intrusion. “HENSOLDT capitalizes on decades of experience in airborne and space radar,” explains HENSOLDT CEO Thomas Müller, “Thus we are able to translate our unique radar capabilities into an innovative product which gives defence and security forces more and better information to counter threats to their citizens’ safety and well-being.” Due to its software-defined radar modes and electronic beam steering, PrecISR can fulfil different tasks virtually at the same time. It is able to detect, track and classify thousands of objects and thus literally find the ‘needle in a haystack.’ Because of its compact design and the fact that all power consuming parts are located outside of the airframe, the airborne platform integration of PrecISR is simplified significantly compared to other radars. PrecISR is in the fullscale development phase. A fully functional flying demonstrator is expected to exist in about one year’s time and a series product in 2020.
VMS v6.10
PrecISR™ New Airborne Surveillance Radar PrecISR uses new technologies to detect threats on the ground, at sea and in the air
H
ENSOLDT is developing an innovative airborne multimission surveillance radar which will provide armed forces and border protection authorities with unprecedented situational awareness and extremely short reaction times. The software-defined radar named PrecISR™ translates latest achievements in active array and digital receiver technology into a scaleable high-performance sensor which can be
Delivering Powerful New Benefits
W
avestore, the British developer of innovative openplatform and highly secure Linux-based video management software (VMS), has launched v6.10 enabling simplified camera setup alongside new features and performance enhancements. Automatic camera configuration has been introduced for ONVIF compatible cameras, greatly reducing the time it takes to set up systems on-site. Integrators can now simply discover all cameras on the network and apply common ONVIF stream settings for each camera as a Wavestore generat-
SecurityLink India ■ March 2018
95
product showcase
ed profile, without having to use the camera’s setup screens. For projects with a large number of servers, systems integrators can simply create a single customised configuration file and roll it out across all Wavestore units, greatly reducing the time spent when commissioning larger projects.
Two-way audio
in-breed third-party access control technology. Furthermore, significant improvements have been made to Wavestore’s Honeywell Galaxy Interface integration, including the ability to trigger custom events from the panel using SIA level 4, and a new function to use new event types to automatically react on an alarm.
W
avestore’s VMS already delivers lip-synchronised audio as standard but v6.10 fully integrates compatible ONVIF cameras with built-in microphones and speakers to be used as part of a cost-effective two-way audio system. Operators simply click the microphone button on the WaveView client for an individual camera, or a group of cameras, to converse with people or broadcast messages across a site quickly and easily. Audio is included in each channel license and recorded onto a separate track, which is time synchronised and can be played back with associated video from any selected camera.
Minimal joystick control latency
I
n addition, major improvements have been made to minimise the latency when using joystick controls, a common problem for network based security systems, providing users with accurate control of connected ONVIF PTZ cameras and Axis’ native HTTP PTZ protocol. Wavestore v6.10 also introduces a new ‘recording less than intended’ event rule that can be applied to individual cameras. If a configured recording period will exceed the available storage, and previous footage is in danger of being overwritten, then an event can be triggered such as sending an e-mail to an administrator.
Flexible
“
The success of Wavestore’s VMS depends more than ever on our flexibility, adaptability and responsiveness to the needs of our customers,” says Julian Inman, Head of Product Management, “Many of the enhancements we are delivering in v6.10 are in direct response to customer feedback as Wavestore’s VMS is used in an ever-increasing number of projects around the World.” Wavestore has also introduced a host of new third-party integrations to its VMS and welcomes new technology partners to its ongoing integration programme. These include SALTO ProAccess SPACE access control software and Texecom Premier Elite intruder alarm solutions, combining leading video management from Wavestore with best96
System Builder Program Enabling the Milestone Community to Deliver Hardware with XProtect Software
M
ilestone Systems announces a new global program for hardware partners in the Milestone community. This unique open program enables hardware manufacturers to ship their servers, clients and storage solutions powered by Milestone XProtect software. The Milestone Channel Partners and customers will benefit from tested and validated hardware configurations from leading hardware manufacturers. With XProtect Essential+ preloaded on the hardware, the System Builder Program enables easy deployment of the Milestone award-winning VMS with just a few clicks, or rapid upgrade to one of the more advanced editions through a Milestone channel partner. Milestone supports the VMS software, ensuring a worldclass operation and maintenance experience, while the hardware partners joining the System Builder Program will leverage their existing support structures. This initiative extends the market reach for all community partners beyond the markets Milestone already targets with the Husky NVR offerings.
