SecurityLink India Magazine February 2019

Page 1

February 2019

Volume III • Issue 7 • Monthly • New Delhi (102 pages including 6 for cover) RNI No. DELENG/2016/68892

` 200/-

MEET THE CONSULTANTS

The Top Trends 2 019 Star Rating for PSAs Intelligent Video for in-Store Shopping Women s Safety: Freedom not Feardom

NATIONAL PRESIDENT






Infinova VS-series camera provides unbeatable perimeter prot range performance, reliability, and built-in analy Infinova VS-series camera provides unbeatable perimeter prot range performance, reliability, and built-in analy

VS110 VS110

2MPSmart SmartHDR HDRStarlight Starlight 2MP BoxCamera Camera Box

● People Coun ng

● Vandal Detec on

● Crowd include: Density Detec on ● Outstanding Mo on Detec on performance features ●●Crowd PeopleDetec Coun on ng ●●Fight Detec on Detec on Crowd Density ●●Queue on on CrowdLength Detec Detec

● ●Cross-Line Deteconon Vandal Detec ● ●Invasion Detec on on Mo onDetec ● ●Una ended Object Cross-Line Detec Dete on

n

● Fight Detec on

● Invasion Detec on ● Una ended Object Dete

n

● Queue Length Detec on

World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com Infinova Middle East (Kuwait): Office # 13, 5th Floor, Deema Tower, Mirqab, Kuwait Landline and Fax: +965-2247-5678, Email: Sales-ME@infinova.com

VS120 VS120

2MP Smart Starlight 2MP SmartCamera Starlight Minidome Minidome Camera





From the Editor’s Desk

(102 pages including 6 for cover) Volume III • Issue 7 • February 2019

®

®

ISO 9001-2015 CERTIFIED

Dear Readers,

Editor-in-Chief Santosh Pathak

Greetings from SecurityLink India! 2019 is the year of Election for the Union Government of India (Parliament) where the incumbent National Democratic Alliance (NDA) Government led by BJP appears to have lost the likes of 2014 charisma thanks to various socio-political whys and wherefores. Amidst obvious rants and gossips, which make the phenomena usually noticed during the election phase, the most anticipated Interim Union Budget 2019 is out that has generally been branded as the last arrow in the quiver of Modi’s Government to mend the depletion. Surprisingly however, unbiased and apolitical economic experts are applauding the budget, and Modi is acclaimed to have portrayed Santa Claus by provisioning – either big or small – for almost every section of the Indian populace. Even oppositions endorse it by their criticism of it being election-centric – more pro-mass to allure voters in the time of upcoming election. Though the budget does encompass elements of populism, prudence prevails with the fiscal deficit stated to be contained at 3.4%, and this populist and election-oriented flavor can be balanced only by restraining the deficit to minimal. The budget has declared some significant developments for the Private Security Industry which largely falls in the ambit of Micro, Small and Medium Enterprises. GST registered SME units will get 2% interest rebate on incremental loan of Rs.1 crore, thus easing their access to organized credit facilities. Further, it is made mandatory for government projects to source 25% of their requirements from SMEs; and at least 3% of that will be sourced from women entrepreneurs. The budget also announced the government’s plan to develop a National Artificial Intelligence portal, which will remarkably boost the research and development drive in the country, as well as the inclination of IP surveillance towards AI technology. In this era of technologies, Artificial Intelligence is one of the most warranted technologies for humankind. Besides, the government has allocated a lion’s share for the transportation sector which will buoy up the ongoing and upcoming surveillance projects in railways and roadways. The New Year ushered many positive advances for the PSI. Recently, CAPSI and QCI have signed a Memorandum of Understanding (MoU) to operate a voluntary certification and rating programme called ‘Security Agencies Rating Scheme (SARS)’ for the private security agencies (PSAs) whereby PSAs will be rated to several levels based on PSARA as well as certain international criteria including ISO. It will help PSAs enhance their credibility and business. Earlier the Goods and Services Tax (GST) for the private security services was brought under the reverse charge scheme whereby the principal employers are made liable to pay GST, and not the security agencies. That ended a long pending demand of the industry. With numerous interesting editorials, this issue of SecurityLink India carries glimpses of Intersec 2019 which concluded in Dubai last month. This month, we will participate in FSIE 2019, and will bring you its updates in the next issue. Till then, stay safe and happy reading! With warm regards,

10

Santosh Pathak Mob: +91 9968172237

Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Vibha Dixit Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)



NATIONAL ROUNDUP

FEBRUARY 2019

CONTENTS WHITE PAPER The Top Trends of 2019 Powered by Transformative Technologies

46

NATIONAL ROUNDUP 16 18 20 22 23

Star Rating for PSAs Hikvision’s Recent Events in India Detection of Cellphone While Driving Robust & Comprehensive Cloud Security Service FFT Celebrates 100th Controller Sale in India

24 25

GajShield Named in Gartner’s Magic Quadrant Advanced to Protect Mumbai’s Shopping Destination

Iris ID iCAM 7S Series Certified by Indian Agency 26 COSEC Access Control Solution

FEATURE ARTICLES Intelligent Video to Transform in-Store Shopping Experience

32

How VMS Ensures Security of Healthcare Facilities

38

Women’s Safety: Freedom not Feardom

44

2019 Data Privacy Benchmark Study

56

Getting Switched on to Low Light

57

Data Show Demand for Cybersecurity Professionals Accelerating

59

INTERSEC 2019

71-75

12

INTERNATIONAL UPDATES

76-89

SecurityLink India ■ February 2019


NATIONAL ROUNDUP

150 SecurityLink India â– February 2019

13


NATIONAL ROUNDUP

FEBRUARY 2019

CONTENTS INTERVIEWS 28 Pankaj Dharkar

President, PDA Consultants

34 Pawan Desai

Co-Founder & CEO, MitKat Advisory

K P Dominic

National President, FSAI

40

APPLICATION/ CASE STUDIES Nedap Equips Belgian Medical Center 60 Gemalto Secures IoT connectivity for AT&T 61 Dahua Secures Hotels at CICA Shanghai 62 National Commercial Bank Chooses IdIS 63 Maxxess Integrates Security at Bluewaters Island, Dubai 64 Raytec Provides Lighting Solution for Lebanon Palace

PRODUCT SHOWCASE

14

65 66 67 68 69 70

Identiv Secures Two New Banking Wins Vanderbilt Safeguards Greece’s Civic Projects 3xLogic Improves Safety at Littleton Public Schools HID Upgrades Security at University of Hull Brainchip Delivers VAs to Govt. Agencies in Europe Dallmeier’s Smart Casino Solutions

90-97

SecurityLink India ■ February 2019


NATIONAL ROUNDUP

57

SecurityLink SecurityLink India India ■■February August 2019 2018

15


NATIONAL ROUNDUP

Security Agencies Rating Scheme (SARS) Star Rating for the Private Security Agencies

C

entral Association for Private Security Industry (CAPSI), the pre-eminent organisation for the security professionals in India and Quality Council of India

 The Star Rating of PSAs will prove to be a

real game changer for the entire private security domain. The evaluation processes developed jointly by Quality Council of India and CAPSI will bring out best service providers. The quality of service delivery and management of PSAs will ensure that end users will get PSARA plus services, and excellent customer care methodologies. It is going to change the face of the private security industry 

tee constituted by CAPSI and QCI. A consensus based technical criteria for PSAs would be formulated by the MSC, based on which agencies would be evaluated by the competent third party certification bodies. These certification bodies in turn would be accredited by the National Accreditation Board for Certification Bodies (NABCB), which is a part of the international system of equivalence of accreditations and certifications, in accordance with appropriate international standards. Security Agencies Rating Scheme is based on the criteria for certification. The developed technical criteria specify the requirements for a quality management system for the management, staffing and operations of a PSA providing uniformed security guarding services on a static site and/ or mobile and patrol basis, at different capability levels. The mandatory tenets of Private Security Agencies Regulation Act, 2005 (PSARA) have been

Kunwar Vikram Singh Chairman CAPSI & SSSDC (QCI), the country’s apex quality facilitation and national accreditation body have jointly embarked upon the process of standardization in the private security industry, and signed a Memorandum of Understanding (MoU) to operate a voluntary certification and rating programme for the private security agencies (PSAs). The programme has been christened as the ‘Security Agencies Rating Scheme (SARS)’ that will help PSAs enhance their credibility, and consequently multiply their business. While CAPSI and QCI shall be the joint owners of the scheme, the governing structure of SARS shall be under a multi-stakeholder steering committee (MSC), which will be supported by a technical and a certification commit16

 Security Agencies Rating Scheme (SARS) is

an excellent initiative by CAPSI & Quality Control of India that would set the benchmark of true performance, and thus bring the much-awaited satisfaction for the end users of security services. ASSOCHAM, as a leading chamber of commerce is privileged to be associated in bringing the thoughts of industries to the implementation programme  Anil Dhawan Co-Chairman, Homeland Security Committee ASSOCHAM

SecurityLink India ■ February 2019


NATIONAL ROUNDUP

 Trusted and well recognised system of certification stimulates to achieve robust quality management standards – both operationally and administratively. Star rating method shall be an indicator of grading on the basis of the levels of compliance and practice followed by the security group. Based on sound technical requirements, certification and star rating by CAPSI & QCI shall give both PSI and clients the confidence and assurance of providing high standard security services. Certification shall open new horizons for the PSI and shall provide a sound foundation for the recognition of this sector  C Pal Singh Former I G Police (Punjab) Honorary Director General (CAPSI) incorporated in the basic level of certification (Level 1) corresponding to One Star. The standard of professional competence is progressively enhanced and the top most level is pegged at Level 7 corresponding to a Seven Star rating. A PSA, depending upon its professional competency, may opt to be rated at any of these levels right at the beginning and that will not be subjected to progressive upgradations. While One Star rating corresponds to PSARA compliance, Three Star rating encompasses the basic PSARA criteria and certain essential management compliances to form Private Security Services Management System (PSSMS). Further, Five Star rating corresponds to the criteria laid down in ISO 90001(+) and Seven Star rating corresponds to the International ISO 18788. The intervening even number of Star Ratings will be given to the PSA that will maintain sustained compliance for three years in their present rating. Indian Private Security Industry (PSI) comprising over 22,000 PSAs and nearly 8.5 million security personnel (guards) is one of the largest employment generating sectors of the country. These guards are primarily employed and managed by PSAs who deploy them in

accordance with their contractual obligations with the respective principal employers. PSAs at large fall in the ambit of micro, small and medium enterprises (MSME). The guards deployed by the PSAs are mandatorily governed by PSARA, and are monitored by the controlling authorities of the states, which grant them licenses based on the parameters laid down in PSARA, for operating in that state. Albeit, no express parameters are laid down as on date whereby PSAs can be evaluated based on certain professionally accepted criteria. This factor acts as an impediment for the principal employers to take decision while they are in the process of identifying the most suitable

 The Private Security Industry is catching up with the increasingly competitive quality ecosystem. The market place will be replete with choices and companies will be vying with differentiators and brand values. Customers are savvy, extremely cost conscious and are consistently demanding certified standards of service that has been independently assessed and rated for quality deliveries. Security business leaders must raise the bar in their business value with assured quality star ratings because trust is a pre-requisite in referral business  Jasbir Wasu Vice-Chairman, Licencing and Legal, CAPSI

PSA whom they can entrust the task of providing security to their establishment. The Security Agencies Rating Scheme is going to make a great instrument to help them reach a right decision. Having complied with all the statutory requirements as given in the governing structure, SARS is going to be launched by the Hon’ble Minister of Commerce at the Special Standards Conclave scheduled to be held at Mumbai during 08-09 February 2019.

SecurityLink India ■ February 2019

17


NATIONAL ROUNDUP

Hikvision’s Recent Events in India Hikvision Expo in Eastern India’s Five Major Cities Creating Security Technology Awareness among Professionals

H

ikvision has recently organized successful events in the eastern India’s five major cities namely Bhubaneshwar, Guwahati, Kolkata, Ranchi and Patna respectively. These expos have been instrumental in creating security technology awareness in the eastern India’s emerging security market. “Hikvision is the world’s leading provider of innovative video surveillance products and solutions. Hikvision expo is being planned in India’s Tier-I and Tier-II cities to help the customers with technical knowledge about products. We have the most comprehensive products and security solutions in video surveillance, access control, intrusion system, smart home and storage categories,” said Ashish P. Dhakan, CEO and MD, Prama Hikvision India Pvt. Ltd., “The future of the security market in India is very bright due to robust growth prospects. We at Hikvision are offering the latest products and innovative technologies including artificial intelligence (AI), deep learning, big data, and IoT (Internet of things). Hikvision expo is our initiative to impart training and product knowledge to the channel partners and security professional community.” A comprehensive product introduction, live demos and training program were the key highlights of the Hikvision expos. Events got overwhelming response from the security professionals in all five cities. As claimed by the Hikvision team, it was a great experience for them to meet with potential partners and SIs. The expos were hosted by Hikvision team along with its respective regional distributors. The Hikvision team comprised Ayan Datta, Regional Sales Manager and Jitendra Sahoo, Business Manager, who started the event with their welcome speeches. The sessions was opened by Vinit Narvekar, Manager – Customer Trainings, who made presentations on various subjects such as Essentials of Video Surveillance, New Turbo HD Products and solutions, and New IP Technology & Solutions. He also acquainted the participants with artificial intelligence (AI) technology, and its applications in the video surveillance, face recognition and advanced video analytics; and elaborated on ANPR, UVSS, people counting, and robotics solutions. There were a special sessions on EZVIZ smart home solutions, VDP (IP + Analog) product portfolio and ITMS solutions. Ashish Gujarathi, AVP, non-CCTV products introduced intrusion alarm product portfolio and gave a live demo. The queries raised by the audience were patiently addressed by the Hikvision team and regional distributors thereof. Altogether, events were success. 18

SecurityLink India ■ February 2019


NATIONAL ROUNDUP

Hikvision Certified Security Associate (HCSA) Program Successfully Concluded in New Delhi

H

ikvision has recently concluded their Certified Security Associates (HCSA) Program in New Delhi. The three day HCSA training program received overwhelming response from the young security professional community, who came from the entire region of Delhi and NCR. The successful batch of the Program participants will receive HCSA certificates along with the enriching technology updates and product training experience. The comprehensive HCSA Program included training sessions on Optics basics, Turbo HD analog solution, PTZ configuration, network basics, IP camera, NVR, Fish Eye camera, iVMS 4200, and smart functions and applications. The program was conducted by Vinit Narvekar, Manager, Customer Trainings, Prama Hikvision India Pvt. Ltd. The idea behind HCSA is to give hands on training and demonstration to security professionals. A dedicated online examination is conducted after training sessions and HCSA certificates are given to the successful participants. “Hikvision has set the industry standard by offering professional video surveillance certification to validate video expertise under Hikvision Certified Security Associate (HCSA) program in India. This Hikvision certification program is specially designed for the security professionals. Besides, Hikvision provides meaningful endorsement to those who succeed in the exam and become Hikvision certified professionals,” said Ashish. The HCSA level certification focuses on training participants in essential configurations, and operations and maintenance of Hikvision video surveillance products and their features. It is designed for technical engineers, who have worked in the security industry for some years and have already gained knowledge and experience about security basics. The certification program is open to anyone looking to gain expertise in video surveillance and total security solutions. The trainee should have at least one year work experience in the security industry and be familiar with security basics.

CPhI & P-MEC India Expo: Showcasing Latest Machine Vision Products, AI Applications and Security Solutions

H

ikvision participated in the 12th edition of South Asia’s leading pharma event CPhI & P-MEC India Expo in Delhi-NCR to showcase its latest security and machine vision solutions to key stakeholders of the Indian pharma industry. The signature expo was supported by governing bodies such as Pharmexcil, CIPI and IDMA. “We are happy to be associated with CPhI & P-MEC India Expo. It is a perfect platform to connect with the pharma industry stakeholders to offer best-in-class machine vision products, artificial intelligence technology applications and security solutions in video surveillance, access control and intruder alarm categories,” said Ashish. The expo was inaugurated by Guests of Honour, Satish W. Wagh, Chairman, CHEMEXCIL; Dr. Dinesh Dua, Chairman, Nectar Life Sciences Ltd; Ravi Uday Bhaskar, Director General, Pharmexcil; KV Rajendranath Reddy, IPS, Director General, Drugs Control Administration, Government of Andhra Pradesh; Michael Duck, Executive Vice President, UBM Asia Ltd; and Yogesh Mudras, Managing Director, UBM India, amidst an august industry gathering. The Hikvision booth received overwhelming response from end-users of the pharma industry. This year’s edition witnessed participation from more than 1,600 exhibitors from 42 countries. Special pavilions by Pharmaceuticals Export Promotion Council of India (Pharmexcil), China Chamber of Commerce for Import & Export of Medicines & Health Products (CCCMHPIE) and China Council for the Promotion of International Trade (CCPIT) formed an intrinsic part of the expo. SecurityLink India ■ February 2019

19


NATIONAL ROUNDUP

LAUNCHES

AI & Deep Learning Powered

Detection of Use of Cellphone While Driving Technology

V

ideonetics launched one of World’s first AI & Deep Learning based ‘detection of use of cellphone while driving,’ an ultra-smart video-based technology that aims to detect in real-time the drivers using cellphones while driving four-wheeler, and consequently violating traffic laws and putting their lives at risk. According to World Health Organization (WHO), road crashes kill 1.25 million people and permanently disable another 50 million every year. At present, India accounts for the highest number of road deaths in the world. Amongst various, distracted driving behavior, and mobile phone usage has been identified as a primary source of driver distraction as it can induce drivers to take their attention off the road, thus making vehicle occupants more vulnerable to road crashes. Powered by patented AI & deep learning framework, ‘detection of use of cellphone while driving’ technology is trained with real-time video data of over

20

five years, thereby ensuring highest level of precision in identifying the most dangerous driving risks even in tough environmental conditions including night. The cutting-edge solution is well-competent to analyze gesture movement of the driver who is driving any type of four-wheelers including private car, taxi, jeep, lorry truck, and so on. After capturing the license plate of the violating vehicle with ANPR, the system generate alert with the evidence video. Additionally, events will be stored for later analysis. Detection of use of cellphone while driving can seamlessly integrate with integrated e-Challan management software to generate challans/ e-tickets with details such as violation image, time stamp, date and vehicle number etc. The enormous potential of the solution empowers Videonetics intelligent traffic management system (ITMS) suite to enhance real-time traffic monitoring, identify and process traffic offences; eventually it further modernizes the traffic management solution and

SecurityLink India ■ February 2019

establishes traffic regulation and enforcement across the city. Expressing on the launch, Dr. Tinku Acharya, Fellow IEEE, Founder & MD of Videonetics said, “This is indeed a proud moment to launch the world’s first AI & DL based detection of use of cellphone while driving solution technology, that promises to inculcate traffic discipline amongst citizens, increase road safety, build traffic management more robust, curb road accidents, eventually to make our country smarter and safe. “Our R&D team is continuously innovating state-of-the-art technologies for challenging environment with indigenously developed intellectual properties. Our intellectual property and trailblazing initiatives have won us several accolades, patents and recognitions from renowned platforms.” With this latest addition, Videonetics expands ITMS portfolio that encompasses automated number plate recognition (ANPR) system, red light violation detection (RLVD) system, no helmet detection, triple riding detection, free left turn block detection, over speed detection, traffic congestion detection, wrong parking detection, no parking detection, smart dashboard, data visualization to name a few. ITMS is successfully deployed at many cities such as Kolkata, Ranchi, Indore, Bhopal, Bangalore & many more, and has achieved benchmark in replacing tedious manual processes to track, regulate and analyze vehicle movement on roads, and to enforce traffic rules for safety of citizens towards success of national smart city mission.


NATIONAL ROUNDUP

With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.

Soft Facility Management

Hard Facility Management

Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.

Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.

Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.

www.sisindia.com A 5000 crore Indian multinational company

SecurityLink India ■ February 2019

21


NATIONAL ROUNDUP

PARTNER WITH

Delivering Robust and Comprehensive Cloud Security Service S

ymantec Corp., the hensive set of cloud-deworld’s leading cyber livered threat prevention security company and capabilities in a single Fortinet, a global player service offering on the in broad, integrated and market today. automated cybersecurity “As the first step in solutions, have recently this technology partnerentered into an expansive ship, we plan to deliver partnership agreement to the best-of-breed securi With today’s announcement, two industry leadprovide customers with ty through the combinaers are coming together to provide enterprise-class the industry’s most comtion of enterprise-class prehensive and robust advanced firewall concapabilities across cloud, network, and endpoint sesecurity solutions. Fortrols to Symantec’s incurity. Upon completion of the integration, Symantec tinet’s industry-leading dustry-leading network cloud web gateway customers will be able to benefit next-generation Firewall security service,” said from Fortinet’s enterprise-class advanced firewall (NGFW) capabilities Art Gilliland, EVP and controls, and for the first time ever, Fortinet cusare planned to be inteGM Enterprise Products, tomers will be able to purchase the industry-leading grated into Symantec’s Symantec, “Through this FortiGate next-generation Firewall via FWaaS. With cloud-delivered Web Separtnership, we hope to curity Service (WSS). provide joint customers the addition of Symantec as a Fortinet Fabric Ready Additionally, Symantec’s the power of Symantec’s Partner, Symantec’s endpoint security solution will industry-leading endintegrated cyber defense be validated to seamlessly integrate with the Fortipoint protection solutions platform bolstered by net Security Fabric platform to provide more consistare also planned to be inFortinet’s leading NGFW ent and effective protection for joint customers  tegrated into the Fortinet in an integrated solution Rajesh Maurya Security Fabric platform. that’s easy to use and deRegional Vice President, India & SAARC at Fortinet The technology partnerploy.” ship provides essential Additionally, Symansecurity controls across tec’s industry-leading endpoint, network, and cloud environments that are critical endpoint protection solution is planned to be integrated into to enforcing the zero trust security framework. the Fortinet Security Fabric platform, providing customers WSS, a leader in secure web gateways, is a simple-towith real-time, actionable threat intelligence and automated use, cloud-delivered network security service that provides response for exploit driven attacks and advanced malware. protection against advanced threats, provides access control, Interoperability between Fortinet’s SD-WAN technology and safeguards critical business information for secure and will also be certified to work with Symantec’s Web Security compliant cloud application and web use. The integration of Service through Symantec’s Technology Integration Partner Fortinet’s industry-leading FortiGate next-generation FireProgram (TIPP). As part of the collaboration, both compawall with Symantec’s WSS will result in the most comprenies plan to engage in joint go-to-market activities. 22

SecurityLink India ■ February 2019


NATIONAL ROUNDUP

FFT Celebrates 100th Controller Sale in India Thanks Austrade for its Assistance in Penetrating the Market

F

FT, the leading market supplier of fibre optic intrusion detection and location products, has announced the successful supply of its 100th premium high sensitivity intrusion detection controller by its Indian-based subsidiary, FFT India Pvt. Ltd. The company has also taken the opportunity to offer its considerable gratitude to Austrade (The Australian Trade and Investment Commission) for its diplomatic and introductory assistance across a number of vital project tenders. The occasion was marked by a cake-cutting ceremony held on in presence of the FFT team and Leonie Muldoon, Senior Trade and Investment Commissioner – South Asia at Austrade. The ceremony also recognised the continued assistance of Austrade – including direct support from the Senior Trade Commissioner herself, who recently took part in face-to-face meetings and championed FFT’s solutions as part of a successful tender. Sanjay Oberoi, Country Manager – India, FFT commented, “We are excited and very proud to have reached this considerable milestone in FFT’s penetration of the Indian market. Our high-end controllers provide premium long-range solutions for some of the most demanding and security-conscious installations in the world. This success is no small part thanks to the continued high levels of support from Austrade, who has whole-heartedly demonstrated its ongoing commitment to assisting Australian manufacturing and development businesses as they

trade around the world. We are immensely grateful to the Austrade team for their support.” Leonie Muldoon at Austrade said, “FFT is a great example of an Australian business that is flourishing in the Indian market by providing the very best solutions to its customers. We are

boast long range (up to 80km for perimeter fences or 110km for pipelines, on selected controllers), highly accurate event location, powerful artificial intelligence (AI) analysis and low installation costs, along with impressive safety and reliability, and seamless integration with third party systems and

proud to assist Australian businesses by leveraging our local relationships and commercial knowledge in markets such as India to ensure there are no unnecessary barriers to effective trade. We congratulate FFT on this impressive landmark achievement.” Having developed and manufactured fibre optic based sensing systems for security applications since 1994, FFT’s market-leading solutions deliver performance levels and cost advantages unavailable with other sensing technologies. FFT’s fibre optic systems

equipment. FFT’s technology is unique and proven time and again. FFT India Pvt. Ltd. has traded in India for the last six years. It has a local expert team of trained and certified engineers in the country which provide solution design, installation guidance, commissioning, training and on-site technical support (both under warranty and post warranty). The company has so far won over 50,000 kms of intrusion detection for perimeter, NLD backbone and pipeline intrusion detection.

SecurityLink India ■ February 2019

23


NATIONAL ROUNDUP

IS NAMED IN THE

Gartner’s 2018 Asia/ Pacific Context: ‘Magic Quadrant for Enterprise Network Firewalls’

G

ajShield Infotech, a leading provider of network, cloud and data security solutions is the only Indian vendor to be named in the Gartner’s 2018 Asia/ Pacific Context: ‘Magic Quadrant for Enterprise Network Firewalls.’

GajShield’s approach of looking beyond traditional security solutions and focusing on data first security strategy is a leap forward in the security solution industry that is helping enterprises to secure cloud and SaaS applications by implementing

 Over the years, our focus has always been towards building a strong platform in data visibility and prevention with application context to identify data anomalies and zero day threats. This has enhanced our product platform with superior data leak prevention and cloud security platform. We believe being the part of Gartner’s 2018 Asia/ Pacific Context: ‘Magic Quadrant for Enterprise Network Firewalls’ validates our products, services and support in addressing emerging threats before they impact our customer’s business. GajShield has been at the fore-front of building innovative network and data security solutions which helps enterprises to implement data first security architecture and strategy  – Sonit Jain CEO, GajShield Infotech GajShield is one of the few companies worldwide and the 1st Indian Firewall product company to have earned ICSA Labs Firewall Certification criteria 4.1. They are a leader in innovating security technologies like context based data leak prevention, cloud security, zero day anti-ransomware, OOPs based management and more. 24

a next generation Firewall solution. Addressing major security challenges and designing solutions based on the client’s needs with focus on remote and mobile user’s end point security, data leak prevention, better service turnaround time and end point performances has helped in constant product innovation, and creating advanced SecurityLink India ■ February 2019

real security solutions of today’s and tomorrow’s enterprise. GajShield’s progressive and constant innovation has allowed it to be ahead of the security solution curve while setting pace for the rest of the industry. This business approach is believed to have led GajShield to be recognized in Gartner’s Asia/ Pacific Context: ‘Magic Quadrant for Enterprise Network Firewalls’. “GajShield has been at the forefront of building innovative network and data security solutions which helps enterprises implement data first security architecture and strategy,” said Sonit Jain, CEO, GajShield Infotech. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. GajShield Infotech (I) Pvt. Ltd. focuses on providing network security solutions to corporates. Their mission is to ‘make the Internet a safe place to do business.’ GajShield is a leading security company having the distinction to have build an innovative context based security architecture in its next generation firewall solutions.


NATIONAL ROUNDUP

Advanced Selected to Protect Premier Shopping Destination in Mumbai Industry-leading fire panels from Advanced have been installed

I

norbit has emerged as one of Mumbai’s popular shopping destinations with its diverse and exceptional offerings in food, fashion and entertainment. Over the last 15 years of being in business, the mall has gained a huge fan following because of the unique shopping experience one can enjoy here. The Axis EN system, which has recently received globally recognised FM Approved accreditation, was installed by Advanced partner, Abhay Fire and Security Engineers, who were tasked with replacing the entire system including full re-configuration, programming and commissioning. The installation, covering the entire shopping mall including all public areas and retail units, comprises two networked 8-loop panels linked to the building management system, and exhaust and pressurisation fans for the building’s smoke control function. Hiren M. Shah, Proprietor at Abhay Fire and Security Engineers said, “Advanced are our first choice of panel every time, combining innovation, intuitive operation and reliability. The Axis

EN system was selected thanks to its auto-learn feature and straight-forward programming of multiple zones and outputs according to the requirements of each retail unit.” Available for European, Middle East and South East Asian markets, Axis EN is Advanced’s highest performance analogue panel range, combining 1-8 loop, fire panels configurable up to 200 panel networks with a complete range of wired and wireless loop devices and powerful peripherals. Axis EN, which is part of Advanced’s Axis range of systems, holds global approvals including EN54, UL864 and AS1670. It is designed to go anywhere where high quality, reliable and easy to use fire detection and control is required. Bharat Sharma, Division General Manager for Fire Safety Solutions in India said, “Due to their complexity,

SecurityLink India ■ February 2019

great consideration must go into the fire protection for retail developments, with the Inorbit Mall being no different. Advanced is renowned for making things easy, even on more complex installations, and its products enjoy a reputation for real quality and performance making them the fire systems of choice.” Advanced, owned by FTSE 100 company Halma PLC, have a long history of protecting some of the most high-profile retail developments around the globe including Westfield Shopping Centre, Sydney and One New Change, London. Advanced is a world leader in the development and manufacture of intelligent fire systems. The legendary performance, quality and ease of use of its products sees Advanced specified in locations all over the world, from single panel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging and false alarm management systems. 25


NATIONAL ROUNDUP

Iris ID iCAM 7S Series Certified by Indian Agency I

ris ID, a leading global provider of iris recognition technology, has recently announced that its iCAM 7S series has been certified by the Bureau of Indian Standards (BIS) under license number R-41110639. BIS is the national standards-setting body for India. The recently mandatory BIS certification attests to the safety, quality and reliability of electronic, medical, construction and many other commercial and consumer products. The iCAM 7S series and other company products are extensively used by India’s Unique Identification Authority as part of the country’s national identity program. Registrations, known as Aadhaar numbers, are used for Indians to apply for a passport, obtain a driver’s license, receive social services and many other daily activities. More than 1 billion citizens are enrolled in the program. Mohammed Murad, Vice President Global Sales and Business Development, Iris ID said that the BIS certification is similar to Underwriters Laboratories (UL) standards found throughout the world and the CE mark used in Europe. “We’re pleased to have received BIS certification as India is a very important market for Iris ID,” he said, “Our products are used not only by the government agencies, but also by many commercial organizations.” Once a product has passed BIS certification, manufacturers may use the agency’s mark on products used in India. Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications. Iris ID Systems Inc. has been active in iris recognition research, development and production since 1997. The company’s IrisAccess® is the world’s leading deployed iris recognition platform used in thousands of locations daily authenticating the identities of millions of people. More public and private organizations look to IrisAccess for iris based authentication than to all other iris recognition products combined.

COSEC Access Control Solution for Medium and Large Enterprises M

atrix COSEC Access Control Management is a comprehensive and flexible solution designed to meet access control needs of medium and large enterprises. This access control software allows controlling access on three dimensions simultaneously – user, zone and time, by answering three fundamental questions about who, where and when. In addition, the software ensures security of employees and assets with the help of value-added features like anti-pass back, 2-person rule, first-in user, blocked users, door auto re-lock, guard tour, man-trap and smart card based identification. ●● 65,000 devices and one million users. ●● Web based software module. ●● Centralized monitoring and control. ●● Multiple access control policies. ●● User, zone, time based access. ●● Informative reports. ●● SMS and email notifications on exception. ●● Integration with third party hardware. 26

SecurityLink India ■ February 2019


NATIONAL ROUNDUP

SecurityLink India â– February 2019

27


INTERVIEW

Interview

Pankaj Dharkar President, PDA Consultants

Pankaj Rajendra Dharkar, who was elevated form National President to International President of Fire & Security Association of India (FSAI) last year, has been passionately involved in providing innovative and energy efficient design solutions for building services for more than three decades. As the National President of FSAI, he took several remarkable initiatives which fructified well and became instrumental in the significant growth and expansion of the association. Fire and Security India Expo (FSIE) is one of those initiatives that he launched in 2017. Pankaj Dharkar established PDA (Pankaj Dharkar & Associates), a renowned MEP and Green Building Consulting Engineering Firm in 2006. In its constant dedicated pursuit for technical excellence, PDA has earned the reputation of providing quality engineering services in the field of designing and coordination of HVAC, IBMS, PHE, Fire Protection and Detection, Electrical, ELV, Lighting, IT, AV and Green Building Certification. PDA has the knowledge, experience and technical advancement to meet and exceed the anticipation of clients. It coordinates and executes wide range of projects of various applications such as hotels & resorts, offices, pharmaceuticals, hospitals, R&D labs, textile plants, commercial buildings & shopping malls & multiplexes, software and IT parks, high-rise apartments, banks, educational facilities, jewellery shops, manufacturing plants & garment factories, showrooms, exhibition centers, libraries, banquet halls, studios, cold storages etc. Fire and Security India Expo (FSIE) 2019 is close at hand; SecurityLink India recently spoke to him to understand his views on the current security and fire safety scenario in India, his plans and initiatives as the International President of FSAI and the journey of PDA. Some excerpts: SecurityLink India (SLI): What is the concept of green constructions and how far would it be able to reverse/ balance the environmental loss/ imbalance? Pankaj Dharkar: The green construction covers conservation of all aspects such as energy consumption, water consumption, lighting design, indoor air quality, choice of construction material, land fill, green areas, use of local material, architecture designed to provide optimum window wall ratio, orientation of buildings, use of renewable energies like solar and wind and geo thermal energy etc. Green building is an integrated approach of architect, MEP 28

consultant, lighting consultant, landscape consultant and the structural consultant which yields the desired results. The world does not have option but to opt for green technologies if we want our future generations to have sustainable life. SLI: How far the laws and rules of the land provision for the propagation of green constructions and what more do you recommend? Pankaj Dharkar: There is a good and increased awareness in the government which can be felt by the way the Min-

SecurityLink India â– February 2019


INTERVIEW

istry of Environment & Forest (MoEF) has functioned in the last few years. Their insistence to adopt Energy Conservation Building Code (ECBC) and the latest National Building Code (NBC) has automatically helped the country move towards more sustainable projects. PWD/ NBCC have started going with green certifications. Currently India has four green certification possibilities – GRIHA, IGBC, USGBC, and ASSOCHAM GEM. Some of the states and corporations have started giving incentives for additional floor area ratio (FAR) etc. I do believe states and central governments should come up with innovative concessions to inspire all developers/ stakeholders to ensure that only green constructions happen in the future. Currently the penetration of green buildings is just 5%. It is said that 70% of India still to be built by the year 2030. It is therefore important that the government create massive awareness programs. ECBC got implemented when the government introduced star labelling programs and advertised it extensively. Today each house lady knows that a five star AC or refrigerator is more efficient and saves energy for the household and these informed house ladies help their husbands make smarter choices. Similar revolution happened in lighting when LED was promoted by the government. I firmly believe similar initiatives have to be taken by the government for green buildings as well so that end customers (occupants) start demanding for green homes and offices from the builders and developers. Surely this will propagate green building environment in the country. SLI: How have the safe and smart city projects been doing so far, and what is the percentile of them on the ground promoting green constructions concept? Pankaj Dharkar: Out of 100+ smart cities proposed by the Prime Minister many have started shaping up. Each smart city has different vision and mission based on various constraints and challenges the city is facing. Two major green field projects which are fast taking shape are Amravati and Gift City near Gandhinagar. I’m fortunately associated with many buildings taking shape in Gift City and taking care of mechanical, electrical, plumbing and fire-fighting (MEPF) and green building consultancy work at the Gift City. I am very glad to put on records that this project is implementing all possible green aspects and smart city visions which includes centralized district cooling, centralized garbage collection system, centralized sewage treatment plant

(STP) and water treatment and several new concepts for fire control & a centralized command center. The list of initiatives at Gift City is endless. I strongly recommend people to visit Gift City and witness how the Prime Minister’s vision of smart city is getting implemented. SLI: Kindly share some of your completed and pipelined green projects. Pankaj Dharkar: PDA has completed and been associated with 60 projects which include 14 Platinum rated buildings, 17 Gold rated buildings and 3 GEM certified buildings. The total area of green projects covered by PDA as of today is 1,80,00,000 sqft. SLI: Which are some of your most satisfying projects so far and why? Pankaj Dharkar: The best project for me will always be Facet Diamond (Surat), having close to 3000 workers engaged in diamond polishing/ processing work. This project was completed in year 2003, though we went for certification in the year 2014 and achieved a platinum certification. This was the first project in diamond industry globally to get platinum certification. Also since this was completed early 2000, I feel extremely proud that our designs and engineering practices were always sustainable. SLI: Hi-rises and infrastructures such as hospitals are supposed to be, and are usually constructed under consultants’ guidance. However, the cases of hospital fires, collapse of buildings and other such incidents are on rise. Where do you see the lapses and how can these be minimized? Pankaj Dharkar: The current NBC 2016 gives special fire provisions for hospitals. I do believe if both passive and active provisions of NBC are rightly implemented the fire risks can be minimized. The codes go to the extent of recommending that no room can hold more than 3 liters of spirit or flammable liquids. The code also specifies what type of electrical cables to be used in hospital and smoke evacuation systems which needs to be integrated with smoke detection system. A high rise hospital must have good egress and adequate staircases width for effective evacuation. It is important that systems are tested and fire audits are conducted regularly so that in case of any incidents the active fire protection system works effectively to save expensive hospital equipment and invaluable human lives.

SecurityLink India ■ February 2019

29


INTERVIEW

SLI: Do legislations in India have provisions to check these lapses? Are they stringent enough, kindly comment? Pankaj Dharkar: Only Maharashtra state has enacted the fire law, and in Gujarat it is under implementation. I strongly believe that all 29 states and union territories must enact fire laws immediately to save deaths due to fire which are as high as 22500 every year. SLI: What as per you is the intelligent building management system, and what is the PDA’s method to easily accomplish it at projects? Pankaj Dharkar: PDA has an advantage of designing all building services in house and thus integrating them all seamlessly and efficiently. Today we are designing building automation systems for some of the country’s biggest and prestigious projects whether it is the country’s biggest Net Positive campus or the country’s biggest hotel. An intelligent BMS is something that should make the building easy to run and maintain, and that too in the most cost effective way. An intelligent building must adhere to global standards such as EN 15232 and ensure proper design keeping future needs and scalability of the building or smart city around it. SLI: How do you opt for the brand and technology while implementing security and surveillance in a building? Pankaj Dharkar: A brand that ensures the required SLA (Service Level Agreements) to our clients, and technology that suits the defined need of the building (no more or no less) is what we advise our clients to invest in. Security and surveillance needs vary from project to project and are carefully understood by us before we recommend anything to our clients. SLI: Lack of defined standards in security and surveillance implementations leads to the L1 way in India. How does it affect the security market and what are your recommendations? Do you see any change in the trend; kindly elaborate. Pankaj Dharkar: Through professional bodies like FSAI (Fire and Security Association of India), we are developing these much needed standards and helping the developers make safe and secure buildings. We are definitely seeing major shift in the trends. Several initiatives like the FIST (Finest India Skills and Talent) awards were taken during my tenure as the past National President of FSAI 30

which promote and encourage everyone including the developers, system integrators and OEMs to raise safety and security standards. SLI: What are your plans for FSAI as its International President? Kindly mention some of the initiatives you have taken for the association’s expansion and strengthening. Pankaj Dharkar: We have started working with global societies like National Fire Protection Association (NFPA). FSAI organises the special NFPA certification programs in India whereby this special certification costs just Rs.55000 to 60000 to the engineers. The earlier option was to visit USA and give this exam which was costing close to Rs.400000. These programs on sprinkler design and detectors etc., are also being attended by engineers from adjoining countries like Bangladesh, Nepal, Bhutan etc. We intend to intensify work with global societies and various expert domains to ensure engineers in India working in fire & security industry become globally competitive. Over the years we also intend to increase our membership in countries like Nepal, Bhutan, Bangladesh, Sri Lanka and Middle East countries. Our flagship programs like PACC (Project Architect Consultant Conclave) are now being attended by fire chiefs of Singapore, Bangladesh, Abu Dhabi etc. We intend to learn from developed countries and create awareness in countries that are more under developed than India. SLI: How do you foresee the success of FSIE 2019? Pankaj Dharkar: We launched FSIE in 2017 at Delhi that grew 25% in 2018 at Bengaluru, and is to grow another 25% in FSIE Mumbai by 2019 show. We want to ensure that FSIE becomes the largest fire and security show of the country. Currently we are part of Build Fair alliance (BFA) with ACREX & ISH which takes care of HVAC&R and Plumbing so FSIE completes all engineering services of the building. The last BFA was visited by over 45000 visitors at Bangalore and this number is likely to grow this year in Mumbai. SLI: Kindly share your points of view about Security Link India. Pankaj Dharkar: We need professional publications such as SecurityLink India to complement our efforts and play the role of raising the industry standards. I wish all the very best and thank SecurityLink India for the good work being done.

SecurityLink India ■ February 2019


INTERNATIONAL UPDATES

www.fsie.in For more information please contact: Jay Sheth / jay.sheth@nm-india.com / +91 9967971606 I Renu Saldanha / renu@fsai.in / +91 98440 05709 Supported By

Official Publication

Media Partners

SecurityLink India â– February 2019

*Tickets distributed and parking slots available on first come first serve basis.

31


FEATURE

Intelligent Video The Key to Transforming in-Store Shopping Experience By Ashish P. Dhakan – MD & CEO, Prama Hikvision India Pvt. Ltd.

T

he retail sector has been felling the disruptive impact of e-commerce more than the most. The inevitable costs of staffing, rent, maintenance and daily operations has left traditional brick-and-mortar stores struggling to stay dynamic and compete effectively with their more agile online counterparts.

order to make smarter business decisions about the shop floor. For many, reorganising store layout and installing additional equipment is not a realistic option – either because there is no available space, or because of budgetary constraints. In these circumstances, an effective solution could be artificial intelligence (AI) and deep learning. Together, these cutting-edge technologies create a video surveillance offering that can give retailers valuable insight into real-time operating conditions to boost customer service and in-store competitive advantage. Intelligent video technologies can be applied to retail in a multitude of ways.

People counting Not only that, but the one competitive advantage of physical retail outlets – being able to provide a more personal customer experience – has also taken a hit in recent years, thanks to the lack of in-store and operational efficiency. Customers find it hard to locate the products they’re shopping for, are faced with longer queues for payment, and the most valuable ‘VIP’ customers are often overlooked. At a time when retailers should be striving to excel, this is a bad news, as a 2018 study from KPMG reinforces, “The customer experience is more important than ever as retailers are striving to differentiate themselves in a challenging and crowded market. Consequently, experience per square foot will be the new retail metric to measure success.” The question, therefore, is how can stores optimise operations and improve the customer experience at this critical time?

Technology: At the heart of a better customer experience

O

ne challenge that retailers often face is not having a way to collect accurate data and visualise it intelligently in

32

U

nderstanding the flow of customers is the key to optimising a store’s sales performance; and by using an accurate people-counting camera, stores can understand daily/ weekly/ monthly peak times, so that store managers can arrange staffing accordingly. What’s more, by layering this data over days, weeks and months, retailers can start to see and understand customer flow trends. The data can be benchmarked against the store’s sales figures and its overheads to inform future operational strategy and help managers optimise store profitability. Furthermore, people counting can also help retail managers gain insights into the customer experience. One example would be to evaluate the conversion rate, which depends on the actual number of purchases divided by the number of people entering the store. Retailers can calculate this rate easily using people counting technology. Even better, people counting can also help stores determine the results of their marketing activities. Each marketing campaign can be quantified by people counting to measure return on investment. This is just one of several technologies that provide insight into consumer behaviour and optimal marketing practices.

SecurityLink India ■ February 2019


FEATURE

VIP recognition

L

oyal high-end or VIP customers are enormously valuable to retailers, but service staff cannot always identify them immediately. This means that business operators miss valuable opportunities to extend a special service. Intelligent facial recognition cameras, however, can provide unique opportunities that were previously unavailable. When customers opt to participate in VIP marketing promotions or other incentives, facial recognition technology will give retailers accurate tools to identify VIPs so staff can provide the right kind of service at the right time. There would be no more need for customers to show membership cards to receive special offers. The whole shopping experience becomes more convenient and efficient.

Heat mapping

R

etailers usually want to know which products customers are most interested in, and which promotional products can attract customers to stop. With heat-mapping technology, retailers can see a colour-coded map of how much time shoppers spend in specific store areas. This can reveal hot spots and dead zones, as well as how many people actually shop for a specific product versus those who just decide to pick it up as they casually walk by. By layering this data over time, retailers can get insight into how to best place items in store, and how best to design the overall store layout. One of the most useful heat-mapping tools available to the retail market is the fisheye camera. A single compact camera can capture a panoramic high-definition image over an impressively wide area, while its heat-mapping function provides the colour-coded map. Because fewer cameras are needed with most heat-mapping solutions, installation is cost-effective, making this the ideal solution for a location such as an independent shopping mall.

Queue detection

W

aiting time can have a devastating effect on the instore customer experience. If a customer sees a long queue in a store, they may stop shopping and go elsewhere.

Worse still, if there is always a long queue every time they visit the store, they may avoid that store completely in future. Queue detection solutions can help retailers manage their checkout lines, and the queue detection cameras are designed to monitor queues in real-time. The cameras count the number of people in each queue, and if there are too many people in each checkout line and customers still continue to flock to the checkout area it triggers an alarm to store management, who can open a new checkout.

Point of Sale integration

T

ransaction records and surveillance videos can provide valuable information to reduce disputes at checkout. In the past, these are two completely independent data systems. In order to find the right video footage, the surveillance video must be retrieved manually. Therefore, collecting evidence around a transaction normally can take several hours, which is costly for the business. Point of Sale (PoS) integration, also known as PoS Text Overlay, is the uploading of transaction data to the video management system through the PoS and encoding it with the video stream. This combination of retail transaction data with surveillance videos makes it easy to identify certain transactions to be reviewed for customer complaints, mainly used for post-retrieval when a transaction disputes occurs.

Intelligent video: Transforming the in-store shopping experience

T

he intelligent, self-learning video solutions outlined above are designed to empower retailers with much of the insight they need to bring brick-and-mortar stores right up to date. Those that are willing to adopt these solutions will very rapidly see their value, and be able to reap the rewards of increased competitive edge. Through accurate people-counting, quick identification of VIPs, optimal layout of goods and reduced waiting times, retailers can transform the shopping experience and enhance their sales strategy very quickly indeed. And thanks to the valuable customer insight that is generated on an ongoing basis, they will have the tools to create an in-store shopping experience that should only get better and better.

SecurityLink India â– February 2019

33


INTERVIEW

Face to Face Pawan Desai

CISA, CISSP, CBCP Co-Founder & CEO, MitKat Advisory MitKat is a premium management consultancy specialized in risk management, which is primarily focused on global corporations, government departments/ multi-lateral organizations, and NGOs operating in challenging environments. SecurityLink India has recently got an opportunity to talk to Pawan Desai - CISA, CISSP, CBCP - Co-Founder & CEO of MitKat Advisory, who is one of Asia’s leading security thought leaders, speaker and author. Some excerpts: SecurityLink India (SLI): How do you define MitKat Advisory in essence, and how was it conceptualized? Pawan Desai: India and Singapore based MitKat Advisory is a leading risk consultancy company in Asia. Our mission centres around outstanding services to clients, being financially healthy so that we can reward ourselves and grow, and be a great place to work which consistently attracts, develops and retains best in class talents. SLI: What is your modus-operandi? Pawan Desai: MitKat works collaboratively with niche clients to promote business and protect their most valuable assets – people, information, material assets and brand. We consult, take ownership for implementation of recommendations and help sustain initiatives. SLI: Which are your key areas of excellence in terms of services and verticals? Pawan Desai: Information and advisory services (Threat Intelligence and Travel Advisory), security and safety consulting and design, operational support services, embedded security leadership, cybersecurity and business continuity plan (BCP), fraud and integrity risk management, training and change management, and so on. 34

SLI: What is your priority sector – government or private, and why? Pawan Desai: We work with the world’s most respected corporations (more than 50 of the top 100 global brands). We also work on strategic projects with leading global NGOs as well as with government. SLI: How do you see the trend today in relation to L1 vs. T1? Pawan Desai: It depends on the maturity of the organization, and the priority they accord to the security of their personnel, brand and other critical assets. Most mature organisations have a value-based buying with a pre-defined percentage for technical competence as well as price. However, many organisations still have L1 bias, including government organisations. SLI: Please name some of your completed and pipelined projects, and which is your most satisfying one so far, and why? Pawan Desai: We provide Threat Intelligence and Travel Advisory to many of the world’s most respected organizations 24x7x365, and in the case of most of our customers the satisfaction rate is close to 100%. We have done

SecurityLink India ■ February 2019


INTERVIEW

some of the most advanced security consulting and design projects, including envisioning and design of national level command and control centres. We have worked in war and insurgency impacted areas, saved lives, and calmed and helped people in crises – this is obviously very gratifying. Very tight non-disclosure agreements are a norm in our industry. However, we are always willing to share our learnings and experiences. SLI: How would you describe the security and surveillance business in India as on date, and where is the trend leading to? Pawan Desai: More and more organisations are moving from excessive human dependence (and associated vulnerabilities) to an optimum mix of people, process and technology. Organizations also want a standards and frameworks-based efficient security, and a consistent level of efficiency and user experience across the enterprise. SLI: New developers and technologies are emerging at a rapid pace; what would be its impact on the Indian market in the days to come, and what are your advices for the end customers? Pawan Desai: As minimum wages go up, the cost of compliance increases, breaches occur with alarming regularity (mainly due to human vulnerabilities) and regulators become unforgiving, more organisations are preferring to get professional consulting and design support, undertaking techno-infra interventions and strengthen processes to achieve better security and user experience at optimum cost. SLI: What would be the state of physical security personnel in the wake of emerging technologies, and how could the balance be established? Pawan Desai: Going forward, there will be fewer but better skilled and trained personnel. They would be more techno-savvy and be able to operate security technologies well. Soft skills will become more important as security personnel are usually the first point of contact. Many organisations are undertaking (with professional consulting support) cost optimization and performance improvement exercises centred around reducing/ optimizing guards, using technologies and strengthening processes. Some new age integrated corporate services providers are providing tech-enabled integrated facility, security and other corporate services as a bundled offering.

SLI: What challenges or inhibiting elements (both legislative and otherwise) do you face in the industry, and what are your recommendations in relation to them? Pawan Desai: We need standards and frameworks for physical security. Current physical security legislation covers only manned guarding, and that too is getting outdated rapidly. We need integrated security standards, guidelines, frameworks to cover other stakeholders such as consulting and design companies, security OEMs and system integrators, employers etc. SLI: How have the safe and smart cities projects been doing so far? What are your contributions towards these projects? Pawan Desai: Smart cities program is a great initiative but implementation record has been mixed. Different cities are making progress to different degrees. Some like Pune, Nagpur, Bhubaneswar etc. are doing relatively better. Some cities are making good progress in specific parameters – like Indore in cleanliness. Consultants or so called project management consultancies (PMCs) are in place but strictly speaking, there is no project to manage. Project management involves feasibility study (Go/ No Go), DPR, design, design development, tender development and tendering – all of these take time. Unfortunately, the emphasis due to various other considerations is just to get the tenders out at the earliest. The role of ICT is being overplayed and the urban infrastructure design does not get the place of pride. What needs to be understood is that before a city tries to make itself smart, basics need to be in place. Sometimes unfortunately, provision of basics like water or sewage disposal is being confused with. Projects are being planned and tendered in isolation – by doing 20 isolated projects, we would not make a city smart. To properly utilize the infra, the infrastructure has to be developed first. In the rush to show results, the original vision and mission is getting diluted. What we need is a pancity development rather than area based development (at least of the basic infra). Perhaps except one smart city i.e., Pune, no one has the procurement or financial guidelines, though it is very much required, and therefore they have to re-invent the wheel for everything, There is serious lack of skills, particularly at the cutting edge or middle management. There exists a need for training/ skill development (by industry bodies) to rotate top talent who have developed execution expertise across smart cities.

SecurityLink India ■ February 2019

35


INTERVIEW

System integrators need to develop their talent. Sometimes tenders can be better worded. I have even seen tenders like – the scope is..., but not limited to... . MitKat is largely into consulting and design space – for cities, ports, financial districts, strategic projects, command and control centre designs etc. SLI: A recent newspaper update states that majority of CCTV installed in Delhi are defunct and a large chunk of data feed is wasted – and this is not the only case. How would you correlate it with the success of smart cities? Where is the gap and how can that be filled? Pawan Desai: I think a lot of it has to be related to governance and ownership issues such as no proper special purpose vehicle (SPV) or a functioning board, inadequate empowerment of officials, short tenures of CEOs, inadequate accountability, focus on L1, overenthusiastic bidders agreeing to any terms of contract and picking up contracts at unrealistic prices, lack of skills etc. We need to practice project based approach and allow sufficient time for feasibility study (Go/ No Go), DPR, design, design development, tender development and tendering. We need a pan-city development plan and the execution be made in phases. SPVs and Boards need to be constituted properly and CEOs must have longer tenures, empowerment and accountability. There is a serious need for skill development and strengthening of governance. SLI: Hi-rises and infrastructures such as hospitals are supposed to be, and are usually constructed under consultants’ guidance, however, the cases of hospital fires, collapse of buildings and other incidents are on the rise. Where do you see the lapses and how can these be minimized? Pawan Desai: India has a dismal safety record – whether road or rail safety, or structural or fire safety. Some of them are attitudinal. We need to enforce laws, regulations, standards and frameworks, and fix accountability. SLI: What are the impacts of weak PSARA, inadequate cyber laws (IT Act), and no dedicated laws for security and surveillance in India? What are your recommendations? Pawan Desai: The laws for cyber security and privacy are under formulation. Globally, there is no one standard for physical security (unlike ISO 27001 for Information Security or ISO 31000 for Risk Management or ISO 45000 for Occupational Health and Safety Management). There are 36

standards, frameworks, guidelines, country-specific legislations, and best practices pertaining to surveillance, select security technologies and aspects of safety. There is also a global standard for asset management. Having operated across the globe including in very challenging environments of Middle East, Africa, South Asia and APAC, we at MitKat have been privileged to learn many good things from different environments. Based on global standards, frameworks, guidelines, learnings from country-specific legislations and best practices across the globe, we are adopting an integrated standards and framework based approach to security – one that uses technology optimally, forms a part of the integrated asset management, provides efficiency, consistency, better user experience and confidence to the customer, and reduces human dependence and optimizes costs. SLI: What are some of your basic suggestions to the end customers to consider while planning implementations of security, surveillance, and cyber security and fire safety etc.? Pawan Desai: Security is most efficient and effective when it is incorporated at the planning and design stage itself. Have a risk-based approach to security. Identify critical assets and carry out a threat-vulnerability risk assessment. Design security optimally with an optimum and effective mix of people, process and technologies. Cyber security is an all pervasive subject and closely integrated with physical security, surveillance and access, fire and life safety, BCP and crisis management. All aspects of endpoint, application and network security must be planned and implemented well. SLI: Kindly share your points of view about SecurityLink India. Pawan Desai: SecurityLink India is doing a good job of keeping stakeholders appraised with latest developments in physical security, fire and life safety, surveillance, security technologies, geo-political and security developments, coverage of key events, lessons from major incidents and case studies. It publishes well-researched articles, provides insights from industry experts and business leaders and showcases innovative technologies, solutions and approaches. I must compliment the Editor, the team and contributors for putting together excellent, informative and thought provoking articles consistently.