Accelerating the community
I
n addition to the XProtect functionality, Milestone customers also get access to the many software add-on options from Milestone Solution Partners and the wide range of more than 7,000 supported camera models and other hardware devices. The hardware partners in the Milestone System Builder Program who ship products with the Milestone VMS software will be able to design hardware to fit specific surveillance market segments, and will benefit from the opportunity
SecurityLink India ■ March 2018
product showcase
to tap into the IoT and Artificial Intelligence market through the solution power of the Milestone community. Milestone customers will benefit from a wider range of tested and validated hardware with XProtect preloaded, which contributes to an optimal user experience, system performance and return on investment. Milestone Solution Partners will discover new business opportunities by adding their solutions to an even wider installed base of XProtect software. Milestone resellers and integrators will benefit from easier deployments on hardware configurations that are tried and tested and will discover additional upsell opportunities from a wider range of customers starting right away with XProtect Essential+. “The System Builder Program is all about ease of deployment. Customers can now get the XProtect experience on their hardware of choice in a few clicks. Nobody else is doing this,” says Bjørn Skou Eilertsen, CTO of Milestone Systems, “Customers will also be able to easily enter the world of intelligent video solutions by tapping into the rich spectrum of add-ons from Milestone Solution Partners.”
QVR Pro A professional NVR on NAS with storage expandability and an intelligent IoT-based event management platform
Q
NAP® Systems, Inc., has released QVR Pro , a surveillance app that runs alongside the NAS OS as an independent operating environment. QVR Pro turns a QNAP NAS into a professional NVR solution with the advantages of NAS storage expandability and integration with a wide range of IoT devices for an enhanced surveillance experience. QNAP also released a mobile version of QVR Pro Client, providing users greater management and monitoring convenience while on the go.
Independent storage and scalable capacity
Q
VR Pro has a ‘dedicated storage space’ on NAS to ensure that the storage is fully reserved for QVR Pro and the performance will not be impacted by other applications
on NAS. As the need for storage space grows with time, users can easily expand their storage capacity by connecting QNAP expansion enclosures to their NAS or by using the unused storage of another QNAP NAS.
Smarter event management system
Q
NAP provides various APIs for users to quickly integrate a wide range of cameras, configure event alerts and recordings. IoT devices can also be used to make the surveillance system securer and more intelligent.
Powerful camera management and support
Q
VR Pro supports thousands of camera models from over 140 brands and a variety of image formats, allowing users to quickly build different surveillance solutions tailored to their environments while providing convenient camera management. Users can search for cameras over different networks, add/ manage cameras in batches, use 360-degree cameras, and assign dedicated network interfaces to cameras.
Flexible recording space allocation and failover capabilities
U
sers can pre-allocate storage capacity and assign dedicated storage space for each camera’s recordings based on the camera’s monitoring scope and importance. To ensure uninterruptable recordings, users can set a spare volume in the recording space. If the original volume fails, recordings can be stored on the spare volume.
Cross-platform monitoring and management with QVR Pro Client
T
he QVR Pro Client can be installed on Windows® and Mac® devices or in HD Station on QNAP NAS. Users can flexibly switch from live view or playback mode to take full control over monitored areas. The newly-released mobile app provides multiple display layouts and allows users to monitor multiple channels simultaneously while on the go.