SecurityLink India ■ February 2019


INTERNATIONAL UPDATES

SecurityLink India â– February 2019

37


FEATURE

How Video Management Software Ensures Security of Healthcare Facilities By Anshul Saxena, Senior Executive – Corporate Marketing, eInfochips

Healthcare facilities and hospitals face security challenges every day – right from securing their premises and patient care activities, to ensuring visitor’s safety and keeping a check on thefts of expensive medical equipment. When it comes to ensuring the security of healthcare facilities, video management software with intelligent video analytics features can be helpful in improving the overall safety of the hospital premises, reducing theft and false lawsuits, and ensuring staff and visitor’s safety

H

ealthcare is one of the fastest growing industries in terms of revenue and facilities, but it is also vulnerable to theft, security issues, false lawsuits, and vandalism. Apart from good infrastructure, medical and patient care services, and trained professionals, a hospital’s reputation also depends on its safe and secure environment. To improve the quality and effectiveness of healthcare facilities for patients, visitors, and hospital staff, it requires cutting-edge security and surveillance solutions that can provide round the clock monitoring, intelligent video analytics, real-time incident notification to improve the overall healthcare facilities. Cloud-based video management software with intelligent video analytics provides holistic security and surveillance solutions for hospitals of any size and helps healthcare

38

facilities to streamline their business processes in an efficient manner. Let us check out some of the benefits of Cloud-based VMS in the healthcare industry:

Securing hospital premises

V

ideo surveillance in hospital premises is very important; right from the parking lots, reception area, visitor’s lobby, storeroom, blood banks, pathology labs, to the kitchen. IP surveillance cameras placed strategically with other security systems help prevent break-ins and crimes in healthcare facilities. Integration of video management software with the hospital’s visitor management software, access control devices, and network audio systems (speakers, mics) etc., can help in improving the efficiency of the

SecurityLink India ■ February 2019


FEATURE

hospital staff. Real-time incident notification in cases like trespassing, unauthorized access to the restricted areas and negligence of support staff can alert security and IT staff to respond immediately.

Patient care

I

mproving patient’s health is a key responsibility of any hospital, and real-time video surveillance and monitoring of patients can be very helpful in keeping a close check on their health, medication, treatment, instant support in case of an emergency, saving the lives of the patients. Video management software with intelligent video analytics can track the patient’s movements in hospitals, and monitor doctors and hospital staff visits, ensuring quality care of patients. Since patients in ICUs require critical care, it needs to be monitored 24x7 with video analytics like motion tracking, fall detection, object detection, motion sensing etc., which help in virtually tracking their health status.

Telemedicine/ telehealth

T

elemedicine and tele-healthcare facilities are incomplete without video management and conferencing solutions. Tele-healthcare provides connected healthcare solutions to patients away from the healthcare facility. It helps them consult the doctors through video conferencing, transmission of medical data, recording, and management of electronic health record (EHR) through diagnostic device integration, and in some cases, remote drug dispensation.

Preventing theft

T

heft of hospital supplies, domestic utilities, medicines, and medical equipment is a big concern for the entire industry, which directly affects hospital efficiency resulting in an increase in procurement costs and undesirable expenditure. Medical caregivers, support staff, patients and their family members majorly do theft at hospitals, which results in shrinkage in hospital resources and equipment losses. According to a survey conducted by VHA, Inc., a national network of hospitals, patient theft alone costs hospitals at least $52 million a year. To curb the issues of theft, break-ins, and shoplifting, IP surveillance cameras with access control devices can be installed in critical locations allowing limited access to designated hospital staff. Video analytics features like object counting, people counting, PTZ control, and RFID tags to the equipment can reduce such incidents.

Improving safety of staff

H

ospital staff in the emergency department, reception area, OPD section, waiting halls, and drug counters are more prone to anger and violence of the visitors and family members of the patients. Most of the incidents of verbal spats and fights in hospitals are caused due to dispute with medical staff, resulting in a hostile environment within the hospital. To prevent such scenarios, IP cameras connected with intelligent video surveillance system can be very helpful in alerting hospital security about such incidences in real-time and ensure the safety of other visitors, patients, and hospital staff.

Managing ambulance fleet

V

MS for ambulance fleets can help in improving hospital’s efficiency in patient care. Installation of IP video cameras in and out of the ambulances and tracking them from hospitals can provide critical information about patient’s health and allow hospital staff to be prepared on arrival of the ambulance. Recording of the treatment given to patients during on-road accidental cases, fire, violence, or any other medical emergency can be used for future reference and training purposes of the hospital staff. It can also help in dealing with false allegations on the medic team.

Reducing false claims and lawsuits

F

alse claims and lawsuits against hospitals are a threat to the hospital’s reputation and drag hospital administration into legal troubles and losses. Recorded video evidence of a patient’s treatment, medicines, diagnostics, and financial transactions are very important in mitigating false claims. Video recording through body-worn cameras by medics are also in trend to restrict the unwarranted claims with the hospitals. Along with ensuring security and surveillance of the healthcare facilities and streamlining other verticals of hospital management, intelligent features of video management and analytics software can also be used for tracking the performance and effectiveness of promotions of new medical facilities. Video analytics features like people counting, queue management, heat mapping, and motion detection can help in managing hospital visitors. eInfochips offers cloud-based video management software with intelligent video analytics to manage security and surveillance of healthcare facility of any size. The VMS are based on multi-tenant federated architecture and scalable and flexible to support any number of cameras and connected devices.

SecurityLink India ■ February 2019

39


INTERVIEW

Interaction with

KNational P Dominic President, FSAI The third edition of Fire & Security India Expo (FSIE) 2019 is close at hand. It is to mark its debut in Mumbai at the Bombay Exhibition Centre (BEC) from 28 February to 2 March 2019. The event is organized by NürnbergMesse India in co-operation with Fire & Security Association of India (FSAI). The trade expo is a multi-dimensional platform that combines solutions for passive, active and organizational fire safety and security management. It is to bring together official experts, architects and developers, MEP consultants, OEMs, security experts, building engineers, members of leading security and fire prevention bodies, as well as fire safety a security representatives from retail, hospitality, healthcare, real estate, facility management, IT-ITEs industry and other stakeholders to exhibit, gather knowledge, exchange ideas, debate innovative perspectives, solutions and products for fi­ re safety and security. KP Dominic, the National President of FSAI, with 33 years of experience in fire and security domain, is one of the founding members of the association. Since its inception, he has been actively involved in developing the organization both in terms of size and value it can offer to all its members. KP Dominic is also the founder President of Singapore based company Blue and Gray, a brand building and business development consultancy serving well-known brands across India. He is also the Director of various businesses in Singapore, India, Oman and Dubai. Earlier, he played an important role in building the Honeywell Life Safety business, and establishing successful brands such as Mircom and Secutron in India. SecurityLink India has recently interacted with K. P. Dominic who was highly excited about the upcoming event FSIE 2019. He showed conviction and accentuated that FSIE 2019 would be a grand success. Here are some excerpts:

40

SecurityLink India ■ February 2019


INTERVIEW

SecurityLink India (SLI): This is the third edition of FSIE, what are its USPs (Unique Selling Propositions) over last years, and how do you foresee its success? KP Dominic: FSAI is always in favor of adopting USP system with consistency and sustainability. In the context of FSIE 2019, we have formulated and carved out an exclusive and dedicated ‘Women & Children Safety Wing’ that is an important step considering the specific vulnerabilities this segment is subjected to. Accordingly, our future training strategy includes the aspect of empowering women and children for their own defense. In addition, we are also trying to inculcate the spirit of an added responsibility and sensitivity among others (members of society) to immediately come for helping them whenever need arises, considering it as a divine call of duty. SLI: Kindly mention some of the other events that FSAI organizes. KP Dominic: The significant events that FSAI organizes are Projects Heads, Architects, and Consultants Conclave (PACC), Conferences on Industry specific Safety & Security Challenges, and Motivational Awareness and Training programs for all stakeholders at grass root level. The beneficiaries are members of general public (mostly from rural areas), business organizations, industries, entrepreneurs, consultants, regulatory agencies, academic and professional training institutes, home makers/ school children etc., Such trainings also include practical demonstrations as well as mock-up emergency response exercises. Our association executes conferences/ seminars at international/ national/ state and regional levels. Besides, we conduct relevant security and fire safety contests and award schemes besides staging public functions to honor people who had displayed extra ordinary valor and courage to save lives and assets during difficult and emergency situations. To cap them all there are noble initiatives being taken up by FSAI to carry out blood donation camps as well as marathon races for propagating our pet ‘Surakshit Bharat’ campaign. SLI: What are the plans and initiatives that you have undertaken under your regime to enhance FSAI as an organization and its bearings on the industry? KP Dominic: Industry is the back bone of development. Government is also trying to ensure that the ‘Make in India’ initiative becomes a good boost for entrepreneurs

in this sector. FSAI is now to create more interactive forums with industries whereby more opportunities will be explored for understanding the best fire safety practices which are mostly being adopted by well-organized/ equipped large industrial units. The association is to take the lead to convince smaller and less equipped units to adopt those safeguards in their own interest. The ongoing fire safety audits that we provide to the industries can also play a complementary role. By adopting these proactive steps, we will make our conspicuous presence in the industry. SLI: What are the prospects of homeland/ private security industry in India and what are the challenges/ shortcomings? KP Dominic: The prospect is very bright. Existing shortcomings include lack of basic education among guards posted at hazardous/ sensitive zones, language and communication barriers, lack of technical gadgets to identify critical threats etc. We usually find major challenges in terms of the level of professionalism, competency and responsibility among the supervisors/ higher security officials which need to be brought up to a higher pedestal. Though they are deployed by the private and commercial sector, they need enhancement. Benchmarking and accreditation of these security agencies can be achieved by reviewing/ revising/ improving the curriculum and exams standards periodically based on experience and feedback. SLI: Private security industry in India is largely unorganized and unstandardized. What efforts is FSAI making to regularize it? KP Dominic: FSAI can definitely play a significant role in this regard. Since we are into the business of conducting training and audit of institutions/ organizations we intend to incorporate a detailed coverage of security aspects in the audit checklist by offering a separate, comprehensive divisional status for the same. Industries are already being benefitted by this type of coverage in prevalent Indian standard on occupational safety audit. SLI: What is your opinion on the participation of private security agencies in the affairs of homeland security (PPP)? KP Dominic: I am of the firm view that any organi-

SecurityLink India ■ February 2019

41


INTERVIEW

zation – Govt. or Private – is duty bound to work together when augmented help is required by the government agencies, especially in times of exigency or emergency. Literally there cannot be any conflict of interest in this regard. In industrial situations this system already exists in the form ‘mutual aid’ arrangement during on-site or off-site emergencies. The most important factor in this situation is that the private agencies should always be ready to compliment Homeland security agencies like Police, home guard or CISF etc., wherever they are posted in the time of requirements. SLI: How have the safe and smart cities projects been doing so far, and what are the contributions of FSAI as the leading fire and security association of the country? KP Dominic: The ‘smart city’ concept is still at infant stage and a lot needs to be done to upgrade the available security system, considering the higher fire load, size, occupancy and other related security concerns (both personal and asset). Therefore it is too early to comment about the contributions we have made so far, except to mention that we have taken the related training programs, seminars and workshop in an ‘exclusive category’ and they are prominently included in the 2019 event calendar. SLI: There are rising cases of hospital fires, collapse of buildings and other lapses in the country. Where do you see the gaps and how can they be filled? KP Dominic: Yes; this particular agenda is the topmost among all our concerted endeavor and let me proudly state that 10 out of the 40 training programs in 2019 (as per FSAI event calendar) distributed among all chapters/ regions shall focus on this. The December 2018 session held at Bengaluru in this regard won many accolades to FSAI. SLI: What do laws and authorities of the land provision to check these lapses? Are they stringent and prompt enough, kindly make your recommendations? KP Dominic: Constitutional provisions and laws have their own significance and edge. But the society at large – which include designers, architects, engineers in charge of project execution, owners/ end users who operate/ maintain these facilities, the internal as well as external fire/ safety service providers and people at large who are the main beneficiaries of the system – have to contribute individually and collectively to implement the statutes in toto, 42

and of course make recommendations for ease of compliance without affecting the purpose conveyed through the existing mandates. SLI: What would be the impact of the trend of emerging developers and technologies in the field of security and fire safety on the industry, and the country at large? What are your suggestions to the end customers? KP Dominic: Technology users and developers are definitely keeping pace with the need of the hour by way of reaping maximum benefits of modern techniques in the design, fabrication, assembling and installation of fire and security gadgets. The end users need to be kept continuously updated about the benefits these gadgets bring in through good ‘safety cases’ which are in public domain through internet, electronic and print media. My modest appeal to customers – (remember a customer is also a vendor or supplier at some point) – to maintain trust in the usefulness of the product you purchased; get it duly installed, tested, tried out and periodically serviced/ recertified by the supplier’s own accredited agencies and regularly maintained in house. SLI: Kindly share your points of view about SecurityLink India. KP Dominic: I strongly believe in keeping direct access and contact with a large cross section of masses, since individual behavior and actions count a lot for the success of any relevant fire safety and security efforts. Accordingly the main initiatives being proposed in this direction are organizing maximum number of practical training programs at ground zero; roping in the support of schools and colleges for such activities so that the young and energetic students will take the lead in promoting the programs like true ambassadors; and touching the comparatively more vulnerable categories of women and children when it comes to fire safety and security concerns. In this regard a dedicated and exclusive ‘Women Safety’ task force has recently been created at FSAI. My final take on the above narratives is that there is no substitute for good communication through better reading material like ‘SecurityLink India periodical.’ Readers’ fraternity only can help it achieve the set vision, mission, goals and objectives of any publications. Wish SecurityLink India the very best !!

SecurityLink India ■ February 2019


INTERNATIONAL UPDATES

SecurityLink India â– February 2019

43


FEATURE

Women’s Safety Freedom not Feardom By Hima Bisht – Head of Training, MitKat Advisory

Crime rates in Delhi are coming down” – this headline on the front page in a leading national daily screamed at me as I saw it while somebody was reading the paper in the Delhi Metro on the other day. The article cited statistics to corroborate the statement. This data about a city that was considered as the most unsafe among 19 major cities just a couple of years ago, and called the ‘Crime Capital’ accounting for nearly 40% of rapes, 33% of crimes against women, and the highest crime rate, as per the National Crime Records Bureau (NCRB) data, was certainly heartening. But does this reflect the changed ground reality as regards the safety of women in India? Everytime a young woman – a part of the expanding women workforce – steps out of the house, her mother asks, “Call me when you reach.” (Her eyes, however, say – so I may know you have reached safely). This constant fear in the eyes of our near and dear ones tells its own tale. Why are we constantly on alert as we step out into public spaces? Why do I live in a constant fear of invasion of my personal space, of leery eyes, lecherous glances and lewd comments? Why is my ‘mental space’ occupied with fear each day for my safety? I want freedom in my ‘mind’ from constant worry for my safety – as much as I want the freedom to walk into an empty train compartment without fear, or on a 44

dark lonely street without worrying for my security. As more women continue to join the workforce, ensuring safety of women remains a critical aspect of ‘duty of care.’ Notwithstanding the headline above, and in spite of the many regulations laid down by the government, in the key economic centres of our country like Delhi, Gurgaon, Noida, Mumbai, Pune, Hyderabad, Chennai, Bengaluru etc., safety and security of women continues to be an area of concern.

Getting into overdrive – The 8th March syndrome

A

s the Head of Training at a leading risk consultancy firm, which has conducted women’s safety training workshops for nearly a hundred thousand women professionals across corporate India, I have noticed a peculiar trend – companies go frenzy about International Women’s Day (8th March) – almost all of them want to conduct women’s safety awareness and self-defence training on that day or during that week. That leaves me with another nail-biting question leading to disappointment, “Is women’s safety worth an issue to be trotted out as just a discussion point on International Women’s Day only, or is it an on-going concern?” What happens during the rest of the year? Is the issue something so trivial that we can put it on the backburner SecurityLink India ■ February 2019

to be brought alive on a particular day or when horrific incidents like Nirbhaya or the Kathua rape evoke strong reactions in national, global or social media? The extremely unfortunate Nirbhaya incident in 2012 had galvanised the nation into demanding justice, and ultimately culminated into important changes to the regulatory framework including amendments to the Juvenile Justice Act (No longer will a juvenile responsible for heinous deeds like rape and murder walk free, or have his past record wiped clean on account of being a juvenile – he will be treated like an adult and punished accordingly).

Need for a holistic, integrated, & consistent approach

S

poradic linear responses or solutions to violent crimes against women can never be effective. It requires the creation of an integrated eco-system that involves multiple stakeholder engagement that puts a premium on women’s safety and security. It involves getting into and eliminating the root causes, and using technology imaginatively and effectively to deter, detect, respond and defeat, training and awareness among stakeholders, gender sensitization, and an implementable regulatory framework which provides exemplary punishment to the offenders.


FEATURE

Women’s safety and security requires a multi-pronged approach at various levels – policy frameworks, standards and guidelines, techno-infra interventions, organisational aspects, education, training and awareness, audits, sustenance and continual improvement.

Policy frameworks

A

lbert Einstein said, “If people are good only because they fear punishment, and hope for reward, then we are a sorry lot indeed.” But the truth is, governments do need to clearly define the regulations regarding women’s safety, policy frameworks and standards. Professionally trained law enforcement officials, swift investigation and disposal of cases pertaining to women’s safety are the needs of the hour.

Physical aspects

C

ities need confidence building measures. Crime prevention through environmental design (CPTED) is a much talked about concept in the West, but I have not found much mention of it in India. Measures such as well-lit streets with surveillance coverage monitored from a central control room, augmented with an assured response capability (some states like UP have done a remarkable job of assured response within defined timelines), visibly increased security, presence of trained and professional women police on the streets, safety mapping of vulnerable areas such as railway stations, slum areas etc., safety features in cabs and panic buttons in mobile phones etc., act as deterrents and help improve women’s safety.

Organizational aspects

A

s part of their ‘duty of care,’ private organisations need to ensure the

following (many aspects are also legally mandated): ●● Clearly displayed emergency contact numbers and designated officer(s). ●● Well lit work areas, staircases and parking lots till the last woman employee leaves the site. ●● Separate and secure toilets for women close to their work station. ●● Strict surveillance of visitors including courier staff, delivery boys etc. ●● Provision of company transport for women working in night shifts. ●● Policy on escorts and for first pick up/ last drop of women employees. ●● Hiring of cabs/ transport vehicles only from established agencies.

Educational aspects

A

n education and awareness campaign not only among women, but among the multiple stakeholders, including sensitization of males, is the need of the hour. Gender sensitisation training is required for men so that it deconstructs gender stereotypes and breaks gender biases. The training must educate women on their rights both at home and at the workplace. Workplace sexual harassment is a form of gender discrimination which violates a woman’s fundamental right to equality and right to life, guaranteed under Articles 14, 15 and 21 of the Constitution of India. Organizations have a duty to educate men, women and the LGBTQ community on exactly what can be constituted as sexual harassment, under the Prevention of Sexual Harassment (POSH) Act, on redressal policies, consequences and liabilities etc. This awareness creation (through workshops and/ or interactions) must be extended to the unorganised sector and trade unions also. That would constitute another affirmative step towards SecurityLink India ■ February 2019

women’s safety, equal opportunity and equality for all sections of society.

Continual monitoring, audits and improvements

T

here is a need to have tracking mechanisms for checking compliances as per POSH/ Factory Act, and other regulations and internal policies. We also need internal committees, internal and external investigations (fair and impartial), fast track courts that deal with sexual offenders, and surety and severity of punishment that could act as deterrents. There is also an urgent need to protect privacy, reduce victimisation (of the victim) and document all cases and data for future reference and research.

Conclusion

E

nsuring the safety of women requires a consistent, multi-stakeholder approach, and is not an aspect to be ticked off annually on or around 8th March every year. The efforts of Delhi to bring down crime including crimes against women are welcome, but much more remains to be done. As a key stakeholder, Corporate India must do its bit to ensure the safety of women employees. Only if this is an ongoing exercise which encompasses all the above (and more), will it bring about a paradigm shift in the ethos that drives our attitudes and aspirations, and create a truly safe environment for women to work, thrive and prosper. When women’s safety is no longer a ‘topic of discussion,’ when there is no longer fear in a mother’s eyes as her daughter steps out of her home each day, when my personal safety no longer remains in the uppermost thought in my mind, the minute I step out of the relative safety of my home, then we would achieve a ‘Safe & Secure’ environment for women. 45


WHITE PAPER

The Top Trends of 2019

From the potential of 5G to the power of AI and more, our connected lives are being shaped by the growth of transformative technologies. Powerful on their own, these transformative technologies are now converging to change fundamentally how we interact with the world, how we do business, and even how we communicate with each other. As this convergence continues, formerly separate industries are intersecting in new ways, with new opportunities (and challenges) emerging. For 2019, we’ve identified primary trends that are making a major impact in both commercial and consumer markets, in addition rom the potential of 5G to the power of AI and more, our connected lives are being shaped by the growth to technology market insights in keyonareas. of transformative technologies. Powerful their own, these transformative technologies are now con-

Powered by Transformative Technologies

F

verging to change fundamentally how we interact with the world, how we do business, and even how we communicate with each other. As this convergence continues, formerly separate industries are intersecting in new ways, with new opportunities (and challenges) emerging.

Evolution of transformative technologies: market and technology capabilities Market and technology capabilities continuously drive innovation continuously drive innovation T Evolution of transformative technologies:

ransformative technologies enable shifts in how enterprises function and how individuals live everyday life. As technologies become smarter and more sophisticated, and as markets evolve, transformation can begin in new industries. The rate at which we see these take hold has grown rapidly in Transformative technologies enable shifts in how enterprises function andtechnologies how individuals live everyday life. As technologies become smarter and more sophisticated, recent years. and as markets evolve, transformation can begin in new industries. The rate at which we see these technologies take hold has grown rapidly in recent years. 1970s IP Protocol Development

1980s Cable television

1990s Lithium-ion batteries

2000s Increased bandwidth and apps marketplace

2010s Lithium-ion batteries and long-range connectivity

2019+ Convergence of AI + IoT + Cloud Email brought instant communication to business processes

24-hour news cycle changed consumption of content

Portable electronics revolutionized availability of technology

– Content – Electric vehicle streaming penetration business models changes market emerged demand for oil – Content changes – ‘Things’ become for mobile available to consumption more markets – App marketplace service business models

46

SecurityLink India ■ February 2019


WHITE PAPER

Major trends for 2019

Infrastructure, network capacity, and user experience

Trend 1: Video Everywhere

V

ideo’s increasing ubiquity is forcing significant industry change as a growing number of players vie for consumer attention and revenue, and businesses adapt to cope with the rising demand. Driving forces for Video Everywhere trend include the rise of online offerings and platforms, including those from powerful new market entrants; increasing penetration of mobile connected devices capable of capturing and displaying video; advances in network and transmission technologies for sharing it; and the resultant explosion of user-generated content and social video. The trend affects not only media sectors such as TV, home entertainment, social media and games, which are at its heart, but other industries including security, education and healthcare as well that are becoming increasingly reliant on video technology. However, the Video Everywhere trend poses certain challenges that need to be resolved.

Trend 1 ‒ Video Everywhere

C

hallenge: Current generation network infrastructure is not equipped to support the rapid rise in video traffic. Solution: Next-generation network investment is essential for supporting a reliable, high-quality user experience for a mass user base. 5G will be transformative for video, introducing the massive mobile broadband that will enable streaming of professional video and user-generated content at scale.

Content and monetization

C

hallenge: Service providers, broadcasters and platforms competing for a share of video revenues need the right mix of quality content, an expensive commodity that can be difficult to effectively monetize for a good return on investment. Solution: Investment in programming, whether exclusive or acquired, should be proportionate to a video provider’s ambitions and serve clear strategic objectives. Content services, features, and video-specific network ac-

Video’s increasing ubiquity is forcing significant industry change, as a growing number of players vie for consumer attention and revenue, and businesses adapt to cope with the rising demand.

12

1

Cinema

5 2

3

4

1. ANPR (Automatic number plate recognition) is a technology for automatically reading vehicle number plates. Global market revenues from sales of integrated (intelligent) cameras are forecast to grow at a CAGR of 16.4% from 2017–2022. 2. Auto Global shipments of automotive display panels are set to increase by 11%, reaching 164 million units in 2018. 3. Digital Signage For 2018, IHS Markit expects the overall digital signage industry to report a 23.8% YoY increase in revenue.

9

Arcade

6

7

8

10

11

8. Home security The consumer video surveillance market will top $1 billion in 2018.

4. Smartphone The cumulative unit-shipment volume of global smartphones during the first 3 quarters of 2018 exceeded 1 billion units. Foldable AMOLED panel shipments to top 50 million units by 2025. 5. Video surveillance In 2018, 108 million network cameras will be shipped. The world market for software video analytics is forecast to rise at a CAGR of 14.9% to $564.5 million in 2022. 6. AR/VR Consumer spend on AR and VR content and apps is set to exceed $7 billion in 2019. 7. Live streaming User-generated content’s share of all online content will account for as much as 20% by 2022.

9. OTT video Online video subscriptions from OTT and traditional media players will more than double between 2017 and 2022, by which time they will be approaching the 1 billion mark. 10. TV Traditional TV and online video collectively generate more than $500 billion a year in revenue. Annual revenues are forecast to grow at a CAGR of 4.9% between 2017 and 2022. 11. Networks Video increasingly dominates IP traffic – by 2020, it will account for 75% of fixed-network traffic and 66% of wireless-network traffic. 12. Drones Nearly 60% of professional drones are equipped with cameras.

SecurityLink India ■ February 2019

47


WHITE PAPER

cess can all be monetized to varying degrees, but video can also serve bigger-picture goals. For telcos and bigtech firms, in particular, it attracts users to a bundle of services that collectively drive revenue and EBIDTA growth and boost customer stickiness. Video should therefore be positioned as a primary tool for elevating the overall value proposition.

Privacy and data protection

C

hallenge: Increasing video capture in daily life – whether from smartphones, wearable devices, drones, or satellites – will result in more and more images of private citizens being gathered, stored, and potentially shared. Advances in artificial intelligence and machine learning, meanwhile, are enabling facial-recognition-based identification, potentially putting people’s privacy at risk. Solution: Governments and regulators must play a key role in protecting citizens, putting the appropriate policy, legislation, and tools in place to prevent breaches of privacy and data protection.

Trend 2 ‒ The Edge

Strategies of consolidated media and telco players to take shape in 2019

F

uelled in part by a fear of the threat posed by the likes of Netflix, Amazon, Google, Facebook, and Apple, a spate of significant M&A activity in the media and telecoms industries has seen key players merge and expand. The impact of major deals involving AT&T and Time Warner, Disney and Fox, Vodafone and Liberty Global, and Comcast and Sky, respectively, will begin to become apparent in 2019, as the strategies of newly enlarged industry leaders take shape.

Trend 2: The Edge

T

he Edge broadly refers to processing traditionally performed in a cloud environment that is now being run closer to either the sensor data or the human-machine interface. It is changing the way networks are being deployed and devices are being built, plus enabling new revenue streams as compute resources are available closer to the end consumer. Driving forces for the Edge trend include – the top edge application is video content delivery; real-time or low-

The Edge broadly refers to processing traditionally performed in a cloud environment that is now being run closer to either the sensor data or the human-machine interface. It is changing the way networks are being deployed and devices are being built, plus enabling new revenue streams as compute resources are available closer to the end consumer. Object tracking, Video Surveillance, AI/ML. IoT, 5G

loT G/W

V2X, ADAS

Information flow through multiple edges

Edge Cloud Gaming, AR/VR, Healthcare

Partial edge Smart Cities, vCPE, AI/ML, loT

Cloud/data center Content Delivery, Amazon Prime, Netflix

Smart CO = Local caching and mission critical

DC Near CO = Immediate localized cloud

DC Not Near = Traditional cloud

loT G/W

Edge devices: Immediate data processing UCPE Digital assistants UCPE Digital assistants

20msecs

As the edge continues to grow in importance, understanding cost vs. performance will become a top priority. In a recent survey of 14 edge thought leaders and market movers: The top edge application was video content delivery, which 92% of respondents identified as an area of impact and concern.

V2X = Vehicle-to-Vehicle or Vehicle-to-Infrastructure ADAS = Advanced driver-assistance systems NaaS = Network as a service SaaS = Software as a service PaaS = Platforms as a service

AI/ML = Artificial intelligence and machine learning uCPE = Universal customer premises equipment CO = Central office VNF = Virtual network funcations

Telco edge sites are located within 5 to 20 milliseconds of the targets they serve, while the edge sites of ICPs and OTT operators are located at 20 milliseconds to 50 milliseconds. 82% of operators plan VNF execution on uCPE at customer sites 97% of operators plan VNF execution in Smart CO 85% of operators plan VNF execution in DC Near CO 70% of operators plan VNF execution in DC Not Near CO

Driving forces include: SecurityLink India ■ February 2019 48 • The top edge application is video content delivery


Top 10 edge applications led by video

WHITE PAPER

Video content delivery (360 video, venues) Autonomous vehicles (cars, drones, trucks) AR/VR

92% 83% 83%

Edge Application

er latency for time-critical workloads or safety IloT(automated factory) 83% applications; resiliency for situations where Gaming 75% Distributed virtualized the network connection is not optimal or of58% mobile core & fixed access fline; data aggregation and the ability to filter Private LTE 58% in order to balance storage, networking, and Surveillance 33% compute; and security and privacy functionalSupply chain management 33% (trucking, asset tracking) ity centralized and enhanced – particularly in Smart cities 25% the IoT domain where end nodes might not be 0% 20% 40% 60% 80% 100% capable. Percent of Respondents © 2018 IHS Markit Source: IHS Markit The trend affects service providers, cloud Source: Apps at the telco edge: Revenue, investments, and timelines report – 2018. providers, and IoT companies that are particuspondents. In fact, many edge apps require new software to larly centered in the edge discussion. The edge also impacts be invented, but no common application program interfaces the entire value chain from semiconductor providers through 7 (APIs) currently exist for edge app developers, and for a roOEMs to segments like media, security and gaming. bust edge to exist, a common developer platform is needed. The evolution of edge There is, however, potential in the open-source Eclipse plathe emerging edge is a new and powerful set of locaform of APIs and microservices. tions for handling applications, and the edge can be anAlso at stake is the question of how an operator can manywhere. For example, a connected car is an edge on wheels. age, monitor, operate and control thousands of edge sites, With so many target locations possible, some edge solutions since no standard software stack exists. Another issue for auwill be built to handle less data for fewer users while others tomation is how to translate data from big data lakes and dewill be large and handle massive datasets for many users, invelop the ‘small data’ artificial intelligence inference engines cluding data centers distributed around a metropolitan area. required to work at edge venues. More experimentation and New low-power, specialized chips will power edge devices, experience are needed to determine suitable and appropriate and while many people equate the edge with 5G, the edge business cases for the edge. and edge apps exist today, yet there have been very few 5G Trend 3: Artificial Intelligence (AI) deployments to date. Trend 3 ‒ Artificial Intelligence (AI) Implementation scenarios: As the IoT universe expands to include more devices – Implementation scenarios: edge, cloud, and hybrid edge, cloud, unfoldshybrid and technology rapidly advances, AI will eventually touch all industry domains and transform and some 20 billion units, according to IHS Markit estimates – As the future our world. Machine learning, neural networks, and deep learning all fall under the AI umbrella. thealgorithms futureandunfolds and technology rapidly advancthe sheer scale of data generated in the future will render The development ofsnew methods to enhance efficiency and problem-solving capabilities are driven several applications and the prevalence of big data. For AI to fully develop, there remain es,ofAI will eventually touch all industry domains and the current paradigm of a centralized cloud untenable. IoT by the high complexity many components and driving forces that must mature, advance, and succeed. edge processing saves upstream traffic and bandwidth Home Car Enterprise by turning huge amounts of raw data into immediately 39 million smart speakers are By 2025, over 170 The off-premises cloud service market, which is forecast to be shipped globally million AI systems expected to reach $413 billion in 2022, will increasingly usable decisions and directives to feed back to objects in 2018, up sharply from 27 are expected to be target data intensive workloads and ease the integration million units shipped in 2017. implemented into cars. of AI and ML into enterprise business applications. and devices downstream, and a much reduced and refined set of data to send upstream to data lakes and other decision-making systems.

T

A

Barriers to edge deployment

T

he main obstacle to effective edge deployment is the large bandwidth required. The most significant issue is the need to reduce upstream traffic via analytics in order to manipulate and refine data at the edge. Technical considerations and high cost are also barriers to edge deployment, according to survey re-

Factory 11 billion commercial and industrial IoT devices will be shipped by 2025, with growing implementation of AI/ ML functionality.

Video Surveillance A recent trend in the safe city market is the development of next-generation smart cameras, which leverage AI-enabled high compute powered network cameras.

Hospital To date, over 350 algorithms (also known as machines) have been developed specifically for medical diagnostics, funded with more than $4 billion in venture capital.

Driving■forces include: 2019 SecurityLink India February • The ability of machines to become more independent and autonomous, learning from their surroundings

Data Center Servers shipped with specialized co-processors for AI and ML will make up over 10% of global server shipments by 2022.

49


WHITE PAPER

transform our world. Machine learning, neural networks, and deep learning all fall under the AI umbrella. The development of new algorithms and methods to enhance efficiency and problem-solving capabilities are driven by the high complexity of several applications and the prevalence of big data. For AI to fully develop, there remain many components and driving forces that must mature, advance, and succeed. The trend is driven by forces that include the ability of machines to become more independent and autonomous, learning from their surroundings, the explosion of collectable and analysable data through numerous platforms – from mobile to cloud, high-performing electronics able to elaborate huge amounts of data and extract structured knowledge, availability of adjacent transformative technology creating the perfect storm – connectivity, IoT, and cloud. The pervasiveness of AI is not expected to have borders. Every industry and the entire society will benefit from AI, but we need also to adapt to such disruption. Automotive, consumer electronics, security, education and healthcare are becoming increasingly reliant on AI.

In particular, cloud AI will allow more computing power to analyze data and utilize more complex algorithms (such as deep learning), possibly close to where the training data is gathered. There are, however, potential issues around privacy, latency, and stability. A stronger on-device or edge implementation of AI algorithms will help offset those concerns to some degree while offering other advantages required by a broad range of applications. The expectation is that cloud will have a huge advantage to tackle training sessions for artificial neural networks (ANN) or deep learning network types, where centralization of data and massive computation are required. Edge devices will be much more suitable for inference applications, whether end-point devices or edge network systems.

Technology insights in key areas

T

ransformative technologies are impacting markets all over the world, and recent developments in key markets will be driving forces in how technology grows and converges in 2019. IHS Markit provides syndicated market research, advisory services, as well as cost and performance benchmarking services for every aspect of the supply chain for each of these transformative technologies.

AI at the edge vs. AI at the cloud

T

he speed of development in AI, and more specifically 5G: What are service providers up to? in domains like machine and deep learning has aided ccording to the IHS Markit Evolution from 4G to 5G: the adoption of AI in several industries including consumer Service Provider Survey, 82% of mobile operators reelectronics, healthcare, industrial and automotive. We are at spondents are busy with trials and testing of 5G technology. the beginning of an industry revolution. AI is currently imThis activity is mainly in North America and Asia, with 12 plemented end-point devices, at the edge of the network, AI at the edgeonvs. AI at the cloud percent – all from North America – planning commercial 5G or in the cloud. Hybrid combinations are also suitable for The speed of development in AI, and more specifically in AI is currently implemented on end-point devices, domains like machine and deep learning, has aided the at the edge of the network, or in the cloud. Hybrid by year’s end. rollouts certain applications. Each approach comes with its own use adoption of AI in several industries, including consumer combinations are also suitable for certain applications. 82% of mobile operator respondents rated ultra-low lacases, specific requirements, and performance electronics, healthcare, industrial, and automotive. Each approachneeds. comes with its own use cases, specific We are at the beginning of an industry revolution. requirements, and performance needs. tency (ULL) the chief technical driver for 5G, Thousands followed by decreased cost per bit (76%), and inDevelopment creased network capacity (71%). Every technical CLOUD requirements Data Centers for AI solutions aspect related to substantial improvement in network performance such as lower latency, higher capacity, higher bandwidth, and higher throughMillions put, while decreasing the cost per bit continues FOG Nodes to receive high ratings in our survey. This survey PC, Industrial Gateways outcome is logical because these considerations are the foundation of the 5G definition. Billions Meanwhile, the most challenging network of Nodes EDGE development item on the 5G agenda is radio. Devices 53% of operator respondents said radio is the area of the network that will require the biggest End-point edge Where sensors and first data elaboration could be

50 • High performance, latency, and low power

Processing Power

Energy Consumption

Latency

Privacy and Security

A

In particular, cloud AI will allow more computing power to analyze data and utilize more complex algorithms India (such as deepSecurityLink learning), possibly close ■ to February where the 2019 training data is gathered. There are, however, potential issues around privacy, latency, and stability. A stronger


5G readiness: trial, commercial deployment n=17

WHITE PAPER

100%

Percent of Respondents

80%

83%

tives, asset custody across both public and private markets, currency, collateral management, and corporate actions processing. Because the market capitalization of all the world’s stock markets is equal to $73 trillion, even small cost savings and efficiency gains can lead to significant business value for companies and industries that decide to introduce blockchain technology.

60%

40%

12% 0% Source: IHS Markit

35%

29%

20%

2018

24%

18% 0% 2019 Timeframe Trial Commercial

0% 2021 or Later

2020

© 2018 IHS Markit

development effort to make 5G11happen, followed by transport (24%) and management (14%). Enhanced mobile broadband (eMBB) was the highest rated 5G use case driver among survey respondents, followed by real-time gaming. As real-time gaming requires a super-fast network with low latency, it cannot occur in the absence of eMBB; the same applies to high-definition (HD) and ultra-high-definition (UHD) video services and tactile low-latency touch and steer. Even so, respondents expect fixed-wireless access (FWA) to be ready for commercial deployment first. The bottom line is early 5G will be an extension of what we know the best – broadband, whether in FWA or eMBB form. Don’t expect factory automation, tactile low-latency touch and steer, or autonomous driving to be ready on 5G anytime soon despite being touted as the chief 5G use cases.

Blockchain: Nascent today, but opportunities for cost savings and efficiencies are sky-high

W

hile still nascent today, blockchain business value, which refers to the cost savings and efficiencies that could be realized by incorporating blockchain into corporate business strategies, is projected to increase from $2.5 billion in 2017 to $2.0 trillion in 2030. Although blockchain is still an emerging technology, it is expected to be transformative. According to the Blockchain vertical opportunities report from IHS Markit, this technology demonstrates especially significant potential across the following vertical industry markets and application areas:

Financial he financial vertical market, which includes financial services, insurance, and financial technology (fintech), will primarily use blockchain to conduct cross-border payments, share trading, securities, claims management, deriva-

T

Supply chain and logistics he supply chain and logistics industry is projected to improve significantly with the introduction of blockchain technology. Indeed, the World Trade Organization (WTO) estimates that the reduction of barriers throughout the supply chain could potentially increase global gross domestic product by 5% and escalate total trade volume by 15%.

T

Identity management ith the projected increase in the number of blockchain projects that are launched and become commercially deployed, the business value within the identity management sector is projected to reach $200 billion by 2030. The ID2020 initiative continues to promote and support blockchain technology to help the 1.1 billion people who live without an officially recognized identity.

W

Retail and e-commerce he initial uptake of blockchain in retail and e-commerce is projected to be led by trade promotions, decentralized marketplaces, payments, smart contracts, supply chain, and other applications. With the increase in the number of blockchain projects that are launched and become commercially deployed within this vertical sector, the business value is projected to reach $164 billion by 2030.

T

Healthcare n the United States alone, counterfeit drugs cost pharmaceutical companies more than $200 billion annually in lost revenue. Blockchain could potentially help to minimize these losses. For this and other reasons, the business value from blockchain in the healthcare sector is projected to reach $134 billion by 2030. The initial adoption of blockchain within the healthcare sector is happening in the application areas of medical data management, drug development, claim and billing management, and medical research.

I

SecurityLink India ■ February 2019

51

11


WHITE PAPER

AI advances in virtual assistants and HMI

even the automotive industry. Taking the automotive sector as an example, it is well everal companies have been focusing attention on AI, worth considering that even assuming the rapid availability and more specifically on functionalities that today alof AI and ‘self-determining’ technologies, legal aspects are ready have an impact on daily life, like the human machine likely to slow the whole implementation process, especialinterface (HMI). ly for safety-critical applications. OEMs will be subject to Google, Apple, Microsoft, Amazon, Tencent, Huawei, much greater liability if machines are to take over the role of Samsung, and others are investing heavily to improve and to humans as is anticipated in the self-driving car. Nonetheless, provide best-in-class performance in applications like virtual in the same automotive domain, in-vehicle HMI for speech assistants and natural voice recognition. and gesture recognition exhibited a fast introduction of AIRecently, Google Duplex was introduced during the based algorithms with immediate advantages for drivers. Google I/O event. This was just a couple of days after From the competitive landscape perspective, it is inMicrosoft announced the acquisition of Semantic Machines teresting to note that Google, as well as Amazon and other in a move aimed at boosting its AI capability intoHMI HMI apWest Coast US players, have a strong footprint in Europe and AI advances in virtual assistants and plications with in a more natural interaction. Semantic MaAmerica, but their presence is very limited in the fast-growSeveral companies have been focusing attention on Microsoft announced the acquisition of Semantic AI and, more specifically, on functionalities that today to add Machines in a movevalue aimed at AI capability chines’ competence is expected significant toboosting itsing Chinese market. Digital assistants from local Chinese already have an impact on daily life, like the human into HMI applications with in a more natural interaction. Microsoft’s platforms through CortanaSemantic digitalMachines’ assistance and technologies companies – Baidu, Alibaba, Tencent, Huawei, machine interface (HMI). competence is expected to add significant value to Microsoft's platformsXiaomi, through Cortana Xiaoice social chatbot. and the like – are better placed to succeed than their Google, Apple, Microsoft, Amazon, Tencent, Huawei, digital assistance and Xiaoice social chatbot. Samsung, and others are investing heavily to improve Last but not least, and echoing Google and Microsoft, Western counterparts for geo-political reasons as well as for and to provide best-in-class performance in applications Last but not least, and echoing Google and Microsoft, Apple also hinted at new voices and features for Siri that was their specific language competence. like virtual assistants and natural voice recognition. Apple also hinted at new voices and features for Siri that was announced in its developer’s forum, WWDC 2018. and Amazon are, in fact, largely absent from in its developer’s forum, WWDC 2018. Google Recently, announced Google Duplex was introduced during the Google I/O event. This was just a couple of days after the Chinese market, and while Apple is present with Siri, it The human touch offers only relatively limited functionality. This is in part a The human MI istouch a basic application that is extremely powerful. result of Apple’s more closed approach to integrating with HMI, that by isdefinition, can be inautomotive multiplesector ap-as an example, third-party developers and because of other limitations HMI is a basic application extremely powerful. HMI,deployed Taking the it is by definition, can be deployed in multiple applications well worth considering that even assuming the rapid plications and in several industries and domains, from conaround Siri’s functionality for specific use cases. Samsung and in several industries and domains, from consumer availability of AI and “self-determining” technologies, sumer andtomobile electronics to automotive, passing through has a limited share in China; it did not include Chinese and mobile electronics automotive, passing through legal aspects are likely to slow the wholealso implementation smart home and appliances or industrial. Wherever process, especially for safety-critical applications. OEMs smart home and appliances or industrial. Wherever humans language support at Bixby’s launch, and this only came at the humans need to interact, an advanced HMI will be able to will be subject to much greater liability if machines are to beover able add value.as is anticipated end of last year. add value.need to interact, an advanced HMI will take theto role of humans in the selfdriving car. Nonetheless, in the same automotive domain, Although Siri, Alexa, Although Siri, Alexa, and Google Assistant haveand beenGoogle Assistant have been in-vehicle HMI for speech and gesture recognition developed for consumer electronics applications, we in AI in digital assistants developed for consumer electronics applications, alreadyof AI-basedAdvances exhibited a fast we introduction algorithms with already see these companies trying to expand their digital immediate advantages for drivers. hope to increase voice usage see these companies trying to expand their digital assistant assistant and interface into other domains, including smart homes and even the automotive industry. igital assistants and AI look to be in a perfect and interface into other domains, including smart homes and symbiosis and are fast developing. The basic Smart Speaker Market by Revenues business case of HMI is straightforward, enabling and augmenting user interaction with machines. However, according to a recent survey from IHS Markit, despite extensive marketing of smart home devices that can be controlled via voice, less than a quarter of users use voice to control these devices. Smartphone app-based control of smart home devis2018 2021 es is not going away. Advances in digital assistants will also create new business cases, which might be less related to fast and comfortable user experience, but directMicrosoft Cortana Google Assistant Apple Siri Amazon Alexa ly associated with revenue growth and/ or cost reOther/Proprietary Sonos

S

H

D

$ 6.3b

52

$ 11.2b

SecurityLink India ■ February 2019


WHITE PAPER

duction. Natural language skills will allow an improvement IoT: Making app development in customer support and interaction, enabling personalized simpler pplication enablement platforms (AEPs) are an IoT feedback on new offers/ products that might better suit cusplatform segment that facilitate IoT device and data tomers’ needs. management. IoT application developers and adopters inIn today’s connected society, digital assistants are makcreasingly use AEPs across a range ofconsolidation industry verticals to for ing our lives more convenient and paving the way for smarter(AEPs) are Application enablement platforms an IoT According to IHS Markit, will happen platformDigital segment that facilitate IoT device and data IoT application two key reasons: first, thereand is a market perception of simplify development management. and more connected communities. assistants are also management. for IoT application and adopters thereinitially being toofocused many platforms that arethe undifferentiated While AEP vendors on providing feacreating massive revenue opportunities businessesdevelopers both increasingly use AEPs across a range of industry from each other; second, especially since 2014, many tures and functions common across all IoT applications big and small. verticals to simplify IoT application development and very large infrastructure vendors have entered the AEP – and comprising roughly 80% of application code base With adoption rates for digitally assisted voice-commanagement. While AEP vendors initially focused on market. These new vendors could potentially acquire – many vendors are offerings into competitive specifmand products like smart providing speakers the growing exponentially, features and functions common across other extending AEP vendorstheir and greatly increase vertical especially for connected competition in the market is and companies comprising will need roughlyic80% allfierce IoT applications—and of solutions, pressure on the remaining vendors.cars, smart application code base—many vendors are extending their cities, and industrial automation. to optimize product launches, discover areas for improveA principal AEP vendor concern is the degree of forMarkit forecasts a 38% CAGR from 2017 to 2022 IHS ment, and improve costs. offerings into specific vertical solutions, especially uncertainty concerning how best to price AEP offerings. connected cars, smart cities, and industrial automation. Generally, devicenumber management functionality is priced for the rise in the cumulative of IoT devices unIHS Markit forecasts a 38% CAGR from 2017 to 2022 for around $0.50 to $1.00 per device per month, while Next-generation cloud gaming der management by an AEP, rising to 6.7 billion devic- data the rise in the cumulative number of IoT devices under management functionality is priced around $0.20 per gainst a backdrop of burgeoning spend on streamed enes under management by 2022. Likewise, we project a management by an AEP, rising to 6.7 billion devices under device per year. However, owing to the wide variability in tertainment content, amanagement new wave ofby commercial interest growth of annual AEP revenue overwhether 2022. Likewise, we project 33.1% a 33.1%CAGR in thethe specific features and functionality offered, in cloud gaming emerged in 2018, driven by of new technolothe same period, to $83.0 in 2022. This valueCAGR in the growth annual AEP revenue over the same thegrowing monetization modelbillion is consumption-based, period, to $83.0 billion in 2022. Thisgrowth growth is enabled oriented, revenue share, and theoftype AEP vendor gies and new business models, andgrowing by major technology and by theorincreasing adoption IoTofsoluis enabled by the increasing adoption of IoT solutions (e.g., cloud infrastructure vendor versus platform internet companies seeking to make a mark on the games tions across a range of industries and use cases, coupled across a range of industries and use cases, coupled with specialist), there is wide variability in the actual pricing sector value chain, called ‘next-generation cloud gaming.’ with the growing desire of many customers to outsource the growing desire of many customers to outsource as any customer will receive. Furthermore, customers view The market and technological to make cloudin order as muchonIoT development as as possible in orderand to focus much IoTconditions development as possible to focus pricing models overly complex difficultonto resolve. gaming successful are now core morecompetency aligned than ever, and with core competency aspects of their business. aspects of their business. The IHS Markit Application enablement platforms report-2018 commercial services from Google and Microsoft predicted The number of new AEPs introduced to the market held The number of new AEPs introduced to the market tracks the AEP segment of the IoT platforms market. to launch in 2019, IHS Markit expects to then new steady year until 2009,worldwide then newand AEP introducheld steady yearthe overtechnology year until 2009, AEPyear overThe report includes regional market size, make a meaningful impact on the $145 billion market in 2015. tions peaked at forecasts 44 introduced 2015. introductions peakedgames at 44 introduced However, throughin2022, andHowever, an analysissince of keythat technical since that time, the number of new AEP introductions andofmarket influencing the growth opportunity in the during the year. time, the number new trends AEP introductions has declined has declined sharply, the number of AEP vendor exits segment. The cloud gaming value chain offers upand commercial sharply, and theAEP number of AEP vendor exits (through ac(through acquisition or by closing operations) started to opportunities to a cross section of the biggest technology, quisition or by closing operations) started to increase in increase in 2011, peaking in 2017. internet and content companies. These Figure 10: loT Platform Overview companies include cloud service providData exposure, discovery, and Data Exchange ers, telcos, consumer entitlement electronics companies, Data Management Data transfer and governance big media companies, and games publishers. Device Management Device lifecycle management Additionally, cloud gaming is closely Public network connection linked to other broadConnection Management management er technology trends – Private Public GPU computing in the Networks network cloud, ubiquitous vidField Field eo, PC virtualisation, On-device agent Device Device and 5G rollout. Source: IHS Markit © 2018 IHS Markit

A

IoT: making app development simpler

Cloud Hosting

Cybersecurity

A

SecurityLink India ■ February 2019

53


although the industrial sector saw a significant increase in both proof of concept (PoC) and full deployment WHITE PAPER industrial IoT (IIoT) projects in 2018, over half of all endusers have yet to trial industrial IoT solutions. Moreover,

only slightly more than half of projects having shown value. In many cases, this has been as a result of poor project scoping and implementation.

What stage of maturity are your lloT projects 35% Number of responses

30% 25% 20% 15% 10% 5% 0%

Industrial loT deployment stage

We are not considering or implementing IIoT solutions We are evaluating / starting Proof of Concept (PoC) projects We have completed PoC project but have seen no value from this project We have completed PoC project and have seen value from this project

We have moved from PoC and are deploying across our operation We have full deployed our IIoT project – but have not seen sufficient payback We have full deployed our IIoT project – and have seen sufficient payback

Date issued: November 2018 Source: IHS Markit

© 2018 IHS Markit

2011, peaking in 2017. market trends influencing the growth opportunity in the AEP According to IHS Markit, consolidation will happen for segment. In 2019, we expect to see a continued increase in the number of both PoCs and deployments, as well as an two key reasons – first, there is a market perception of there increase in deployments showing a payback. Is industry ready for IoT? being too many platforms that are undifferentiated from storing, and applying data; training existing As well as implementing best practices, companies must ccording to the meaning IndustrialtoIoT readiness survey 2019, each other; second, especially since 2014, many very large workersalthough to adoptthe newindustrial practicessector basedsaw on data collectedinalso evaluate vendors areas where mightmarket. be needed a significant infrastructure have investment entered the AEP These from manufacturing processes; and(PoC) reconsidering to become “IIoT ready.” This includes crease in both proof of concept and full how deploynew vendors could potentially acquire upgrading other AEP legacy vendors products and services are bought sold as new equipment networks that may haveon been place ment industrial IoT (IIoT) projectsand in 2018, over half of all and greatly and increase competitive pressure thein remaining end-users have yet to trial industrial IoT solutions. Morevendors. business models emerge. for decades; evaluating the processes for collecting, over, among those that have success has been mixed with A principal AEP vendor concern is the degree of unceronly slightly more than half of projects having shown valtainty concerning how best to price AEP offerings. GeneralThe biggest challenges to doing IIoT in your organization - weighted importance ue. In many cases, this has been as a result of poor project ly, device management functionality is priced around $0.50 scoping and implementation. to $1.00 per device per month, while data management funcIn 2019, we expect to see a continued increase in the tionality Organisational is priced around $0.20 pertodevice culture averse changeper year. Hownumber of both PoCs and deployments, as well as an inever, owing to the wide variability in the specific features crease in deployments showing a payback. and functionality offered, skills whether the monetization model Lack of employee and knowledge As well as implementing best practices, companies is consumption-based, value-oriented, or revenue share, and must also evaluate areas where investment might be needthe type infrastructure vendor AbilityoftoAEP derivevendor meaning(e.g., fromcloud data collected ed to become ‘IIoT ready.’ This includes upgrading legacy versus platform specialist), there is wide variability in the equipment and networks that may have been in place for actual pricing any customer willtoreceive. Furthermore, cusAbility collect data decades, evaluating the processes for collecting, storing, tomers view pricing models as overly complex and difficult and applying meaning to data; training existing workers to resolve. Legacy equipment and infrastructure to adopt new practices based on data collected from manThe IHS Markit Application enablement platforms re0.0 0.2 0.4processes; and 0.6 reconsidering 0.8 how products 1.0 ufacturing port 2018 tracks the AEP segment of the IoT platforms marDate issued: November 2018 and services are bought and sold as new business models ket. The report includes worldwide and regional market size, Source: IHS Markit © 2018 IHS Markit emerge. forecasts through 2022, and an analysis of key technical and Proportion of responses %

A

54

SecurityLink India ■ February 2019


INTERNATIONAL UPDATES

SecurityLink India â– February 2019

55


FEATURE

2019 DATA PRIVACY BENCHMARK STUDY

Organizations Gain Business Benefits from Data Privacy Investments Length of sales delays from customer privacy concerns reduced by 50 percent GDPR-ready organizations see lowest risk of data breach

O

rganizations worldwide that invested in maturing their data privacy practices are now realizing tangible business benefits from these investments, according to Cisco’s 2019 Data Privacy Benchmark Study. The Study validates the link between good privacy practice and business benefits as respondents report shorter sales delays as well as fewer and less costly data breaches. The European Union’s General Data Protection Regulation, which focused on increasing protection for EU residents’ privacy and personal data, became enforceable in May 2018. Organizations worldwide have been working steadily towards getting ready for GDPR. Within Cisco’s 2019 Data Privacy Benchmark Study, 59 percent of organizations reported meeting all or most requirements, 29 percent expect to do so within a year, and 9 percent will take more than a year. “This past year, privacy and data protection importance

56

increased dramatically. Data is the new currency, and as the market shifts, we see organizations realizing real business benefits from their investments in protecting their data,” said Michelle Dennedy, Chief Privacy Officer, Cisco, “At Cisco, we absolutely believe in both protecting our customers and driving business success by maximizing the value of data and minimizing risk.” Customers are increasingly concerned that the products and services they deploy provide appropriate privacy protections. Those organizations that invested in data privacy to meet GDPR experienced shorter delays due to privacy concerns in selling to existing customers – 3.4 weeks vs. 5.4 weeks for the least GDPR ready organizations. Overall the average sales delay was 3.9 weeks in selling to existing customers, down from 7.8 weeks reported a year ago. GDPR-ready organizations cited a lower incidence of data breaches, fewer records impacted in security in-

SecurityLink India ■ February 2019


FEATURE

cidents, and shorter system downtimes. They also were much less likely to have a significant financial loss from a data breach. Beyond this, 75 percent of respondents cited that they are realizing multiple broader benefits from their privacy investments, which include greater agility and innovation resulting from having appropriate data controls, gaining competitive advantage, and improved operational efficiency from having data organized and catalogued. More than 3,200 global security and privacy professionals in 18 countries across major industries responded to the Cisco survey about their organizations’ privacy practices. Key findings include: ●● 87 percent of companies are experiencing delays in their sales cycle due to customers’ or prospects’ privacy concerns, up from 66 percent last year. This is likely due to the increased privacy awareness brought on by GDPR and the frequent data breaches in the news. ●● Sales delays by country varied from 2.2 to 5.5 weeks, with Italy, Turkey and Russia at the lower end of the range, and Spain, Brazil and Canada at the higher end.