SecurityLink India ■ March 2018
97
SECURITY OFFICERS & EXECUTIVE
FIRE SAFETY MANAGER
FIRE & SAFETY OFFICER
Company: Acumecc Solutions
Company: SNS Systems
Company: Pentagon Global Solu-
Exp: 0-4
Exp: 0-3
tions Limited
Location: Delhi/NCR
Location: Pune
Exp: 1-5
Job Id: 191217007567
Job Id: 120218000568
Location: Delhi/NCR Job Id: 051017006418
OFFICER - SECURITY
SECURITY OFFICER EXSERVICE MAN / CIVILIAN
Company: AAPC India Hotel Man-
Company: Aparna Property Manage-
Company: Chemplast Sanmar Ltd
agement Pvt. Ltd.
ment Services Private Limited
Exp: 10-15
Exp: 3-5
Exp: 6-11
Location: Salem
Location: Pune
Location: Bengaluru/Bangalore
Job Id: 100218000301
Job Id: 120218901056
Job Id: 020218002119
SECURITY OFFICER
PERSONAL SECURITY OFFICER (PSO) - V
SECURITY MANAGER
OFFICER SECURITY & ADMINISTRATION
Company: Investors Clinic Infratech
Company: CBRE South Asia Pvt Ltd
Company: G.D. FOODS MFG. (I) PVT.
Pvt ltd
Exp: 4-6
LTD
Exp: 5-10
Location: Mumbai
Exp: 25-30
Location: Noida
Job Id: 050218006852
Location: Amritsar
Job Id: 040917002708
SECURITY GUARDS
Job Id: 251217001743
SECURITY SUPERVISOR
SPECIALIST CORPORATE SECURITY
Company: Aqua designs india ltd
Company: Viraj ProямБles Ltd
Company: Fidelity Business Service
Exp: 3-8
Exp: 9-14
India Private Limited
Location: Chennai
Location: Tarapur
Exp: 3-5
Job Id: 120218001947
Job Id: 231217003162
Location: Chennai Job Id: 090218901429
SECURITY SUPERVISOR, SENIOR OFFICER - SECURITY SECURITY MANAGER Company: Cement Company:Orient Antomech Technologies Exp: 3-7 India Private Limited Location: Exp: 7-9 Jalgaon Job Id: 140716006901 Location: Delhi/NCR
Job Id: 010218001880
AREA LOSS SECURITY MANAGER PREVENTION MANAGER Company: Idea International Company: Reliance Industries Ltd Exp: 5-10 Exp: 3-8 Location: Location: Bengaluru/Bangalore Hyderabad / SecunderJob Id: 120716006216 abad Job Id: 100218003655
PLAN YOUR
NEXT CAREER MOVE Top Jobs. Top Companies @ Naukri.com
ASSOCIATE MANAGER - FIRE SAFETY Company: Lodha Developers Pvt Ltd Exp: 5-10 Location: Mumbai Job Id: 090218004542
TOP NAUKRI JOBS TOP NAUKRI JOBS SECURITY OFFICER SECURITY OFFICER
ASSISTANT MANAGER ASSISTANT MANAGER SECURITY SECURITY
SECURITY MANAGER SECURITY MANAGER
Company: The Indian HotelsHotels Com- Com-Company: Hyatt Regency Gurgaon Express Infrastructure Pvt Pvt Company: The Indian Company: Hyatt Regency GurgaonCompany: Company: Express Infrastructure pany Limited pany Limited
Exp: 3-4 Exp: 3-4
Ltd
Exp: 2-5 Exp: 2-5
Location: Gurgaon Location: Gurgaon
Exp: 3-5 Exp: 3-5
Location: Mumbai Location: Mumbai
Job Id:Job 130917900602 Id: 130917900602
Location: Chennai Location: Chennai
Job Id:Job 090218900543 Id: 090218900543
Ltd
Job Id:Job 080118008356 Id: 080118008356
LOSS LOSS PREVENTION OFFICER SYSTEMS OPERATOR SASTER MANAGEMENT OFFICER PREVENTION OFFICERSECURITY SECURITY SYSTEMS OPERATOR SASTER MANAGEMENT OFFICER FIL India and and Company: National Heart Institute Company: Wipro Wipro BPS (ABPS division of Company: (A division ofCompany: Company: FILBusiness India Business Company: National Heart Institute Wipro Wipro Limited) Limited)
Research Services PrivatePrivate Limited Research Services Limited Exp: 1-3 Exp: 1-3
Exp: 2-4 Exp: 2-4
Exp: 2-3 Exp: 2-3