Longer sales delays can be attributed to areas where privacy requirements are high or in transition. Delayed sales can cause revenue shortfalls related to compensation, funding, and investor relations. Delayed sales also can become lost sales if a potential customer buys from a competitor or decides not to buy at all. ●● Top reasons cited for sales delays included investigating customer requests for privacy needs, translating privacy information into customer languages, educating customers about an organization’s privacy practices, or redesigning products to meet customer privacy needs. ●● By country, GDPR-readiness varied from 42 percent to 75 percent. Spain, Italy, UK and France were at the top of the range, while China, Japan and Australia were on the lower end. ●● Only 37 percent of GDPR-ready companies experienced a data breach costing more than $500,000, compared with 64 percent of the least GDPR-ready companies.

Getting Switched on to Low Light Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, puts low light cameras under the spotlight

A

ccording to a recent report produced by IHS Markit, the number of video surveillance cameras equipped with advanced low-light functionality is set to soar over the next four years. Whilst it is estimated that in 2015 there were approximately 4.75 million of these types of cameras delivered to the market, in 2022 this number is projected to increase to about 51 million. The good news for system integrators and their end-user clients is that through economies of scale and increased competition, the price of these cameras is likely to gradually reduce. This will make them affordable for virtually any video surveillance project and thus fuel the growth in the number of them deployed. Conversely, it is bad news for intruders who would

normally use the cloak of darkness to break into a site, as end-users are now able to deploy high definition cameras which are able to capture identification grade images in very low light conditions.

What do we mean by ‘advanced low-light camera capability?

W

ell, as an example, a bullet camera which has recently come onto the market is being supplied with the world’s first 0.94 f-stop lens which, when combined with sens-i technology built into the camera’s new sensor, delivers noiseless, clear colour images when the light levels are as low as 0.004Lux. The low light performance of this particular camera means there are unlikely to be many sit-

SecurityLink India ■ February 2019

57


FEATURE

uations where the camera’s built-in IR illumination will be required.

Nice or necessary?

H

uman beings are able to observe objects and activity in relatively low lighting conditions thanks to the complex processing which goes on between the eye and brain. Until recently, video surveillance cameras have not shared anything close to this phenomenal processing power and have therefore struggled to deliver quality images in challenging lighting conditions. Green issues such as light pollution and energy costs, as well as the capital and installation costs associated with the provision of supplementary lighting, have significantly increased the demand for the latest generation of video surveillance cameras which are able to generate evidence grade images in very low light conditions. Although many of these cameras feature built-in IR LED illumination, these alone will not satisfy the requirements for all video surveillance application requirements. Where, for example, cameras have been installed for covert surveillance purposes, the red light emanating from the LEDs are likely to give the game away to unwanted intruders well before a control room operator can alert security guards or the police. For safety reasons, railway operators will not deploy cameras which have red IR illumination. Nevertheless, they are increasing in popularity and understandably so as the built in IR LEDs which consume low amounts of energy are automatically activated and depending on the camera model, can provide effective lighting up to a distance of 100 metres. 58

On some of the latest generation of cameras, the IR intensity is automatically adjusted to provide the appropriate level of IR light depending on the zoom ratio, whilst some ‘Flateye’ cameras have a flat surface cover which is applied to the front of the lens instead of the dome cover. This reduces IR diffused reflection which is caused by moisture and in the absence of a normal transparent dome cover, also removes the effect scratches can have on image clarity.

Specification

T

here isn’t a single answer to the difficulties presented by low light environments, but with the right advice, designing a video surveillance solution to cope with the challenge should not be a difficult task. A combination of high resolution and low sensitivity is vital, but it is also important that the cameras have performance enhancing features and functions such as wide dynamic range (WDR), automatic gain control (AGC) and sense-up. The lens used must also be able to match the performance of the camera, thereby getting as much light as possible onto the image sensor. It obviously makes sense to work with a manufacturer who is prepared to back its confidence in its low light cameras by being prepared to carry out a live on-site demonstration. It is certainly worth taking the time to research various options so that one doesn’t suffer from ‘buyers’ remorse’ by making a hasty decision. There is no shortage of cameras to choose from, but these can be filtered by seeking advice from a systems integrator or the technical department of the distributor they source cameras from.

SecurityLink India ■ February 2019


FEATURE

New Data Show Demand for Cybersecurity Professionals Accelerating E

mployer demand for cybersecurity professionals across the United States continues to accelerate, according to new data published on CyberSeek™, a free online resource from the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST), Burning Glass and CompTIA. U.S. employers in the private and public sectors posted an estimated 313,735 job openings for cybersecurity workers between September 2017 and August 2018. That’s in addition to the 715,000-plus cybersecurity workers currently employed around the country. The new figures from CyberSeek were recently announced at the National Initiative for Cybersecurity Education (NICE) Conference in Miami. The NICE program, led by NIST, is a partnership between government, academia, and the private sector focused on cybersecurity education, training and workforce development. CyberSeek was created by CompTIA, an IT industry association, and Burning Glass Technologies, an analytics software company, through a grant awarded by NIST in 2015. The new CyberSeek data show that cybersecurity workers are in particular demand, even as job openings outpace job seekers in the U.S. Across all occupations, there are currently 5.8 employed workers for every job opening. Within the cybersecurity field, the ratio of existing cybersecurity workers to the number of cybersecurity job openings is 2-to3. That means employers have fewer trained cybersecurity workers in the labor force to choose from and must look to other tactics – including retraining current workers or attracting and training new talent – to fill their needs for cybersecurity professionals. CyberSeek is aligned with NIST’s NICE cybersecurity workforce framework, which categorizes and describes cybersecurity work and helps CyberSeek provide clear data on which job roles are most in demand. The latest CyberSeek update reveals that positions in operate and maintain (207,190 openings), securely provision (186,864), protect and defend (129,716), and analyze (124,389) are the most sought after by employers.

Among specific core jobs, the top five by employer demand are cybersecurity engineer, cybersecurity analyst, cybersecurity manager/ administrator, cybersecurity consultant, and penetration and vulnerability tester. The Washington, D.C., metropolitan area has the largest number of job openings for cybersecurity professionals (44,058). Rounding out the top five metro areas are New York City (20,243), Dallas (12,062), Chicago (11,201) and Los Angeles (10,589).

CyberSeek career resources

B

eyond the comprehensive supply and demand data, CyberSeek also features an interactive career pathway showing key jobs within cybersecurity, common transition opportunities between them, and detailed information about the salaries, credentials and skillsets associated with each role. For example, average salaries for core cybersecurity jobs range from $75,000 for a cybersecurity specialist/ technician to $129,000 for a cybersecurity architect. CyberSeek provides content to help local employers, educators, guidance and career counsellors, students, current workers, policy makers and other stakeholders build and maintain the U.S. cybersecurity workforce.

SecurityLink India ■ February 2019

59


APPLICATION/ CASE STUDY

Equips Belgian Medical Center with

Access Control and Automatic Vehicle Identification

N

edap has provided physical access control and long-range readers for vehicle identification at the new AZ Zeno medical care center in Knokke-Heist (Belgium). AZ Zeno, which opened in April 2018, comprises a hospital with rehabilitation center, an outpatient clinic, auditoria, public event space and a heliport. Nedap Identification System and Nedap Security Management have worked together on this extensive project.

Simplify & Secure

IoT Connectivity to the AT&T Network with all-in-one eSIM and IoT Module

G

Secure yet accessible medical center

I

t is AZ Zeno’s highest priority to guarantee the security of patients and employees. With Nedap’s TRANSIT long-range identification readers, emergency vehicles get swift access to the hospital’s premises. With AEOS, Nedap provides the medical care center with a complete solution for physical access control, and the system will also be used to manage staff lockers. By combining Nedap’s solutions, AZ Zeno is able to offer both patients and employees the best possible security and accessibility.

Complementary products

A

Z Zeno combines functionality and sustainability and respects the rural character of the local landscape. The link between inside and outside and between medical facilities and public spaces is almost seamless. The center’s sustainable design focuses on its surroundings, ecological energy and the use of reclaimed materials. Nedap-CEO Ruben Wegman said, “We are proud that two of our business units contribute to the security of this exceptional and innovative center and to a better accessibility for its users. The simultaneous implementation of AEOS and TRANSIT is a great example of the complementary character of Nedap’s products.” To implement the system, Nedap collaborated with partner Electro Enterprise Gullegem. 60

SecurityLink India ■ February 2019

emalto is helping simplify and secure IoT connectivity for AT&T customers by integrating its embedded SIM (eSIM) inside the Cinterion® LTE-M IoT module. The new solution streamlines development for OEMs and reduces the cost and complexity of IoT deployment by eliminating the need for SIM card integration after manufacturing. In addition, the eSIM helps maintain the strongest security levels with continuous security updates for the long life of IoT solutions.

Combining IoT efficiency with design simplicity and deployment ease

W

ith an AT&T eSIM integrated in the Cinterion EMS31 LTE-M module, customers will take advantage of the power and bandwidth efficiency of low power wide area networks (LPWAN) without having to buy and install SIM cards. The tiny eSIM is more than 90% smaller than traditional SIM cards making it ideal for size-constrained devices such as wearables and trackers that often need extra space for a larger battery. With fewer components to integrate, the all in one eSIM IoT module


APPLICATION/ CASE STUDY

saves development effort and speeds time to market. In addition, achieving scalability is easier and the total bill of materials (BOM) is reduced.

Strengthened IoT security designed in from the beginning

I

ntegrating the SIM deeply into the module during manufacturing helps durability making it more resistant to heat and vibration while improving tamper resistance. It also strengthens security by enabling easy updates that protect devices from evolving cyber security threats. Optional embedded secure element (eSE) functionality provides an additional layer of security to store data in a highly secure vault and only share with authorized applications and people. “We’re pleased to work with Gemalto to make the Cinterion LTE-M module available on our network and to simplify connectivity provisioning while retaining and even improving the strongest security levels,” said Cameron Coursey, Vice President, Internet of Things Solutions, AT&T, “The Cinterion LTE-M IoT module with native AT&T eSIM will expand low power wide area cellular connectivity and help enable a host of new IoT use cases requiring highly integrated designs.” “The increasing adoption of eSIM technology marks a significant transformation in wireless technology that is driving innovation and improved security across the whole lifecycle of devices,” said Andreas Haegele, SVP IoT Products, Gemalto, “The Cinterion LTE-M Module with embedded SIM technology benefits mobile operators and OEMs alike with enhanced flexibility and seamless connectivity for the IoT.”

Dahua HDCVI Secures Five-Star Rated Hotels at CICA Shanghai D

ahua Technology, a world leading manufacturer and supplier of video surveillance products has successfully secured five-rated hotels in Shanghai with inhouse HDCVI solution. These hotels were playing host to 46 national and organization leaders in Asia during the fourth edition of Conference on Interaction and Confidence Building Measures (CICA).

Challenges

S

hanghai municipal government attached great importance to the summit and spared no endeavor to make sure that everything goes secured. To level up video surveillance is among on its must-do list. More than 50 reception hotels were required to upgrade surveillance system from standard definition to high definition.

Best solution

U

nder such circumstances, and given the fact that these hotels were dominated by conventional analog systems, it came to a natural decision to adopt Dahua HDCVI as it allows easy upgrade without changing the existing cabling, and also provides long-distance and non-latent image quality. Moreover, the whole upgrade took more or less 10 days as cabling system remained intact, and only cameras, DVRs along with fiber optical transceivers were replaced by HDCVI ones. With aesthetic requirement for the hotels, HDCVI offers wide range of housings and its speed domes and box cameras are perfectly aligning with the décor in the lobby, reception, entrance and dining areas. “This project demonstrates all the benefits of HDCVI and has proved applicable and workable. Within only 10 days, the whole video surveillance system was upgraded to high definition which did not happen in IP solution. What HDCVI has offered to the industry is another HD solution and this has highly satisfied our customers.” SecurityLink India ■ February 2019

61


APPLICATION/ CASE STUDY

National Commercial Bank Chooses IDIS

For Nationwide Surveillance Upgrade Across its Entire Estate Arab world’s banking leader makes major security investment

S

audi Arabia’s National Commercial Bank (NCB) is using IDIS technology for one of the biggest financial surveillance system upgrades ever seen in the region, involving at least 1000 NVRs and over 2500 IP cameras. The bank, which serves over 5.4 million customers and is the second largest in the Arab world, chose an IDIS solution to modernise its security and comply with the latest standards introduced by the Saudi Arabian Monetary Authority (SAMA) and Ministry of Interior. IDIS, which is the largest manufacturer of surveillance technology in South Korea, confirmed that the project involves an upgrade to full HD IP technology across 400 branches and more

62

than 2580 ATMs, to be completed ahead of the 2021 deadline. NCB, also known as AlAhli Bank, needed NVRs that would provide RAID 1 and RAID 5 support, and a solution that would allow integration of both IP and existing analogue infrastructure, and the capability to cost-effectively store video footage for a full year. Leading solutions provider Almajal G4S was appointed for the job, and following a competitive tender process IDIS technology was identified as performing better than alternatives in detailed and rigorous proof-of-concept testing. “Keys advantages for NCB in choosing an IDIS solution is the technology’s robustness, its resilience against data loss, and high level protection against cyber threats. Using IDIS technology is also ensuring a frictionless migration from existing analogue,” says Ahmad Said, ESS Director at Almajal G4S. Thanks to its hybrid capability, IDIS technology allows analogue and IP cameras to be used together, making the upgrade project easily manageable, with a seamless, staged switch-over. For this mission-critical project, IDIS’s Linux based SecurityLink India ■ February 2019

servers and proprietory protocols also offered the highest level of resistance to hacking, while zero-configuration elminates the need to manage IP addresses for every device, all of which gave NCB the network security assurances they were looking for. An important consideration for NCB was IDIS Intelligent Codec which, together with dual H.264/ H.265 performance, delivers up to 90% reduction in bandwidth and storage. This gives the bank significant, on-going savings allowing compliance with video data storage rules. “It also speeds up recording retrieval and helps to make NCB’s new security system easier and more economical to run,” said Harry Kwon, General Manager, IDIS Middle East and Africa, “With the upgrade already proving its value the bank’s central monitoring teams now work more efficiently with their system providing event forwarding, acknowledgements, notifications and live pop-ups.” Providing the lowest total cost of ownership, the IDIS solution will allow efficient maintenance and simultaneous remote upgrades for multiple devices and gives NCB the assurance of the industry-leading IDIS Ultimate Warranty. The project is due for completion in 2019. NCB and the associated IDIS solution will be the first to achieve full compliance with the new SAMA standards.


APPLICATION/ CASE STUDY

eFusion Plays Central Site Management Role at Dubai’s Landmark Bluewaters Island Full integration enabled across security, safety and site management systems

M

axxess eFusion technology is being used to provide seamless integration and easy management of security, safety and site management systems at Bluewaters Island, Dubai. The region’s newest tourism hotspot, Bluewaters opened in November 2018 and is expected to attract more than 3 million visitors every year. The USD 1.6bn project was completed by Meraas Holdings over five years and comprises four luxury residential complexes, a landmark Caesars Palace hotel, a shopping mall and the world’s largest observation wheel, Ain Dubai, as its centrepiece. Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system, with particular emphasis on a solution that would be efficient to use, inexpensive to maintain and robust going forwards. Following a sector comparison Maxxess eFusion technology was identified as providing the best fit. It was chosen instead of a more costly or complex

conventional PSIM solution because it uses versatile, open-technology software. As per Omnix International, one of the leading integrators brought in for the project, eFusion proved particularly straightforward to work with, offering the advantages of a modular building block approach and allowing maximum freedom to integrate, customise and adapt to future needs. “Thanks to its compatibility with leading surveillance, intruder, access and fire detection systems, eFusion proved to be a highly efficient integration technology for the Bluewater project,” said Henry Azoury, Senior Security Design and Engineering Manager at Omnix International. The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system. It allows a unified system approach with a single enrolment protocol for both front- and back-of-house access. The solution enables centralised management of room safes, mini-bars and cupboards, and for control of all alarm transactions. eFusion integration with the Zenitel Stantaphone IP Intercom System ensures that video and transaction data is calledup automatically in the Bluewaters control room as soon as any user press a call button. For maximum efficiency, the system allows the operator to unlock doors and communicate with the user remotely, with full activity logs kept for audit. With easy integration to the SeeTec video management system, eFusion also SecurityLink India ■ February 2019

allows seamless control of all cameras. In addition, cameras are linked to the door access system, with video pop-up triggered by pre-defined events. The solution also gives the operators complete PTZ control, playback and video functionality. ID badging and building management systems are also fully integrated, allowing easy operation and control of a wide range of functions including heating, ventilation and air conditioning. “For maximum efficiency there is no need to switch between different management systems and the eFusion platform is easy to work with, allowing full benefit from integration with individual systems,” says Lee Copland, Managing Director EMEA, Maxxess. “The eFusion platform is based on technology that delivers robust, reliable performance, as well as being fully scalable as needs change the future. “We look forward to our continued work with Omnix International, which is providing the world-class specialist engineering services combined with local, customised support that customers value.” 63


APPLICATION/ CASE STUDY

Hybrid Provides Perfect Lighting Solution for Lebanon Palace T

he palace located in the Lebanese mountains outside Beirut, lies at an altitude of 1,150 metres above the Lamartine Valley. The ornate design and treasured contents of the palace meant the client wanted an advanced security solution for the premises to protect both indoor and outdoor areas. The client approached local security company, Security Engineering, who specialise in complex integration between various systems to provide an effective solution for their property.

What were the requirements?

T

he client wanted to achieve high levels of security which they could control and activate remotely. Security Engineering recognised this would be best achieved using a range of different devices to provide a complete solution, combining CCTV surveillance with an intrusion alarm system. 64

As well as the need for IR lighting to assist the CCTV system in the challenging low light conditions, the client also wanted to use white-light as a deterrent to any potential intruders whenever an alarm was raised.

Which products were installed?

R

aytec’s Vario2 IP PoE Hybrid 8 units were selected for use on this project and would be used alongside Optex laser beam detectors, and Bosch cameras (equipped with video analytics) and intrusion panel. All devices were linked to a Bosch video management system (BVMS) which would be used to control the system. Together, these devices would provide the client with the CCTV surveillance and intrusion alarm system they required and would be connected using TCP/ IP technology in a unified communications protocol.

 Due to low light challenging conditions, and in order to maintain quality and efficiency of our Bosch cameras, we decided to use Raytec product for the advanced features it offered in enhancing the overall night image and delivering optimized end result of the camera under the given circumstances  Khaled Jaber Managing Director, Security Engineering SecurityLink India ■ February 2019

What was the solution?

A

s the only IP enabled illuminator combining white-light and infra-red into a single unit, Raytec’s Hybrid illuminators provided the client with the greatest level of functionality, flexibility and control. In infra-red mode, the illuminators provide high quality images for general night-time surveillance. The quality of illumination meant the camera analytics could clearly identify any intruders approaching the palace and boosted the accuracy of detection. Crucially for the client, Hybrid’s dual functionality also meant white-light could be triggered as a deterrent (when an alarm was activated by the camera analytics or the Optex laser beam) to scare off any intruders. As well as being able to easily control the entire system remotely through the VMS, the entire system also linked to an indoor keypad or mobile app which had to be activated in order to arm the system. This ensured the deterrent light-


APPLICATION/ CASE STUDY

ing was only enabled when needed and couldn’t be triggered by false alarms.

Why was Raytec chosen?

F

rom the outset, Security Engineering identified the need to use both infra-red and white-light illumination. Combining infra-red, white-light and IP capability in a single illuminator, Hybrid represents the most advanced product of its type in today’s security market, providing the client with a more dynamic security response and tight integration with the other devices being used as part of the solution.

Thanks to Hybrid’s IP capability, all elements of the solution could work together seamlessly. As an open platform, all Raytec IP illuminators can easily integrate with a wide range of security devices – in this instance, Optex detectors and Bosch cameras. This gave Security Engineering greater flexibility when specifying their solution. Hybrid’s dual use also helped reduce the number of illuminators used on-site (previously the client would have had to install separate, dedicated white-light and infra-red illuminators), reducing outlay on infrastructure and cabling by half.

With no compromise on performance, Hybrid achieves the same power and distance as two dedicated illuminators; an important factor for the challenging low light conditions.

Secures Two New Banking Wins

A Top 5 U.S. Bank and a Leading Mexican Bank Including a $3+ Million Three-Year Services Agreement, Expanding its Software and Recurring Revenue Base

I

dentiv, Inc., a global provider of physical security and secure identification, has secured new agreements with two major customers in the banking vertical. The first new agreement is a threeyear software and services agreement with an existing customer that has been using Identiv’s 3VR video and analytics solution for bank branch security, fraud detection and ATM skimming prevention. This top 5 U.S. bank customer has contracted with Identiv to provide maintenance services to support its video security and analytics infrastructure, which encompasses over 10,000 video surveillance cameras throughout North America. The aggregate value of the contract exceeds $3 million. Additionally, the company recently secured a win with a leading Mexican

banking conglomerate. The initial deployment across more than 100 locations combines video security, customer experience and business enablement. “These two wins reflect our focus on expanding our recurring revenue base, as well as continued growth and momentum in our banking vertical,” said Steven Humphreys, Identiv CEO, “It is a representative of our emphasis on strategic verticals, as well as growing our recurring revenues across our customer base. Through our comprehensive solutions and our strong customer relationships, we are expanding the software revenue and services aspects of our business, as well as expanding from pure security applications into business-enabling solutions. As we continue to leverage our installed base and secure new SecurityLink India ■ February 2019

customers, we expect our recurring revenue business to continue to increase, generating more sustainable growth and margin expansion over time.” Identiv, Inc. is a global provider of physical security and secure identification. Identiv’s products, software, systems, and services address the markets for physical and logical access control, video analytics and a wide range of RFID-enabled applications. Customers in the government, enterprise, consumer, education, healthcare, banking, retail, and transportation sectors rely on Identiv’s access and identification solutions. Identiv’s mission is to secure the connected physical world – from perimeter to desktop access, and from the world of physical things to the Internet of Everything. 65


APPLICATION/ CASE STUDY

Safeguarding One of Greece’s Most Notable Civic Projects T

he Stavros Niarchos Foundation, one of the world’s leading private, philanthropic organizations, prides itself on making a lasting impact on society and supporting projects that serve the public welfare. In 2016, this vision came to life through its funding for the development of the Stavros Niarchos Foundation Cultural Center (SNFCC) in Athens, Greece. With its beauty undeniable, the SNFCC was designed by Italian architect Renzo Piano as a multifunctional arts, education and entertainment complex. The center consists of facilities for the National Library of Greece, the Greek

National Opera and the Stavros Niarchos Park. The complex operates based on three main elements – education, culture and sustainability. Visitors can attend various events and programs that encourage learning, promote social interactions and improve the overall quality of life.

Comprehensive and reliable

O

f course, a landmark of such importance draws plenty of attention, therefore demanding a comprehensive and reliable security strategy in place at all times. With many different locations needing protection at once, user-friendliness of a system was also top-of-mind for security officials. SiPass integrated proved to be a perfect fit for the SNFCC as a security management system (SMS) that could perform a variety of functions within a single cohesive platform. Access control, for example, is managed through Mifare facility smart card encoding, meaning that specific sector blocks can be read, increasing the facility’s level of security.

66

SecurityLink India ■ February 2019

When it comes to intrusion, SiPass integrated creates alarm zones that can be armed from the client’s PC, with an attempt to cross one of these zones triggering an alarm. With more than 10 clients installed across the facility, officials can always be aware of potential threats or security incidents within a moment’s notice.

Intuitive and dependable

T

hese notifications are gathered in a graphics model that displays all relevant peripherals including video cameras for verification and monitoring. This intuitive and dependable system provides enhanced situational awareness for all aspects of the complex. The Stavros Niarchos Foundation Cultural Center’s investment in SiPass integrated ensures the safety of people and property, allowing it to uphold its legacy as “a great civic, cultural, educational and environmentally responsible landmark of international stature.”


APPLICATION/ CASE STUDY

Improves Safety at Littleton Public Schools L

ittleton Public Schools (LPS) is a premier school district located a few miles south of downtown Denver. LPS serves 28 square miles and includes the majority of the City of Littleton, Town of Columbine Valley, and portions of the municipalities of Bow Mar, Centennial, Greenwood Village, and the City of Englewood. With about 15,000 students, LPS offers a comprehensive education from preschool through Grade 12. Students attend 13 elementary schools,

4 middle schools, 3 high schools, several alternative programs, preschools, and two charter schools.

The challenge

Our overall goal is pretty simple,” said Guy Grace, LPS Director of Security & Emergency Preparedness, “We must have quality technology delivering quality results, because we cannot have a successful educational experience without safety and security taken care of and taken care of well.”

After a thorough review, Grace concluded that his legacy DVRs were just not meeting the expanding security needs of the school district.

The solution

L

ittleton selected 3xLOGIC as a primary vendor for an upcoming bond issue, and upon the bond issue’s successful outcome, it began purchasing NVRs and cameras. “What I really liked was the hybrid NVR allowed me to incorporate existing analog cameras and add new IP cameras whenever I wanted,” continued Guy Grace. Once the entire project is fully completed LPS will have a total 1400 cameras, and Grace expected the mix to be about one-third IP and two-thirds analog initially, with full migration to HD IP cameras. Also, as the project has progressed, LPS has been increasing the proportion of 3xLOGIC cameras in the overall mix, deploying over 10 different models of the cameras. SecurityLink India ■ February 2019

The benefits

Every day there is something we use the video for. I’ve been in this business for 28 years, back in the day we’d have a burglary a week, now they’re few and far between. We do have several incidents a day – student discipline issues, vandalism, suspicious incidents – but this system is a huge deterrent and it’s helping keep our school community safe,” added Guy Grace. With proper camera placement and video quality, LPS has brought vandalism down more than 75%. Under the old video surveillance system, the district saw vandalism rates creeping back up. “3xLOGIC cameras have excellent ease of use, and because the LPS staff does a lot of maintenance work on installed cameras, that’s very important to us. The ease of use and the compliments we get on the 3xLOGIC system have been a big improvement – that’s huge. You want it to be a positive experience so that people will use it. If we’re using it, then we’re successfully improving security on our campuses,” concluded Guy Grace. 67


APPLICATION/ CASE STUDY

Upgrading Security at University of Hull T

he University of Hull has brought their access control technology into the mobile age. To better serve its students while also increasing security throughout the campus, the university partnered with HID Global, a worldwide leader in trusted identity solutions. The partnership has provided the university more efficient access control to campus buildings and has improved the experience for students and staff.

 The university considers secure access control to be very important for the safety of the students and staff. It’s not only good for a student, it’s also good for their parents to know that there is solid security around the student residences  – Gary Moore

Challenges

T

he University of Hull manages about 25,000 students and 2,500 staff identities with an expected increase in students year over year. Students and staff were accessing housing accommodations, lecture halls, libraries, research buildings, and other secure locations with old access card technology. To improve their security, the University of Hull updated their magnetic stripe (magstripe) cards to contactless

68

technology several years ago, but still found the solution lacking. Issuing thousands of access cards and maintaining credentials was logistically demanding and inefficient. “As you can imagine, over 520 people arriving at student residences for the weekend, with all of their parents, grandparents, dogs and others, is quite chaotic,” said Gary Moore of the University’s ICT Department. Beyond the laborious upkeep of physical cards, the University of Hull – like many other universities – found that students often lost or misplaced their student IDs/ access cards. The University of Hull sought to reduce the need for staffing and late night disturbances caused by students who lost their cards. The university wanted a new solution that could be integrated into their current secure access software, while also SecurityLink India ■ February 2019

being able to efficiently issue and manage student IDs. The new solution also needed to be easy for students to adopt. While security was imperative for the university, they didn’t want it to create a hassle for students and staff using the new solution.

Solution

T

he University of Hull partnered with HID Global to increase security while improving their identity management process and the student experience at the same time. The university deployed iCLASS SE® readers and HID Mobile Access®, which make it possible for students to carry their IDs (that also contain their access credentials) on their smartphones. Now, students and staff simply use their mobile phones, smartwatch, and other mobile devices to quickly and conveniently access buildings across the campus. HID Mobile Access integrates with the University of Hull’s security software, provided by Genetec, and eliminates redundancy in the workflow required to manage identities. “The university considers secure access control to be very important for the safety of the students and staff. It’s not only good for a student, it’s also good for their parents to know that there is solid security around the student residences,” said Gary Moore, “HID and Genetec have seamlessly integrated the mobile access offering so that now all I have to do is add a credential into the Genetec system, which auto-populates the HID Mobile Access Portal. This simplifies my process. Now, I just enter information once to provision a credential unlike


APPLICATION/ CASE STUDY

Partners with

To Deliver AI-powered Video Analytics To Government Agencies in European Countries

B

the previous two-step process.” “The benefits and advantages for having mobile access will definitely come to the fore next year when we register mobile credentials prior to student arrival,” added Moore, “We can have students’ mobile IDs pre-deployed before arrivals. From the students’ perspective, they just arrive and start using their smartphone to access their room. It’s far easier.” To enter a secured door, students and staff present their mobile device to an iCLASS SE reader for access.

Benefits

W

ith HID Mobile Access, the University of Hull stepped up their security and reduced the need for physical access cards that are cumbersome to manage and often misplaced by students. Moving to a mobile infrastructure for access control had many benefits including: ●● Seamless integration with third-party software and devices. ●● Higher user satisfaction. ●● Scalable. ●● Increased efficiency. ●● Ease of use. When surveyed, students reported positive feedback from using HID Mobile Access. “It makes the university a lot more attractive for students,” said Mark Mullaney, Assistant Director of Commercial Services at the University of Hull, “For the student, it provides a more secure way to access buildings and provides a better experience for them overall, and for the university itself, it is a recruitment tool that we can offer to incoming students.”

rainChip, a leading developer of software and hardware accelerated solutions for advanced artificial intelligence (AI) and machine learning applications, has signed a strategic partnership agreement with SoftCryptum to sell BrainChip’s AI-powered video analytics solutions to government agencies in France, Belgium and Switzerland. SoftCryptum sells security and data analytical solutions around the world, particularly to government agencies that require video and image content analysis tools for CCTV footage. Often recorded in low resolution, the recordings from such video surveillance systems are ideally suited for analysis using BrainChip’s unique, multi-award-winning technology. Based on spiking neural networks, BrainChip’s video analytics solution has already been commissioned by several European government agencies to help speed up investigations. Law enforcement agencies require a way to rapidly sift through terabytes of recorded video to identify and track complex characteristics of suspects and witnesses including faces and patterns on clothing. BrainChip Studio software enables instant training of many types of objects and patterns in the field, 20 times faster than a human operator. Guillaume Tissot, Co-founder and President of SoftCryptum commented, “The fact that BrainChip Studio is being successfully utilized by government agencies highlights the benefits it can offer to other security agencies. We will use our growing customer base to further accelerate the adoption of BrainChip’s technology. With a solid network of contacts in law enforcement, defense and intelligence agencies, our company is well positioned to help promote, install and support BrainChip’s AI-powered software and hardware solutions.” BrainChip’s Director of EMEA Sales, Luis Coello added, “We are delighted to enter into this reseller agreement with SoftCryptum. This new partnership strengthens the visibility of BrainChip Studio in European government agencies and improves operational and sales efficiency for our business. SoftCryptum has long-established relationships within many government entities, and we expect to see many new customers implement our technology as a result.”

SecurityLink India ■ February 2019

69


APPLICATION/ CASE STUDY

Smart Casino Solutions Optimize Casino Operations Dallmeier to present innovative technologies for gaming, surveillance and marketing at ICE London 2019

M

any casino operators still struggle with undetected fraud and theft, high operating costs and inefficient, manual processes. At the same time, business intelligence data are scarce and a huge potential for optimizing business processes remains untapped. The ‘Smart Casino Solutions’ from industry pioneer Dallmeier promise a holistic approach to solve these challenges with an innovative combination of video technology and artificial intelligence (AI).

Gaming

Casino automation technology for Blackjack turns the table into a slot machine ue to their ‘analogue’ nature, classic table games such as Blackjack were previously difficult to integrate into data processing and analysis. Dallmeier’s casino automation technology (CAT) – the first gaming automation system that is live in a productive environment – uses AI technologies and standard full HD IP cameras to gather all sorts of data. By doing so, CAT offers a wide variety of insights and automation of core gaming processes. The system recognizes

D

70

chips and cards, and provides real-time information about bet position and bet value, game pace and float value, to name just a few key functionalities. For the first time, this allows for an accurate player rating, highly increased game pace and a much more effective protection from fraud. CAT is available for Baccarat and Blackjack.

Surveillance

Casinos minimize their TCO with Panomera® urthermore, classic surveillance and CCTV also play a major role in casinos. Large areas have to be monitored to protect guests, players, employees and the casino’s inventory. With the new 360-degree version of the patented Panomera® multi-focal sensor system, casino operators can cover much larger areas with the same number of operators while

F

SecurityLink India ■ February 2019

at the same time significantly improving overall security due to high resolution, 360-degree view of the overall scene. In case of an incident, operators can zoom into scenes like with a PTZ camera – but without losing the overall picture both in live and recording. Also, multiple operators can zoom in at the same time resolving complex scenarios. All this reduces the cost for video security infrastructure enormously, leading to a significant lower total cost of ownership (TCO).

Marketing

Smart marketing measures for business intelligence he smart casino solutions from Dallmeier are rounded off by their marketing aspect. By intelligently combining video technology-based functions (e.g., people counting) with AIbased gaming automation technologies and other analysis techniques, casinos can get access to a formerly hidden treasure of data. Gathering, analyzing and understanding those data help casinos better plan their business and make more informed decisions based on the behavior and preferences of their visitors and players.

T


2019

INTERNATIONAL UPDATES

New Record Set in Dubai Visitor Numbers Increase 23 Percent Year-on-Year World’s leading trade fair for security, safety, and fire protection attracts 35,889 trade buyers and professionals from 126 countries

A

new record in visitor numbers has underlined what has been the most successful edition yet for the world’s leading trade fair for security, safety and fire protection in Dubai. The 21st edition of Intersec, which concluded its three-day run on 22nd January 2019 at the Dubai International Convention and Exhibition Centre, attracted 35,889 visitors from 126 countries, a 23 per cent year-on-year increase over the previous year (29,000 in 2018). With 1,212 exhibitors from 54 countries, six show sections, 15 country pavilions, live outdoor demonstrations, a drone zone, and the new Future Security Summit, Intersec was at its very best, where new business partnerships shared the stage with innovative product launches. Organised by Messe Frankfurt Middle East, Intersec 2019 took up a sprawling 60,000sqm at its Dubai venue, with Fire and Rescue forming the largest section, comprising 431 exhibitors. Commercial Security was the next largest with 375 exhibitors, followed by Safety & Health (142 exhibitors), Information Security (120 exhibitors), Homeland Security & Policing (90 exhibitors), and Physical & Perimeter Security (54 exhibitors). Andreas Rex, Intersec’s Show Director said, “We put in a lot of efforts into making this edition of Intersec the most comprehensive yet in terms of increasing the diversity of our exhibitor range and offering a more engaging conference format, while at the same time

returning with improved popular highlights such as the outdoor live demonstration area. “A lot of exhibitors used Intersec 2019 to not only announce important strategic business partnerships, but to launch their latest products for the global marketplace. The visitor response has certainly been the most pleasing aspect of the show this year and with the Dubai Expo 2020 coming up, we expect the 22nd edition of Intersec in 2020 to be even more successful.” Intersec is supported by the Dubai Police, Dubai Police Academy, Dubai Civil Defence, the Security Industry Regulatory Agency (SIRA), and the Dubai Municipality. A further 35 international government partners, trade associations, and non-profit institutions also participated this year. Dubai Police was among the hundreds of exhibitors launching their latest solutions, and this year unveiled a hydrogen-powered drone which will be used to survey mountainous and marine areas. Nearly two-thirds of the world’s top 50 security manufacturers were also on-board, including 17 of the top 20 incumbents comprising Hikvision, Dahua, ASSA ABLOY, Bosch Security Systems, Axis Communications, FLIR Systems, Hanwha Techwin, Tiandy Technologies, Avigilon, Infinova, Optex, VIVOTEK, CP Plus, Nedap, Raysharp, Milestone Systems, and Kedacom. Dubai-based Bristol, a global leader in fire protection services and equipment, unveiled the latest innovative firefighting SecurityLink India ■ February 2019

technologies, including a UAE-built fire truck, fire suppression systems and powerful water pump solutions. Meanwhile, smarter and safer cities were key themes that resonated throughout Intersec 2019. This was underlined by a Memorandum of Understanding signed at the show between Smartworld, a UAE systems integrator, and Honeywell Building Solutions – the global leader in connected buildings – to implement digitally transformed, sustainable, safe and efficient buildings across the UAE. The resounding visitor response to Intersec 2019 comes as demand for security, safety, and fire protection in the Middle East continues to climb. According to analysts 6Wresearch, the regional market for physical and perimeter security, commercial and information security, fire protection, and drones, is currently estimated to be worth US$14.5 billion, with this estimated to grow to be worth US$31 billion in 2024. Attracting the most attention on the show floor were AI-based security and surveillance systems with applications across safe city and smart home security systems. High-definition IP network cameras and analytics software used across various industries ranging from banking and retail to hospitality and oil & gas were also among those drawing greatest interest. Intersec is held under the patronage of His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum. The 22nd edition returns in 2020. 71


INTERNATIONAL UPDATES

2019

20-22 JANUARY 2019 • DUBAI INTERNATIONAL CONVENTION AND EXHIBITION CENTRE

Launches Cost Effective Camera Range Combining Performance and Failover Technology Budget-beating cameras with high-spec features

I

DIS has launched a landmark range of inexpensive, high-performance 2MP cameras for applications that demand zero-compromise surveillance quality within a tighter budget. The new value range includes both full HD dome and bullet cameras, and still comes with many of the high-end features found in IDIS’s best selling products including analytics, superior night time image capture, protection against image data loss, as well as dual codec combined with IDIS Intelligent Codec to deliver significant bandwidth and storage savings.

Premium features built into the new range include IDIS Smart Failover as well as video motion detection, active tampering alarm and trip zone analytics which are not normally found at this price point. The cameras deliver superior picture quality even at night with IR image capture and true wide dynamic range (WDR) in varied lighting conditions. Users also benefit from significant savings in storage with IDIS Intelligent Codec dual H.264/ H.265 technology, 72

delivering up to 90% reduction in bandwidth demand without any need to upgrade existing monitors and hardware. For integrators, the cameras have been developed with ease-of-installation as a priority. The 3-axis mechanical design ensures more flexibility in mounting, and faster system set-up is achieved using DirectIP NVRs and PoE. IDIS informed that the new range is targeted at small-to-medium surveillance challenges including security and health and safety, in commercial applications such as retail, offices and residential blocks. In these applications, protection against image loss and gaps in recording are important so the cameras also feature IDIS Smart Failover technology. This guarantees continued data capture during a wide range of potential fault conditions such as network instability, failover or recorder failture, ensuring that recordings are automatically updated without any gaps once the fault is resolved. “Until now customers have often used Failover technology on the most critical cameras, because of the requirement for additional kit and the associated extra cost,” said Harry Kwon, General Manager of IDIS Middle East and Africa, “However, with this new range they can extend Failover protection system-wide, with high quality video capture now an affordable option across all cameras.” “Even with their value pricing they provide crystal clear images for live viewing, excellent recording performance and with all the advantages of high-end features as well as analytics,” added Harry.

SecurityLink India ■ February 2019


2019

INTERNATIONAL UPDATES

20-22 JANUARY 2019 • DUBAI INTERNATIONAL CONVENTION AND EXHIBITION CENTRE

The NEW HD Ultra Camera Range Superior functionality, performance and innovation

W

ith 25 years of experience of developing innovative and complete end-to-end security surveillance solutions, IndigoVision has introduced new HD Ultra camera range with superior functionality, performance and innovation. The new HD Ultra camera range was on display at Intersec 2019 in Dubai, giving attendees the first look at the product range. Claiming the title of the most advanced camera release to date, this exciting new HD Ultra camera range knows exactly what it is talking about when it comes to security. It is available in three stylish form factors – the HD Minidome, HD Bullet and an HD PTZ Pendant – all with built-in SMART. core™ technology, CyberVigilant® in Camera, and with Advanced Analytics. These cameras are designed to offer superior functionality, performance and innovation.

Built-in SMART.core™ technology

E

mbedded into the heart of the cameras, IndigoVision’s SMART.core™ technology includes better audio and low light performance, optimized H.264 compression, activity controlled framerate plus (ACF+), and it ensures lower bandwidth and storage requirements, saving money in the long term.

tive cyber-security technology CyberVigilant® in Camera being on board. With an extra layer of defence through an enhanced firewall, customers receive notifications direct to their Control Center user interface in the event that a cyber-attack takes place.

Experience intelligent and advanced analytics

A

dvanced analytics such as motion detection, tamper, tripwire, intrusion, scene change and missing or abandoned object are also built-in the camera range, helping it enhance customers’ security. In addition to these incredible features the new HD Ultra cameras are also compatible with the latest version of IndigoVision’s security management solution, Control Center v15.4. This powerful software includes new improvements such as automatic notification of NVR license faults, new dynamic profile switching mode and VPN for Integra.® These fantastic features combined with their commitment to open standards, integration and unique distributed network architecture are what make IndigoVision an industry leader within the security sector. Installed in over 15,000 installations globally, IndigoVision products are trusted and proven across multiple markets, in some of the highest profile sites and harshest environments. All of the products are single-mindedly designed towards enhancing security, and the HD Ultra camera range is no different.

Take cyber-security to the next level with CyberVigilant® in Camera

A

s well as being smart these cameras take cyber-security seriously with IndigoVision’s unique and innova-

Showcasing Latest IPSecurityCenter PSIM

C

NL Software demonstrated the latest version of its IPSecurityCenter™ PSIM solution at Intersec 2019, as chosen by leading law enforcement, safe city and CNI organizations in the Middle East. It also demonstrated recent enhancements to its open PSIM platform, including the ac-

SecurityLink India ■ February 2019

73


INTERNATIONAL UPDATES

2019

20-22 JANUARY 2019 • DUBAI INTERNATIONAL CONVENTION AND EXHIBITION CENTRE vides a single view of all of an organization’s mission critical security systems, increasing emergency preparedness, delivering intelligence to the point of need and providing process guidance to enhance security responses. Layouts, sequences and process guidance can be created in Arabic and operators are able to work using Arabic to view alarms, search for cameras and locations as well as display maps, gauges, charts and address details.

celerated processing of alarms, a more intuitive interface and a greater focus on the visualization of data. CNL Software shared valuable insights into its work with governments, military, enterprises and cities. CNL discussed how security operations can leverage the latest technology developments such as artificial intelligence (AI) and machine learning (ML) to help identify and respond to incidents faster and more accurately. Additionally, it highlighted its innovation with leading drone detection and defence technologies, which can help identify, track and mitigate aerial-based threats. In recent years visualization inside the control room has become increasingly important, and CNL Software along with its technology partners has been at the forefront of the visualization of assets using 3D technologies. This coupled with IPSecurityCenter’s latest dashboard capabilities was also demonstrated at Intersec. “More than a decade ago, we set out to create a PSIM platform to transform the way organizations manage their security. Today, IPSecurityCenter is trusted by the best informed security operations in national security, ports, airports, government buildings, transportation and enterprises in the Middle East,” said Craig Menzies, General Manager – ME, “Increasingly, we are developing large scale interconnected deployments, which is where we lead the PSIM field in highly scalable solutions. Intersec is a great forum for us to share the latest on our IPSecurityCenter PSIM software, as well as best practice and trends in the industry.” CNL Software’s IPSecurityCenter PSIM solution pro74

Showcases Complete Cybersecurity Solutions

V

IVOTEK, the global leading IP surveillance provider, showcased its latest IP surveillance solutions at Intersec Dubai 2019. ●● Security-within-Security cybersecurity solutions: Recognizing the emergent threats to cybersecurity, last year VIVOTEK launched the world’s first IP surveillance cameras embedded with Trend Micro anti-intrusion software. Building on previous achievements, VIVOTEK now offers complete cybersecurity protection for cameras and network video recorders (NVR), both of which are guarded by Trend Micro IoT security. Moreover, management capability in its video management software (VMS) VAST2 has been upgraded. This new protection brings a number of benefits to users including leveling-up cybersecurity management, seamless multi-layer protection, instant alert notification, and an interactive dashboard for event reports. ●● People detection deep-learning technology: VIVOTEK aims to provide users not only security, but smart technologies that bring more added value to the observation and analysis of human behavior. To achieve this goal, it has developed a series of smart video content analysis based on people detection deep-learning technology such as crowd detection, heat map, smart motion detection, and smart search II. With people detection functionality, only activities of persons will trigger an event, significantly reducing false alarms and improving the total accuracy

SecurityLink India ■ February 2019


2019

INTERNATIONAL UPDATES

20-22 JANUARY 2019 • DUBAI INTERNATIONAL CONVENTION AND EXHIBITION CENTRE of video analysis in ever-changing environments. ●● See more in smarter ways with 180 degree solutions: VIVOTEK’s latest 180-degree panoramic cameras offer a wide range of vertical field of view and IR distances including the new H.265 four 5-megapixel IR 30 meters multi-sensor camera, MS9321-EHV; the H.265 dual 4-megapixel IR 20 meters multi-sensor camera, MS9390-HV; and the compact 3-megapixel IR 15 meters network camera, CC8371-HV. These professional day and night cameras are perfect for applications that demand wide coverage. Not only do they maximize the field of view but also reduce the total number of cameras required, helping to minimize both the cost and time spent on installation.

Broad End-to-End Solutions

P

elco™ by Schneider Electric, the trusted leader in video surveillance solutions, exhibited solutions, services and products in various segment applications at the recently held Intersec 2019. As part of this presentation, Pelco shared a glimpse into a few soon-to-be released products

and focused on how new technologies such as increased camera resolutions, cloud services, and analytics are shaping the future. Pelco also featured significant updates to its VideoXpert™ video management system (VMS) platform, the GFC Professional 4K camera, along with other new products like the award-winning Esprit Enhanced camera, with options for white and IR combination illumination. Recognizing that Pelco VMS and cameras are broadly deployed across a wide range of vertical market applications and trusted by some of the most demanding customers in the world, Pelco showcased multiple vertical market examples including hospitality/ commercial, education/ correction, oil & gas, city, traffic and airports. As technology continues to evolve, organizations face a multitude of challenges that require new solutions. Pelco shared how its products, services, and solutions are incorporating cybersecurity, higher resolution, compression, cloud, and analytics into its portfolio of VideoXpert VMS, cameras, and professional services to deliver compelling, operationally successful deployments. Pelco also detailed how its newly launched Professional Services provide a high level of support for both integrators and end users. By leveraging these services, customers and channel partners can gain access to a team of trained and certified professionals to assist with network and system design. They can also help customers with configuration, auditing, and onsite issue troubleshooting. In addition to the newly-released GFC Professional Pro 4k camera, nearly twenty other Pelco products, solutions, and services were showcased at the event. Among them are the Pelco Camera Link, ExSite Enhanced cameras (explosion-proof), Optera cameras (seamless panoramic view), Esprit Enhanced cameras (high-resolution PTZ), and the IBD cameras (corner mount). Visitors were encouraged to experience a hands-on demo of the GFC Pro 4K at Pelco’s Hospitality/ Commercial and Traffic Monitoring solution booths.

SecurityLink India ■ February 2019

75


INTERNATIONAL UPDATES

Cybersecurity Threats and Vulnerabilty Trends in APAC for 2019 2

018 has been another transformative time for security teams in APAC regions. The imposition of new regulations like Australia’s Notifiable Data Breaches scheme and the Indian government’s push to be GDPR compliant due to recent global breaches, have been influential on cybersecurity investment and strategy. Along with a rise in the number of incidents of data theft and cyberattacks in India and a workforce bogged down compliance management, 2018 has been another challenging year for cybersecurity and business leaders. But will 2019 face the same fate? Sivan Nir, Senior Analyst, Skybox Research Lab, makes her predictions for the year ahead. ●● Crypto-jacking keeps going: 2018 saw un-authorised cryptomining replace ransomware as the most popular malware, and this will not abate. Monero has been identified as the cryptocurrency which is the most associated with this activity. This type of malware can often go around undetected, and it’s a good way for hackers to stay active for the maximum amount of time and make quick money. Why would they turn to an alternative? ●● Mobile vulnerabilities keep rising: A continuing trend which emerged at the end of 2017 is the exponentially growing number of mobile vulnerabilities. This is 76

only going to continue as mobile further blurs the line between personal and business device. Furthermore, third-party applications used on smart phones are a good way for malware to enter an organisation, as well as open applications, particularly Android. ●● Cloud misconfigurations cause chaos: As more and more companies migrate to the cloud, the biggest risk will be seen in the misconfigurations of the cloud environment, showing that humans continue to be one of the weakest links in security. In addition, the incorporation of third-party software in the cloud means organisations won’t have full control over their attack surface. Cloud technology is still relatively new, with no set best practices, so it’s not as clear to IT people how to secure a cloud environment as opposed to on-premise networks. Next year, hackers will take more advantage of these weaknesses. ●● Ransomware won’t fade away: 2017 will always be remembered as the ‘year of ransomware.’ While cryptomining is overshadowing ransomware, it’s important that CISOs don’t let their guard drop on this older threat. Although illicit cryptomining is easier to undertake, ransomware has the potential to reap bigger immediate awards when precisely targeted SecurityLink India ■ February 2019

at an organisation that cannot afford to kiss their encrypted files goodbye. So, ransomware will continue to wreak havoc, using a variety of new techniques to enter the network. ●● AI arms race: AI will be increasingly used to identify and protect against attacks, but 2019 will see a surge in the number of vulnerabilities in AI and chatbots as threat actors realise the value in this activity. Hackers will begin to use AI to make more efficient and persistent malware attacks. At some level this may even culminate in an AI cyber-arms race. There will be more investment being ploughed into cyber-AI on both sides of the battlefield. Skybox arms security leaders with the broadest set of solutions for cybersecurity management. By integrating with more than 120 networking and security technologies, the Skybox™ Security Suite provides the context needed for informed and timely action, combining attack vector analytics and advanced threat intelligence to continuously analyze vulnerabilities in your environment and correlate them with exploits in the wild. This gives the insight needed to improve and automate security operations in vulnerability and threat management and firewall and security policy management in physical, virtual and cloud environments.


INTERNATIONAL UPDATES

Study Reveals Almost Half of Companies Still Can’t Detect IoT Device Breaches Use of blockchain technology to help secure IoT data, services and devices doubles in a year

A

s per Gemalto Study, only around half (48%) of businesses can detect if any of their IoT devices suffers a breach. This comes despite companies having an increased focus on IoT security: ●● Spending on protection has grown (from 11% of IoT budget in 2017 to 13% now); ●● Nearly all (90%) believing it is a big consideration for customers; and ●● Almost three times as many now see IoT security as an ethical responsibility (14%), compared to a year ago (4%). With the number of connected devices set to top 20 billion by 2023, businesses must act quickly to ensure their IoT breach detection is as effective as possible. Surveying 950 IT and business decision makers globally, Gemalto found that companies are calling on governments to intervene, with 79% asking for more robust guidelines on IoT security, and 59% seeking clarification on who is responsible for protecting IoT. Despite the fact that many governments have already enacted or announced the introduction of regulations specific to IoT security, most (95%) businesses believe there should be uniform regulations in place, a finding that is echoed by consumers 95% expect IoT devices to be governed by security regulations. “Given the increase in the number

of IoT-enabled devices, it’s extremely worrying to see that businesses still can’t detect if they have been breached,” said Jason Hart, CTO, Data Protection at Gemalto, “With no consistent regulation guiding the industry, it’s no surprise the threats, and in turn, vulnerability of businesses – are increasing. This will only continue unless governments step in now to help industry avoid losing control.”