Location: Delhi/NCR Location: Delhi/NCR
Location: ThaneThane Location:
Location: Gurgaon Location: Gurgaon
Job Id:Job 020218004449 Id: 020218004449
Job Id:Job 080218003867 Id: 080218003867
Job Id:Job 060218900758 Id: 060218900758
SECURITY GUARD SECURITY GUARD
SECURITY OFFICER SECURITY OFFICER
SECURITY MANAGER SECURITY MANAGER
Company: Ina elite Pvt Pvt Company: Alembic Pharmaceuticals Company: PVR LIMITED Company: Inahospitality elite hospitality Company: Alembic Pharmaceuticals Company: PVR LIMITED Limited Limited
Exp: 1-4 Exp: 1-4
Exp: 1-5 Exp: 1-5
Exp: 7-12 Exp: 7-12
Location: Mangalore Location: Mangalore
Location: Bengaluru/Bangalore Location: Bengaluru/Bangalore
Location: Vadodara/Baroda Location: Vadodara/Baroda
Job Id:Job 010218006464 Id: 010218006464
Job Id:Job 080218003434 Id: 080218003434
Job Id:Job 050218004405 Id: 050218004405
Ltd
Ltd
SECURITY SUPERVISOR SECURITY SUPERVISOR
SECURITY EXECUTIVES / SECURITY EXECUTIVES / SENIOR SECURITY EXECUTIVES SENIOR SECURITY EXECUTIVES
Company: Golkonda Hospitality Ser- SerCompany: Smartzone Aviation Company: Smartzone Aviation Company: Golkonda Hospitality
SECURITY EXECUTIVE SECURITY EXECUTIVE
Company: The Retreat Hotel And Company: The Retreat Hotel And
vices And Resorts Limited vices And Resorts Limited
Exp: 1-3 Exp: 1-3
Convention CentreCentre Convention
Exp: 2-3 Exp: 2-3
Location: Bengaluru/Bangalore Location: Bengaluru/Bangalore
Exp: 1-4 Exp: 1-4
Location: Hyderabad/Secunderabad Job Id:Job 020118003983 Id: 020118003983 Location: Hyderabad/Secunderabad
Location: Mumbai Location: Mumbai
Job Id:Job 070218006214 Id: 070218006214
Job Id:Job 010218004264 Id: 010218004264
SECURITY SUPERVISOR SECURITY SUPERVISOR
SECURITY SUPERVISOR SECURITY SUPERVISOR
SENIOR SECURITY OFFICER SENIOR SECURITY OFFICER
Company: LarsenLarsen & Toubro Limited Company: MayurMayur Sales Pvt. Ltd. Company: & Toubro Limited Company: Sales Pvt. Ltd.
Company: Krishna Institute of MediCompany: Krishna Institute of Medi-
Exp: 10-20 Exp: 10-20
Exp: 3-8 Exp: 3-8
cal Sciences Ltd. Ltd. cal Sciences
Location: Chennai Location: Chennai
Location: Kolkata Location: Kolkata
Exp: 10-15 Exp: 10-15
Job Id:Job 070218001617 Id: 070218001617
Job Id:Job 030218003018 Id: 030218003018
Location: Hyderabad/Secunderabad Location: Hyderabad/Secunderabad Job Id:Job 310118007815 Id: 310118007815
Apply for these Jobs Jobs Apply for these 1. Login to www.naukri.com 1. Login to www.naukri.com 2. Type the Job in ID thein‘Search Jobs’ Jobs’ Box Box 2. Type theID Job the ‘Search 3. Click the ‘Search’ button 3. Click the ‘Search’ button
5,00,000 JOBSJOBS 5,00,000 NAUKRI ON MOBILE NAUKRI ON MOBILE
product showcase
Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)
“Security Link India” payable at New Delhi dated__________
* Please subscribe through admin@securitylinkindia.com
WE ARE UPDATING OUR DATABASE For free listing in Database:
For
Advertisement Contact: editor@securitylinkindia.com
* Send your detail to admin@securitylinkindia.com
Security Link India, H-187/5 (1stFloor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New �elhi-11� �1�, IN�IA � �el: ��1 11 �������7 � �ele�a�: ��1 11 ��8�8�8� � �ebsite: www.securitylinkindia.com 100
SecurityLink India ■ March 2018