Security remains a big challenge

W

ith such a big task in hand, businesses are calling for governmental intervention because of the challenges they see in securing connected devices and IoT services. This is particularly mentioned for data privacy (38%) and the collection of large amounts of data (34%). Protecting an increasing amount of data is proving an issue, with only three in five (59%) of those using IoT and spending on IoT security, admitting they encrypt all of their data. Consumers are clearly not impressed with the efforts of the IoT industry, with 62% believing security needs to improve. When it comes to the biggest areas of concern 54% fear a lack of privacy because of connected devices, followed closely by unauthorised parties like hackers controlling devices (51%) and lack of control over personal data (50%). SecurityLink India ■ February 2019

Blockchain gains pace as an IoT security tool

W

hile the industry awaits regulation, it is seeking ways to address the issues itself. With blockchain emerging as a potential technology, adoption of blockchain has doubled from 9% to 19% in the last 12 months. What’s more, a quarter (23%) of respondents believe that blockchain technology would be an ideal solution to use for securing IoT devices, with 91% of organisations that don’t currently use the technology are likely to consider it in the future. As blockchain technology finds its place in securing IoT devices, businesses continue to employ other methods to protect themselves against cybercriminals. The majority (71%) encrypt their data, while password protection (66%) and two factor authentication (38%) remain prominent. Hart continues, “Businesses are clearly feeling the pressure of protecting the growing amount of data they collect and store. But while it’s positive they are attempting to address that by investing in more security such as blockchain, they need direct guidance to ensure they’re not leaving themselves exposed. In order to get this, businesses need to be putting more pressure on the government to act, as it is them that will be hit if they suffer a breach.” 77


INTERNATIONAL UPDATES

Suprema to License BioSign Under-Display Fingerprint Algorithm to Qualcomm Technologies, Inc. S uprema has entered into a commercial software license and distribution agreement with Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, for the licensing of Suprema’s BioSign, its under-display fingerprint recognition algorithm. Suprema has entered the smartphone segment with the Samsung Galaxy J5 in its fingerprint solution for smartphones last year. In February 2018, the company launched BioSign 3.0 at Mobile World Congress (MWC), and has actively pursued the development of integrated solutions with several fingerprint sensor companies. The previous version, BioSign 2.0, is a fingerprint recognition algorithm technology specialized in ultra-small touch type fingerprint sensor. It provides excellent authentication performance and speed for 4x3.2mm fingerprint sensor, which is essential for applying fingerprint recognition function in mid-range smartphones. Lately, under-display fingerprint recognition technology, which integrates fingerprint sensors under the display, has been actively developed and introduced with the trend that full-screen display is rapidly applied to smartphones. This year, premium and mid-range smartphones from major brands are expected to be loaded with under-display sensors. There are ultrasonic and optical sensors for under-display type fingerprint sensors. In December, Qualcomm Technologies 78

launched the Qualcomm® 3D Sonic Sensor, a high performance ultrasonic fingerprint sensor. Qualcomm 3D Sonic Sensor is designed to provide superior performance and security over other fingerprint sensor technologies such as optical and capacitive sensors. The ultrasonic sensor is also ultra-thin and optically isolated from the display allowing for sleek industrial designs and virtually no impact to display aging. In the case of the under-display type fingerprint recognition technology, a new recognition algorithm should be optimized for the sensor due to the complicated sensing structure and image characteristics different from the conventional touch type fingerprint sensors. This requires the technical barrier of the algorithm to be very high. Suprema’s BioSign 3.0 is optimized for the characteristics of the image obtained from the under-display fingerprint sensor, providing a high level of recognition performance and speed. BioSign 3.0 has been developed based on Suprema’s 20 years expertise in fingerprint image processing technologies. “We are proud to be working with Qualcomm Technologies, a leader in under-display fingerprint sensor technology. This well reflects Suprema’s strong industry presence as well as how BioSign is one of the preferred solutions among the global smartphone industry. This will be a major step forward in securing leadership in the smartphone segment by expanding cooperation with customers in the future,” said Brian Song, CEO at Suprema, “We will further enhance our mobile development solution capabilities to provide our customers and users with the best possible satisfaction, and we will aggressively develop next-generation core technologies such as large-area fingerprint sensor algorithms and 3D face recognition solutions.”

SecurityLink India ■ February 2019


INTERNATIONAL UPDATES

Interlogix Offers More Choices for Growing Smart Home Segment

W

ith more than 50 percent of U.S. households projected to use smart home technology by 2023, Interlogix, a global provider of security and life safety solutions, is ready with an array of security platforms that support smart devices and links to top interactive service providers. Interlogix is a part of Carrier, a leading global provider of innovative HVAC, refrigeration, fire, security and building automation technologies. “We’re uniquely positioned to meet the demands of the smart home segment that’s expected to nearly double over five years,” said Michael Chiavacci, General Manager, Interlogix, North America, “Our flexible, integrated hardware platforms offer a variety of connected, smart devices that seamlessly integrate to proven service providers like Alarm.com.” Interlogix has reinvested in its UL-listed, professional-grade, security panel lineup and added two touchscreen controls. In addition, it is providing access to more device integrations such as sensors, lights, locks, thermostats and garage door controls, video doorbell cameras and voice-controlled digital devices, among others. All of these systems can be managed or monitored via a single smart home app. For example, new devices such as the Interlogix Command Button, enhance lifestyle convenience by wirelessly triggering up to three different, simultaneous automations within the home. “Our range of platform and service solutions make Interlogix a smart choice,” said Chiavacci, “Homeowners can design a smart home system to meet their needs today, with the peace-of-mind that they can easily expand functionality if their needs grow and change.” Interlogix solutions are professionally installed and configured through a nationwide network of leading security and smart home dealers to ensure each home has a customized solution that fits each homeowner’s needs. Interlogix provides leading security and life-safety solutions for both residential and commercial applications covering intrusion, video, transmission and access. Offering some of the most-trusted product names in the industry, and backed by ongoing partner services and support, Interlogix helps customers secure and protect what matters the most.

Acquires KEYper Systems in the US

A

SSA ABLOY has signed an agreement to acquire KEYper Systems, a leading supplier of electronic and mechanical key management systems in the US with a strong presence in the automotive segment. “I am very pleased to welcome KEYper Systems into the ASSA ABLOY Group. The acquisition of KEYper Systems enhances our global product offering in this area and will provide synergy opportunities in North America and other markets,” says Nico Delvaux, President and CEO of ASSA ABLOY. “KEYper Systems will complement our products within intelligent key and asset management solutions offered by Traka, which is part of the business unit ASSA ABLOY Global Solutions (previously Hospitality) as of 1 January 2019. The acquisition will also strengthen our position and installed base in the US as well as provide an attractive opportunity to accelerate our global growth,” said Christophe Sut, Executive Vice President and Head of Global Technologies business unit ASSA ABLOY Global Solutions. KEYper Systems was established in 1993 and has approximately 25 employees. The head office is located in Harrisburg, North Carolina. Sales for 2019 are expected to reach about USD 22 million (approx. SEK 195 million) with a good EBIT margin and the acquisition will be accretive to EPS from start. The acquisition is conditional upon satisfaction of customary closing conditions and is expected to close during the first quarter of 2019. SecurityLink India ■ February 2019

79


INTERNATIONAL UPDATES

& To Invest €150M in French Nano 2022 Program Part of EU Initiative on Microelectronics

Five-year investment to develop next-generation infrared detectors aims to strengthen Europe’s microelectronics ecosystem and ensure industry growth

S

ofradir and its subsidiary ULIS have announced their participation in the Nano 2022 initiative, which sees the Group invest €150M ($171M) over the period 2018-2022. This announcement follows the European Commission’s approval on December 18, 2018 of the ‘Important Project of Common European Interest’ (IPCEI), a joint project by France, Germany, Italy and the UK to give €1.75 billion (approx. $2bn) in public support for research and innovation in microelectronics. Nano 2022 is France’s initiative within the cross-border program that will support developments in nanotechnology, a market sector of strategic importance for the future, which includes applications such as smart sensors. The Auvergne-Rhone-Alpes region, where Sofradir and ULIS have operations, announced it will contribute €35M ($40M) to support Nano 2022. Sofradir and ULIS, whose infrared technologies are used in a range of applications from space observation and environmental monitoring to security surveillance and predictive maintenance, will invest €150M ($171M) in the Nano 2022 initiative in order to develop next-generation infrared detectors. “Infrared technologies can offer the necessary solutions for improving assisted living, mobility, energy efficiency, security and environmental monitoring, 80

which are all crucial societal needs,” said Jean-François Delepau, Chairman and CEO of Sofradir and ULIS, “As a result of our investment, equipment manufacturers will benefit from the ease-ofuse and performance these new products will offer.” Nano 2022 will enable ULIS to develop the next generations of infrared detectors to address trends in autonomous systems for smart buildings (workspace management, energy savings), road safety and in-cabin comfort of vehicles. It also enables Sofradir to develop the very large dimension infrared detectors needed for space and astronomy observations as well as compact and light sensors that can be used in portable devices and on drones. Nano 2022 contributes to the funding of the pilot lines required for developing these technologies and products. Sofradir and ULIS participate in Nano 2022 alongside other companies based in the Auvergne-Rhone-Alpes region, including STMicroelectronics and Soitec. SecurityLink India ■ February 2019

The IPCEI framework develops key cross-border R&D and infrastructure projects aimed at encouraging member states to channel their public spending into large projects. These make a clear contribution to economic growth, job creation and the competitiveness of Europe. The European Commission (DGComp) evaluates the funding conditions, ensuring they are in line with EU state aid rules. Sofradir and its subsidiaries ULIS and US-based Sofradir-EC are global leaders in designing and manufacturing high quality infrared technologies for aerospace, defense and commercial markets. Their vast portfolio of infrared detectors covers the entire electromagnetic spectrum from near to very far. The Group’s products are at the center of multiple military programs and applications. Its IR detectors are the key component of many top brands in commercial thermal imaging equipment sold across Europe, Asia and North America.


INTERNATIONAL UPDATES

Navigating the 2019 Trends in Intrusion A Look at Vanderbilt’s Priorities F

or many organizations across the world, intrusion alarms and detection are at the center of their focus for establishing a comprehensive security plan, and the numbers support this. The European perimeter intrusion detection systems market alone is set to see growth at a rate of 15.7 percent annually through 2024, due in part to the growing demand for video surveillance, remote access via the cloud and wireless technology to help enhance security systems.

uct-focused to being able to offer solutions that support customers working as a service-based company, and many businesses are moving in that direction. This encompasses the idea that today’s organizations want more long-term partnerships rather than ‘one and done’ purchases with no real value in continuing the relationship. Some might argue that security in general has typically been more service-based, but this trend is really taking off as one of the major developments in recent years.

2019 Intrusion detection Increased connectivity: trends erhaps the biggest trend across the Intrusion detection

P

security industry – and especially for intrusion – is the increased adoption of cloud-based systems as a means to achieve comprehensive and flexible protection for an organization. The benefits speak for themselves – remote alarm management, more connectivity and a greater ability for operators to streamline security operations. Vanderbilt’s SPC Connect has delivered on the promise of providing a cloud-based SaaS model that gives end users flexibility and inter-connectivity that’s a vital extension of their daily business. Vanderbilt continues to invest in cloud-based solutions across both its access control and intrusion product portfolios, following the demand it’s seeing in the market today for these kinds of products.

Shift from product-toservice focus

W

hile there is a continuing trend, there is also a big shift away from manufacturers being solely prod-

W

ithin intrusion and beyond, there’s certainly a trend toward all devices becoming smarter, interoperable and interconnected, and one can look toward the focus on the Internet of Things (IoT) as the source. Customers demand the ability for their intrusion detection system to work seamlessly with and talk to their access control, fire detection and video management systems in an effort to implement an integrated security solution. Vanderbilt has introduced a number of integrations for its SPC Connect intrusion detection system, including full inter-connectivity with the ACT Enterprise access control solution that has been very well received by customers looking to do more with their systems. SecurityLink India ■ February 2019

More communication

W

ith increased levels of connectivity comes the demand by customers to enhance communications across devices and teams. Vanderbilt is developing a new wireless portfolio that brings two-way communication to the forefront through a cloud-based system that utilizes the same interface but can be programmed either onsite or remotely. This will be a powerful tool for installers that has already begun to roll out, but will have additional functionality introduced in the coming year. It is part of a concerted effort to push as much information out as possible including more support from installers and dealers for end users, more videos that provide guidance for usage and setup, and the integration of our products through web-based training.

Vanderbilt has a huge advantage in the European market with regards to intrusion products and services, and O’Donnell said, “We have the presence and market knowledge required to deliver projects across all regions in Europe, so when customers come to us, they know we’re a trusted partner that can provide the direction and solutions they need to achieve high levels of protection.” 81


INTERNATIONAL UPDATES

Substantial Relief For Personnel Stress Dallmeier presents new police observation capabilities and techniques for automating policing procedures at the European Police Congress

I

t is impossible to imagine the police carrying out their daily duties without modern video technology. Even so, many solutions pose significant challenges for the police personnel because they cannot be operated without a substantial commitment of human resources. At the European Police Congress which will be held in Berlin on February 19 and 20, Regensburg-based company Dallmeier will demonstrate how video surveillance, observation and analysis can be conducted much more efficiently by combining innovative camera equipment and modern software. Another key topic will be solutions for partial automation of policing procedures.

3D SmartViewing for the big picture

C

ompletely new opportunities are opened up by combining the proven Panomera® technology with the new concept of ‘3D SmartViewing.’ In this combination, new ultra-high performance Panomera® 360 degree systems are combined with other Panomera® models according to the area to be covered, and enable related incidents to be captured even if they are separated by great distances. Essential tasks such as tracking objects between multiple cameras or activating the most favourably placed camera are assured semi-automatically. This makes it possible to use a minimum number of monitors to observe connected incidents that could not be captured previously. For many scenarios, this technology now 82

enables true video observation with an acceptable number of response personnel for the first time. Response teams can be relieved of still more of the burden by combining the technology with AI-based analysis systems, which may serve either to direct attention to significant events or to filter out irrelevant connections before human intervention or evaluation is necessary.

Software support for situational awareness & policing procedures

I

n order to support policing procedures, Dallmeier presents solutions for two areas. To begin with, the manufacturer offers a modular solution with which response teams can receive real-time information from a central source via their mobile devices. This information may be of static or moving images from camera systems, but it can also deliver real-time map information and much more to the deployed personnel. The solution enables response teams to be directed on the basis of SecurityLink India ■ February 2019

more accurate information and optimal coordination with control centre. Conceivable scenarios include football matches, for example, allowing personnel to identify suspicious individuals directly in front of the exit tunnel because they have received photos and other information on their mobile end devices in real time. This system can be combined with the ‘digital police file’ solution. This is an exceptionally flexible system with which all data pertinent to an incident can be collected from various sources regardless of location and assigned to a digital incident file. The data from an enormous range of sources and media formats can be collected in this ‘file’ and integrated electronically in subsequent investigation steps. The system can be configured flexibly and adapted for various procedures. Conceivable scenarios are large events, but it may also be used for traffic incidents and in many other situations where the capture and further processing of investigation data is very labour- and cost-intensive.


INTERNATIONAL UPDATES

&

Host Industry Roundtable Discussing Life Safety in HMOs H

ochiki Europe, the leading manufacturer of life safety solutions, has partnered with the FIA (Fire Industry Association) to host a roundtable discussing best practice when it comes to life safety in houses of multiple occupancy (HMOs). Panellists were made up of professionals involved throughout the life safety procurement chain including representatives from the manufacturing, facilities management, consultancy/ specification and installation sectors, as well as the FIA itself. Participants comprised Ian Watts, Emergency Lighting Manager, Hochiki Europe; Richard Wharram, Regional Sales Manager, Hochiki Europe; Will Lloyd, Technical Manager, FIA; David Thewlis, Director, Rosse Systems; and Neil Wright, an Independent Electrical Engineer. The event followed the release of Hochiki Europe’s most recent white paper outlining several grey areas regarding different systems being installed in HMOs. During the session, held at the FIA’s training centre in Hampton, London, panellists debated having exclusive Part 1 or Part 6 systems within HMOs, or the benefits of having mixed systems in place. The discussion also focused on perceived confusion around the definition of an ‘HMO,’ as well as specific challenges for duty holders and best practice when selecting emergency lighting in these types of buildings. Paul Adams, Marketing Manager, Hochiki Europe chaired the panel and said, “This was a necessary and worthwhile discussion which brought up some urgent issues for all parties that must be addressed if we are to protect people living in HMOs. The general consensus around the table was that education and upskilling engineers is paramount. “The life safety sector has so many different requirements for different buildings, depending on their intended purpose but it has become clear that there is a severe lack of clarity within the industry over best practice. The guidance and support is out there, we just need to show people where to get it and why it is so vitally important.”

$15 Million Contract Awarded from Energean Israel To Provide a Security Solution for Karish-Tanin Gas Fields FPSO Platform

E

lbit Systems Ltd. has been awarded a $15 million contract from Energean Israel Ltd., a subsidiary of Energean Oil and Gas plc, to supply a comprehensive solution for the floating production storage and off-loading (FPSO) platform of the offshore Karish-Tanin gas fields. The contract will be performed over an approximately two-year period, with warranty and logistic support continuing for an additional 10 years.

The technological suite to be supplied by the Company’s subsidiary, Elbit Security Systems Ltd., (ELSEC), includes a wide range of sensors, among them electro-optic systems, radars, sonars, a command and control center as well as equipping rapid interception boats with a dedicated suite of sensors. The security solution will enable to detect and identify both surface and underwater threats and will assist security teams to respond efficiently. Elad Aharonson, General Manager of Elbit Systems ISTAR Division commented, “Providing security to assets located in countries’ exclusive economic zones demands sophisticated technological and operational capabilities. Having been selected by Energean to provide the security suite for their Karish-Tanin gas fields’ FPSO platform, is a testament to our competitive advantage in this area.”

SecurityLink India ■ February 2019

83


INTERNATIONAL UPDATES

SERVES AS A FOUNDING PARTNER OF WORLD ECONOMIC FORUM’S CENTRE FOR CYBERSECURITY

F

ortinet has been named as the first cybersecurity founding partner of the World Economic Forum (WEF) Centre for Cybersecurity, and CEO Ken Xie will serve as a member of the Centre for Cybersecurity Advisory Board.

A global response to a global threat

W

 We are proud to be the first cybersecurity company named a founding partner of the World Economic Forum Centre for Cybersecurity and look forward to collaborating with global leaders from the private and public sectors through our shared commitment to deliver a response to the growing global cybersecurity threat. The World Economic Forum’s Centre for Cybersecurity is important for global multi-stakeholder collaboration, and serving as a founding partner of the Centre is yet another step forward in our own mission to secure the largest enterprise, service provider, and government organizations in the world  – Ken Xie Founder, Chairman of the Board, & CEO, Fortinet

EF and Fortinet both believe that the global threat to our digital economy requires a global response. To respond to that threat and shape the future of cybersecurity, WEF has established the Centre for Cybersecurity, a global network of partners from business, government, international organizations, academia, and civil society to collaborate on cybersecurity challenges. Fortinet’s partnership with the Centre is further a reinforcement to the company’s long standing commitment to public and private sector collaboration. In conjunction with the Centre for Cybersecurity, Fortinet will continue its efforts to collaborate, innovate and develop powerful global solutions to reduce global cyberattacks, contain current and future cyberattacks, and deter cybercrime.

Chemical Terrorism: Developing a Global Security Network I

nternational experts working to counter the threat of chemical and explosive terrorism are gathering to develop a comprehensive network to improve global chemical safety and security. With increasingly sophisticated methods and technologies used to carry out devastating atrocities, this first Global Congress on Chemical Security and Emerging Threats convenes a new community working to counter chemical and explosive terrorism by non-state actors and their access to chemical warfare agents, toxic industrial chemicals, explosive precursors and other emerging chemical materials. The three day (29-31 October) conference is hosted at INTERPOL’s General Secretariat headquarters and will explore specialized case studies highlighting emerging trends, identify lessons learned and best practices relating to chemical incident attribution and response, and evolving technologies and tactics. It is organized by INTERPOL, the US Department of Homeland Security and the FBI, in coordination with the G7 Partnership Against the Spread of Weapons and Materials of Mass Destruction. “This Congress comes at a pivotal time in the international security climate. We are seeing an increase in chemical weapon usage 84

SecurityLink India ■ February 2019


INTERNATIONAL UPDATES

by non-state actors both in and outside theatres of conflict. We are also seeing a steady increase in the diversion or legitimate procurement of chemical precursors used to deploy explosive devices which harm law enforcement, military and civilian populations worldwide,” said INTERPOL Secretary General Jürgen Stock, “Whether we are from law enforcement, the military, government or industry, we all have a role to play in preventing and responding to the persistent and emerging threats in relation to chemical security.” Experts at the Global Partnership’s Chemical Security Working Group, along with the Global Congress, have emphasized how no single country or industry is immune to terrorism, nor can either effectively deal with chemical weapons and terrorism alone. Therefore, cooperation between all related stakeholders including governments, industries, scientific institutions, and international partners using a whole-of-society approach is required. Co-chairs of the Global Partnership Chemical Security Working Group, Trevor Smith and David Wulf said in a joint statement, “Collaboration across governments, academia, the chemical industry, and multinational organizations is essential to strengthening our collective ability to prevent future uses of weapons of mass destruction and building the necessary response capabilities.” Bringing together some 200 delegates from nearly 40 countries, the Congress is part of efforts by INTERPOL’s CBRNE programme to help address the global threat landscape through multi-agency collaboration. It provides a significant opportunity to close the coordination gap between law enforcement and industry in order to improve security throughout the lifecycle of chemicals of concern and develop an over-arching chemical security culture.

Cuts the Ribbon at New Manufacturing Facility in Vietnam Hanwha Techwin has announced that its new 54,543m2 manufacturing facility at the Que Vo Industrial Park in the Bacninh Province of Vietnam is now fully operational

T

he strategic decision made in April 2017 to continue the expansion of Hanwha Techwin’s global security business by way of a $100m investment in the new Vietnam based facility, has been supported by the Vietnam government’s ‘friendly policy,’ and the securing of various logistics channels for import and export through land and neighbouring ports.

The benefits

T

he new facility offers Hanwha Techwin the opportunity to considerably increase manufacturing output and reduce costs. Logistics will also be greatly improved, ensuring that orders from the company’s distribution partners are fulfilled more efficiently and on time. “I am pleased to report that a significant percentage of Wisenet video surveillance products will be shipped from Vietnam from the beginning of January 2019,” said Bob (H.Y.) Hwang Ph.D., Managing Director of Hanwha Techwin Europe, “This is a very exciting time for Hanwha Techwin’s security business. Our new manufacturing facility and all our new colleagues who work there, will significantly contribute towards our ongoing success and our ability to be competitive in a market which continues to grow. With confidence, we continue to ‘move with trust’.” SecurityLink India ■ February 2019

85


INTERNATIONAL UPDATES

National Safety Council Statement on Rise in Accidental Workplace Deaths BLS reports highest unintentional worker fatalities since 2008

T

he National Safety Council is disheartened to see a small rise in unintentional, preventable worker fatalities – 4,414 deaths in 2017 compared to 4,398 in 2016 – according to the recently released federal data. Notably, accidental drug overdoses increased, claiming 272 lives in 2017 compared with 217 the previous year. Work-related motor vehicle crashes also rose – 1,299 fatalities from 1,252 – as well as falls to a lower level (713 deaths from 697). Motor vehicle crashes and falls are the leading causes of preventable death on the job. Drug overdose is an emerging workplace threat, and it rapidly has become the No. 1 cause of preventable death off the job. Once again, the data clearly show we are not doing enough to mitigate the risks of these everyday killers. At work, leadership should set the tone and engage all employees in safety, identifying hazards and measuring safety performance using leading indicators to ensure continuous improvement. All employers need to take a systematic approach to safety. This includes having policies and training in place to address the major causes of fatalities and injuries. The National Safety Council offers resources to help employers improve their safety performance and keep their workers safe. These include a free safe driving kit and prescription drug employer toolkit. The Campbell Institute at the Council provides helpful information in its white paper, ‘Defining EHS Excellence: Best Practices from Campbell Award Winners.’ Employers can also join the ‘Road to Zero’ coalition to help end fatalities on our roadways. Workplace injuries and fatalities should never be considered a cost of doing business. Every worker deserves a safe work environment and to return home safely at the end of each work day. 86

SecurityLink India ■ February 2019

Quantum Opens Doors to New Executive Briefing Center and Demo Lab New center enables deep levels of collaboration with customers and partners to drive innovation

Q

uantum Corp. has recently opened its new Executive Briefing Center in Englewood, Colorado. The conference center and technology lab showcase Quantum’s integrated solutions and provide a place for key customers and partners to get direct access to Quantum executives, product managers, developers, technology, and leaders from all business functions to drive new levels of collaboration and customer-led innovation. Designed to facilitate discussion and demonstration, the Executive Briefing Center houses a technology proof of concept lab and serves as a training and collaboration hub for business partners. “We designed our new Executive Briefing Center to create an inviting space for collaboration with our customers and partners, in order to better focus on the business challenges they face and understand how Quantum innovation can be harnessed to address them,” said Jamie Lerner, CEO and President of Quantum, “It provides a center for us to explore the emerging industry trends that are shaping the next generation of Quantum solutions.”

An immersive experience in innovation

T

he Executive Briefing Center pro-


INTERNATIONAL UPDATES

vides an immersive experience across the breadth of Quantum’s innovative solutions, products and services. Visitors can engage in hands-on learning in Quantum’s Tech Center, which was developed to provide interactive demonstrations of the latest innovations in storage. Demonstrations are available for offerings spanning file, block, object, and tape storage for high performance video and image workflows, as well as leading solutions for enterprise backup and other technologies from Quantum’s portfolio.

Highlighting the latest developments

T

he Executive Briefing Center opening is one of several recent initiatives rolled out by Quantum. Earlier this year Quantum announced enhancements to the Xcellis® high performance storage portfolio, including StorNext® 6.2 which bolsters performance for 4K and 8K content while enhancing integration with cloud-based workflows and global collaborative environments. More recently Quantum announced a new ruggedized, in-vehicle storage solution designed specifically for mobile and remote capture of video and other IoT sensor data. These and other technologies are available for demonstration at the Executive Briefing Center.

Ocularis VMS Seamlessly Integrates with Evolution 12 & 180 Panoramic Cameras Automatically Dewarps Images with PTZ Control to Increase Situational Awareness

O

nSSI and Oncam have partnered to seamlessly integrate the companies’ industry-leading VMS and panoramic camera solutions. The integration of Oncam’s Evolution 12 series and Evolution 180 outdoor and indoor panoramic cameras with OnSSI’s recently released Ocularis 5.6 VMS provides a highly efficient means to further improve situational awareness and reduce overall costs. “This latest integration leverages the extensive camera management and control capabilities of Ocularis with the performance and wide area surveillance capabilities of Oncam’s industry-leading panoramic imaging solutions,” said Ken LaMarca, VP of Sales & Marketing, OnSSI, “OnSSI recognized the myriad advantages of panoramic technology early on, and continues to support the implementation of these wide area imaging solutions for enhanced general surveillance applications.” Oncam’s Evolution 12 (12MP) and Evolution 180 (6MP) series fisheye cameras integrate with OnSSI’s Ocularis VMS to provide high resolution 360° and 180° views respectively. Dewarping is performed on live and recorded images using a new plug-in for Ocularis, with the ability to view a variety of pre-configured camera views with electronic PTZ control. OnSSI’s newly released Ocularis 5.6 VMS enhances overall performance and operator functionality, delivers cybersecurity enhancement through heightened system security with fortified dual authentication measures, and provides enhanced mobile and web access capabilities. These latest improvements combine to further empower users with a best-in-class VMS solution and experience powered by OnSSI Ocularis’ high performance engine. “Partnering with OnSSI makes it easy to implement Oncam’s Evolution 12 series and Evolution 180 outdoor and indoor panoramic cameras on their powerful Ocularis VMS platform, providing users with an extremely efficient and cost-effective imaging solution,” said John Haspel, Director of Technology Programs, Oncam, “In addition to increasing overall situational awareness, users can significantly reduce their total cost of operation (TCO) by deploying fewer cameras and eliminating all of the related equipment, installation and maintenance expenses related to them.” SecurityLink India ■ February 2019

87


INTERNATIONAL UPDATES

Quality is Key Infineon Ships World’s First Industrial-grade eSIM in Miniaturized Package

M

achine-to-machine communication in the Internet of Things (IoT) requires reliable data collection and uninterrupted data transmission. For taking full advantage of the ubiquitous mobile networks, Infineon Technologies AG provides the world’s first industrial grade embedded SIM (eSIM) in a miniature wafer-level chip-scale package (WLCSP). Manufacturers of industrial machines and equipment ranging from vending machines to remote sensors to asset trackers can optimize the design of their IoT devices without compromising on security and quality. Deploying eSIM brings a number of advantages for a smooth adoption of cellular connectivity into industrial environments. Device manufacturers can increase their design flexibility due to the eSIM’s small footprint, and simplify manufacturing processes as well as global distribution thanks to a single stock-keeping unit. Customers also have the possibility to change their mobile service provider at any time. For example, if the quality of the network deteriorates or in the event of a better contract from the mobile operator. However, providing robust quality on a miniature footprint that works even under harshest conditions remains a challenge for silicon providers. Infineon now leaps a step ahead in addressing this challenge. Infineon’s SLM 97 security controller in a wafer level chip scale package (WLCSP) measures only 2.5mmx2.7mm in size, supports an extended temperature range of -40 to 105° Celsius. It provides a high-end feature set fully compliant with the latest GSMA specifications for eSIM. Robust quality and high endurance for industrial eSIM applications reflect Infineon’s strong focus on high quality and the mindset working towards ‘zero defect.’

ACQUIRES

A

SSA ABLOY has recently acquired Laxer One, a leading advanced package locker solutions business in the US. “I am very pleased to welcome Luxer One into the ASSA ABLOY Group. Luxer One constitutes a strategic addition to the Group and reinforces our position in solutions for home delivery,” said Nico Delvaux, President and CEO of ASSA ABLOY. “Luxer One is the market leading company in the last mile delivery space in the US,” said Lucas Boselli, Executive Vice President of ASSA ABLOY and Head of the Americas Division, “Luxer One provides us with good synergistic opportunities in significant vertical markets such as education and corporate buildings. Also, Luxer One is a key player and a good platform to leverage in the click and collect retail trend (buying online and collecting the purchase in-store).” Luxer One was established in 2013 and has approximately 130 employees. The head office is located in Sacramento, California. Sales for 2018 are expected to reach about USD 37 million (approx. SEK 335 million) and the acquisition will be neutral to EPS from start. 88

SecurityLink India ■ February 2019


INTERNATIONAL UPDATES

REPORT

New Vulnerabilities Soar, OT Attacks on the Rise and Cryptominers Reign Supreme

S

kybox® Security has released its latest Vulnerability and Threat Trends Report which analyzes the vulnerabilities, exploits and threats in play over the previous year. The report, compiled by the team of security analysts at the Skybox® Research Lab, aims to help organizations align their security strategy with the reality of the current threat landscape.

tion safe. The challenge of answering, ‘What do I fix today?’ is only getting harder – unless you have the right information to contextualize this mountain of data. That’s what drives the work we’re doing and why we publish the report.” Other findings of the report include risks to the growing attack surface, including operational technology (OT) net-

 If you’re hanging your vulnerability management

strategy on fixing CVSS critical- or high-severity vulnerabilities, 2018 added about 9,000 vulnerabilities to that list; it’s simply no longer practical to ‘focus’ attention on this large group. Exploitability – what’s being used in the wild, what sample code is available – is a more important indicator of what should get attention first. It’s something many vulnerability management programs lack, so their resources are going in the wrong place and they’re not moving the needle on risk  – Ron Davidson Skybox CTO & Vice President of R&D What stands out first from the data is the sheer volume of new vulnerabilities published in 2018. The National Vulnerability Database (NVD) assigned 16,412 new CVEs, a 12 percent increase over the previous year. That may seem like a small climb, but the 2017 figure was already an all-time high, and Skybox Director of Threat Intelligence Marina Kidron believes these record-breaking figures are the new normal. “It would come as no surprise if 2019 breaks the CVE record again,” said Kidron, “While more resources in vulnerability research is what’s driving these high numbers, that’s cold comfort to CISOs trying to keep their organiza-

works. Attacks on OT continue to climb with a 10 percent increase between 2017 and 2018. While these attacks range in motive and impact, the WannaCry outbreak in Taiwan Semiconductor Manufacturing Company was a prime example of how a cybercriminal tool like ransomware, nation-state threats and internal exposure can create the perfect storm to wreak havoc on a network, as well as a company’s bottom line. The report also warns of a false sense of security in cloud networks. While the security of clouds is relatively strong, mis-configuration issues within them can still abound and security issues can arise within the applications used to SecurityLink India ■ February 2019

manage such networks. A number of examples can be given of attacks on cloud networks, but a notable one from 2018 targeted Tesla’s Amazon Web Services network. While attackers could have accessed a variety of information, they instead used the opportunity to launch a malicious cryptominer, pointing to a larger trend in the threat landscape of stealing computational power rather than data. In 2017, ransomware reigned supreme accounting for 28 percent of malware attacks, while cryptominers only made up 9 percent. Those figures essentially flipped in 2018, with ransomware dropping to 13 percent of malware attacks and cryptominers soaring to 27 percent. “While cryptomining may seem like a relatively innocuous, low-priority threat, it’s important to remember that these attacks slow down system processes and may overwhelm system capacity,” said Skybox Senior Security Analyst Sivan Nir, “More than that, it’s impossible to predict what the attacker’s end goal may be. The cryptominer may be only part of a larger attack structure. By letting them set up home in your network, you’re inviting them to try to gain access to other parts of your environment.” Whether protecting against cryptominers, threats to the OT network or simply trying to keep up with what vulnerability to fix next, incorporating threat intelligence in vulnerability management programs will give organizations the edge they need to counter a dynamic threat landscape. 89


PRODUCT SHOWCASE

New Portable Beam Barricade M30 Certified DSC1500 Provides 16 Foot (4.8 m) Road Clearance

D

elta Scientific, the leading manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has recently announced its new DSC1500 portable beam barricade that sets up quickly and temporarily to block vehicles. The new portable barricade secures locations during short-term events and anywhere a beam barricade is needed for interim security. With a clear opening of 16 feet (4.8 m), the DSC1500 is M30 certified, able to stop a 15,000 pound (66.7 kN) vehicle going 30 mph (48 kph).

time comes to deploy the beam barrier at another location. “From a purchasing standpoint, it can be easier to buy portable beam barricades than permanent solutions,” added Hamm, “The latter are often placed into an organization’s real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for law enforcement or public safety departments. However, purchasing portable beam barricades is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department.” For one time uses, a lease plan has been created where organizations can simply lease the portable barriers, use them, pack them up and return them. Delta always keeps an inventory for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. That’s because, in many cases, they are needed for events that come up quickly such as emergency road or bridge construction or unexpected parking lot requirements.

ULISSE EVO The Next Stage of PTZ Camera Evolution

“Many organizations have the need for easy to install, temporary drop-arm barriers that can install within 10 minutes to transitorily close down a roadway to one or two lanes or block parking lot exits to deter thefts,” emphasized Greg Hamm, Vice President, Marketing, Delta Scientific, “Previous beam barriers had to be filled with sand, gravel or cement to be operable. To remove the DSC1500 from its temporary site, it is simply repacked in ten (10) minutes.” The DSC1500 tows into position to control vehicle access within ten minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves using manual hydraulics to raise and lower the barriers off their wheels. A self-deploying trailer with integrated lifting device facilitates rapid installation. The process is simply reversed when the event is over or the 90

V

ideotec announces the ULISSE EVO camera, another technologically innovative step forward in their pursuit of increasingly high-performance and reliable video surveillance products. This new versatile PTZ camera offers performance, competitiveness and design at an unprecedented level. The result of meticulous and dedicated planning, ULISSE EVO is a combination of technology and design that guarantees the highest levels of security for monitoring urban areas, critical infrastructures, transport, traffic and railways (in accordance with the railway standards). The super low-light, full HD, 1080p, 60fps IP camera with 30x optical zoom and integrated Delux technology offers unbeatable clear and detailed images with vivid colours, day or night. The camera’s motion detection function, with privacy masking feature, allows intelligent management of

SecurityLink India ■ February 2019


PRODUCT SHOWCASE

areas and immediate raising of alarms if an unwanted intrusion is detected. ULISSE EVO can operate with maximum efficiency constantly, even in the presence of hostile environmental conditions and temperatures from -40°C to +65°C. The IK10 and IP66/ IP67/ IP68 protection ratings guarantee maximum resistance to dust and severe weather, hard impacts and vandalism. The camera is also equipped with a wiper to ensure a clear view in any environmental conditions. An LED illuminator is available to give visibility even in total darkness. This comes as a separate accessory, with 850nm, 940nm or white light, and can be integrated directly into the unit. The camera will automatically recognise the type of illuminator installed and calibrate the light beam accordingly. ULISSE EVO stands out due to its modern, linear design that combines maximum strength and operational reliability with greatly reduced weight. This means easy and quick assembly, and therefore lower installation and maintenance costs. ULISSE EVO can be installed in different ways, even in the inverted position typical of the speed domes, using the large variety of brackets and adaptors available to satisfy every installation need. The brackets are also available with quick connectors for Ethernet/ PoE, for power and I/O, which allow fast and easy installation operations. ULISSE EVO is available in two standard colours black or grey-white to suit specific application requirements.

the Integra digital system also integrates mechanical locking systems and maps them in the same software. Modular in design, the access solution can be expanded indefinitely – from a stand-alone to an offline and online solution. There is a basis for all access solutions – the k-entry® software.

KESO Integra cylinder: flexible and secure

T

he Integra cylinder combines digital access control with the field of mechanics. Equipped with the latest RFID technology and AES 128-bit encryption, it offers high security and high flexibility. It can be operated intuitively, as well as by means of the familiar mechanical cylinder. The corresponding keys are used for mechanical and mechatronic cylinders. The Integra cylinder is the preferred choice in all general areas in which permissions on doors are constantly adapted and high security is required. It is also ideally suited for outdoor areas e.g., wherever higher security and time restrictions for access authorisations are required.

A software and a key that can do everything

L

Access Control Management with KESO Integra The Access Solution for a Wide Range of Requirements is Called Integra

I

ntegra is the perfect access control system for new builds, which are to be equipped exclusively with high-tech master key systems. In contrast to purely electronic access control systems,

ike the management software, the Integra key belonging to the cylinder is equipped with functions that enable coordination between all door components in the KESO access system of the building. This is true, whether it is a purely mechanical cylinder or an Integra reader, every KESO Integra key fits – it just has to be assigned the relevant access authorisation. Two separate technologies are often used on the key for mechatronic access solutions – one for the access reader and the other for cylinder actuation. This means that management involves a lot of work. The patent-protected KESO Integra key is only based on one technology – Dual Interface, which combines both functions. The new KESO Integra cylinder is also suitable for me-

SecurityLink India ■ February 2019

91


PRODUCT SHOWCASE

tallic environments. This offers the major advantage that the KESO mechatronic cylinder works behind an armoured cover and can therefore also be used in doors with high resistance classes. The cylinder is designed for both the LEGIC advant and the MIFARE DESFire technology, so the user is free to choose.

CEMS AC2000 Release Helps Mitigate Health and Safety Risks

J

plication allows system users to quickly find emergency responders (fire marshalls, first aiders and/ or first responders) via CEM Systems emerald terminals. Functionality at the edge has been improved with enhancements to the local access remote application on the CEM Systems emerald terminal. This allows ‘extra access’ to be added, amended and removed via the app on the CEM Systems emerald terminal, and provides potential cost savings for remote sites where a workstation client may not be feasible. Support has been added for the MorphoWave™ Compact frictionless biometric access reader, SimonsVoss SmartIntego wireless locking solutions and STid Architect® range of RFID readers. This builds on the range of biometric, wireless lock solutions and RFID reader options that available to CEM Systems AC2000 system users.

ohnson Controls has released CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience, and help mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added.

PTZ Dome Cameras New Line-up

V Emergency responder remote application on CEM Systems emerald terminal

The health and safety (H&S) induction check application for CEM Systems emerald intelligent access terminals allows cardholders to self-certify with a card swipe on the emerald terminal once they have completed H&S induction training and before they are provided access to a site. The application automatically records induction completed date on the CEM Systems AC2000 system, helping mitigate the risk of health and safety incidents and report on who has and hasn’t completed training. Another H&S feature now available with AC2000 v10.1 is the emergency responder remote application which helps improve emergency response times during incidents. This ap92

icon camera portfolio has expanded to include a new line of PTZ camera models in keeping up with the latest camera technology advances. The new HD analog and IP PTZ dome camera line offers the latest features to meet today’s demanding applications. The introduced four new cameras offer enhanced features. The new V672-PTZ hybrid HD analog PTZ dome camera is the latest addition to their growing line of HDover-Coax surveillance solutions that feature high-resolution images using existing analog coaxial infrastructure. The new SN240D PTZ speed dome is an economical but powerful

SecurityLink India ■ February 2019


PRODUCT SHOWCASE

PTZ camera that is ideal for outdoor and indoor areas that require long range capabilities. The SN683D-WIR rugged PTZ network dome is designed for more challenging applications, monitoring large areas where demanding light conditions exist. The powerful 36x optical zoom captures highly detailed video from a distance. The new SN693V Cruiser is a compact yet powerful PTZ that provides 23x optical zoom. “We designed this series of PTZ cameras to provide our customers with versatile surveillance solution options. These cameras offer the ability to see greater detail with fewer cameras, which is more efficient and reduces the cost so customers can quickly realize real RoI,” stated Bret McGowan, Senior Vice President of Sales & Marketing at Vicon.

STM32L5 Ultra-Low-Power Microcontrollers for a More Secured IoT

S

TMicroelectronics, is bringing sophisticated cyber-protection to power-conscious connected devices with the new STM32L5 microcontroller (MCU) series featuring the Arm® Cortex®-M33 core. Building on the Cortex-M33, which boosts protection for small devices by integrating Arm’s TrustZone® hardware-based security, ST’s STM32L5-series MCUs add further enhancements including flexible software isolation, secure boot, key storage, and hardware cryptographic accelerators. They also provide rich functionality, high performance, and long run-times powered by coin cells or energy harvesting. Consuming as little as 33nA in shutdown mode and achieving 402 ULPMark-CP in the EEMBC ULPBench, the new MCU series builds on the Company’s expertise in low-power techniques such as adaptive voltage scaling, real-time accel-

eration, power gating, and multiple reduced-power operating modes proven in previous STM32L series. “The STM32L5 series with trust zone and additional custom protection features considerably strengthens and hardens cyber-protection for small IoT devices,” said Ricardo De Sa Earp, Microcontroller Division General Manager, STMicroelectronics, “Also featuring our unique energy-saving technologies, rich connectivity, and smart digital and analog peripherals, these devices will be the first choice to host cutting-edge connected applications.” With extensive integrated digital and analog peripherals, and consumer and industrial interfaces such as CAN FD, USB Type-C™, and USB power delivery, STM32L5 MCUs provide an ideal platform for products such as industrial sensors or controls, home-automation devices, smart meters, fitness trackers, smart watches, medical pumps or meters, and many others. STM32L5-series microcontrollers are sampling now and scheduled to begin production in Q2 2019. “IoT devices are increasing in intelligence and functionality, and security needs to be built in from the ground up,” said John Ronco, Vice President and General Manager, Embedded & Automotive Line of Business, Arm, “Arm’s platform security architecture (PSA), a common framework for security implementation, aims to put security at the heart of IoT. The STM32L5 series makes it easier for developers to build trusted devices on the PSA framework with the Cortex-M33 processor, TrustZone technology and enhanced SoC security features.”

Motorola CommandCentral Software Now Powered with Avigilon Advanced Video Analytics Combination adds new level of video and data intelligence for first responders

I

n August 2018, Motorola Solutions announced the first major step in integrating Avigilon Control Center™ (ACC) video management software into CommandCentral Aware for command center operations. The company has recent-

SecurityLink India ■ February 2019

93


PRODUCT SHOWCASE

curity surveillance solutions including video analytics, network video management software and hardware, surveillance cameras, and access control solutions.

CommandCentral Aware and Avigilon video analytics combination adds new level of video and data intelligence for first responders

ly enhanced the integration to include Avigilon’s patented self-learning video analytics. Command center analysts now have one integrated source for the actionable information they need to help first responders on the front line. In addition to Avigilon video intelligence, CommandCentral Aware provides them with access to incident details, computer-aided dispatch and records intelligence, geospatial data and real-time alerts from multiple sources. “CommandCentral Aware is a powerful platform that provides analysts with a detailed operating picture of what is happening at the scene of an incident,” said Andrew Sinclair, General Manager and Corporate Vice President, Software Enterprise, Motorola Solutions, “With the addition of Avigilon video analytics technology, analysts can be automatically alerted to critical events that may need further investigation, helping to proactively keep people safe and assets protected.” Avigilon self-learning video analytics detect the movement of people and vehicles of interest and alert operators to potentially critical events that may need further investigation, helping them take decisive action. “Proactive and eventually preventative security requires advanced video analytics technology,” said James Henderson, Avigilon’s President and Chief Operating Officer, “Integrating our patented analytics into CommandCentral Aware provides analysts a unique and powerful security and critical communications solution for fast response and reduced investigation times.” CommandCentral Aware is part of Motorola Solutions’ end-to-end suite of command center software that works together to seamlessly improve operations from the time an emergency call is placed to after an incident is resolved. Motorola Solutions acquired Avigilon in March 2018. Avigilon designs, develops and manufactures advanced se94

DroneSense – FLIR Edition Drone Flight Control and Management Software Platform

F

LIR Systems, Inc. has recently announced the DroneSense – FLIR Edition, a drone flight management software platform designed for public safety applications. FLIR announced a strategic investment in DroneSense, an Austin, Texas-based unmanned aircraft system (UAS) software platform maker, in April 2018, and this is the first product under that collaboration. DroneSense – FLIR Edition is the only software platform to combine thermal and visual imaging processing with flight data planning and management capabilities across public safety organizations to help improve incident response. DroneSense – FLIR Edition streams FLIR thermal sensor data directly into the software, making it a single-source, fully-integrated software platform for drones used in incident response applications such as fires, floods missing person search and rescue, disaster damage assessment and more. It includes features such as autonomous flight control, live video streaming, both on-scene and off-site, and drone asset and compliance management capabilities. The platform is hosted on a secure government cloud server and enables real-time data interpretation for a variety of drones and use cases. The DroneSense – FLIR Edition supports the DJI Zenmuse XT2 and any DJI drone-based thermal payloads offering Thermal by FLIR® with feature functionality including visual, thermal, picture-in-picture, side-by-side imagery, and robust telemetry feature set. It may be connected via Wi-Fi or cellular networks with multiple feed streaming capabilities or used as a stand-alone, independent communications remote ad-hoc network with automatic logging and syncing of all flight data. “Drones are a vital tool in various incident response sce-

SecurityLink India ■ February 2019


PRODUCT SHOWCASE

narios, and the addition of FLIR thermal sensor data provides a powerful asset to first responders,” said Frank Pennisi, President of the Industrial Business Unit at FLIR, “The use of FLIR thermal technology on drones has earned tremendous interest by public safety organizations both due to their relatively low cost for an airborne surveillance system and rapid deployment capabilities. Now through our partnership with DroneSense, first responders can stream thermal data into DroneSense’s flight control software to transform incident response management.”

ACT Enterprise’s Rules Mapping Engine Delivers Advanced Feature Set to Customers

V

anderbilt have always had a firm belief that access control should not be difficult or time-consuming to install and use, and this is the simple thinking ACT Enterprise’s new feature set was developed around. The USP of the existing ACT system has been that it possesses all the features expected in a modern-day access control system, and is simple to install and maintain, regardless of access control experience. This matters to installers because when a system is fast to install and more straightforward to set-up and quote, it removes the complexity from access control and allows installers to get more done, more efficiently and in less time. This ultimately benefits their business and their bottom-line. The latest features of ACT Enterprise – integration with Vanderbilt’s award-winning SPC intrusion system, rules mapping engine, and a smartphone app – simply build on the back of this concept. The highest level of interest shown by customers when these new features were first demonstrated at IFSEC London back in June, was reserved for the rules mapping engine. Essentially, this feature is an easy point-and-click way of saying, “if this happens and this happens, and this doesn’t happen” then I want to do “this and this.” It is this ease-of-use and simplistic approach of the rules mapping to enable advanced configurations of triggers that

make it a stand out feature set for customers. These can be actioned on events such as system input and output change, and card swipe outcomes across the access control system as well as other elements of an integrated system such as intrusion system events. “The ACT Enterprise rules mapping engine offers the customer an intuitive method to create rules based on access control events and Boolean logic,” stated Michael Moyna, Technical Product Marketing Manager at Vanderbilt, “It does this by permitting the creation of logical relationships between system elements through a drag-and-drop interface. “For the end user,” illustrated Moyna, “The addition of rules mapping ensures that system interactions can be seamlessly introduced on a system-wide basis, thereby enabling a higher level of added value to be realized, both for security and business-based functionalities.” The ACT Enterprise rules mapping engine ensures intuitive, easy-to-use I/O management for trigger detection with compatible devices. These devices are usually attached to a door or an automated electrical that closes the circuit on the I/O unit. When this circuit is closed, an alarm is sent over the network, and ACT Enterprise captures that.

New Access Control Integration

T

he new IndigoVision TDSi EXgarde Integration allows alarms from TDSi systems to be seamlessly combined with IndigoVision’s security management solution, Control Center, giving complete video and alarm management in a single user interface. All of IndigoVision’s Integrations are designed with safety in mind and the TDSi EXgarde Integration is no different.

SecurityLink India ■ February 2019

95


PRODUCT SHOWCASE

For over 30 years TDSi have successfully supplied systems to over 100,000 installations across the world, making TDSi one of UK’s leading access control system providers. With the TDSi EXgarde Integration, the user can trigger live video, move PTZ cameras and start recordings, while also having the ability to acknowledge, action or delete any relevant EXgarde alarms and send notification e-mails automatically which dramatically decreases operator response time.

research and development team. This release introduces a range of new features and enhancements to help ensure an organization is protected from new security threats and able to take advantage of the latest technologies in an evolving security environment.

Site plan viewer

T

The TDSi EXgarde Integration can receive alarms from access control units, doors and readers. Control Center operators acknowledging or clearing alarms in Control Center will acknowledge or delete the corresponding alarms in the TDSi EXgarde system. The TDSi EXgarde Integration enables operators to respond to incidents from the familiar Control Center user interface. Commenting on the TDSi EXgarde Integration, IndigoVision’s Software Product Manager Giles Raine said, “This new integration strengthens our existing integration portfolio by adding support for one of the most reputed access control systems in the industry, underlining once again the openness of the IndigoVision platform.” IndigoVision provides the flexibility and choice to create your own customised, reliable and future-proof security management solution.

he Site Plan Viewer provides full screen, centralized site management visibility, with the benefit of increased situational awareness across both local and remote sites. Real-time display of information allows the users to quickly and accurately respond to security threats, ensuring operational continuity and site safety. An improved user experience minimizes operator error and reduces risk on site, while the intuitive interface reduces operator training/ induction time.

Features

●● Find tool provides operators with a quick and easy way to find items on a site plan. ●● Panning and zooming provides improved navigation around larger site plans. ●● Site plan information that needs to be shared with guards or technicians, or captured in reports, is easily copied, printed, or shared via email. ●● All site items added to a site plan can display an operational state and an alarm state, ensuring operators don’t miss important events. ●● Relevant priority alarm information and available actions to be taken are provided to operators to better manage alarms. ●● Manage access with provision for manual access control or perimeter system overrides outside of scheduled times.

Command Centre v8

G

allagher has recently released Command Centre v8, the latest version of their world-class site management software. Command Centre v8 is the result of years of planning and months of development by the Gallagher 96

SecurityLink India ■ February 2019


PRODUCT SHOWCASE

●● Add buttons to allow for quick, repeatable actions. ●● Site monitoring is enhanced with camera control, quick ability to see who was last through a door, and contextual reporting.

Site plan designer

T

he Site Plan Designer makes Command Centre site plans quicker to configure, easier to create and maintain, and more intuitive. The result is less training time and reduced costs.

Broadcast notifications to mobile connect

B

roadcast Notifications communicate important information quickly and accurately to groups of cardholders. This functionality is particularly useful in emergency or lockdown situations to ensure staff, students and contractors are well informed and can take appropriate action to stay safe.

Status REST API and overrides REST API

T

he Status REST API and Overrides REST API updates add to Command Centre’s integration flexibility and inter-operability with other systems by providing a set of HTTP functions to either query the status of items, or override items within Command Centre. This allows developers to integrate multiple systems with Command Centre.

Enhancements

A

wide range of enhancements to improve the functionality of existing Command Centre features are also part of the v8 release.

SCADAScan First Portable Industrial Control Network Security Assessment Solution New SCADAScan plug & scan solution gives critical infrastructure organizations instant insight into their OT networks and exposes security threats

C

yberbit Ltd., a world leading provider of cybersecurity simulation and IT/ OT detection and response platforms, has recently launched SCADAScan, one of the first portable

ICS/ SCADA network assessment systems.SCADAScan conveniently plugs into a network switch, and within minutes of passive monitoring provides a comprehensive OT network and asset mapping, vulnerability assessment and threat report, based on deep packet inspection (DPI) of OT traffic. SCADAScan is one of the first fully mobile, on-demand ICS/ SCADA network assessment solutions, that instantly provides customers with visibility into their OT infrastructure and security posture without the need for time-consuming setup and deployment efforts. The solution is used by OT intervention teams, consultancies and service providers to provide on-demand OT assessment for their customers. It is also used by critical infrastructure organizations who wish to perform periodical OT asset mapping, vulnerability assessment and threat detection without having to integrate a full-scale OT monitoring solution. “The threats on OT networks are now a reality, so we developed an ICS security assessment solution that is completely mobile, eliminates setup efforts and can be completed in hours to days,” said Cyberbit CEO Adi Dar, “We are proud to work with ISP who continues to bring the very best technology and expertise to critical infrastructure organizations.” SCADAScan is based on Cyberbit’s SCADAShield solution, a comprehensive ICS monitoring, detection, visibility, forensics and policy enforcement solution for OT networks. SCADAShield can also be integrated with Cyberbit’s SOAR (Security Orchestration, Automation and Response) solution for IT and OT networks. Cyberbit provides a consolidated detection and response platform that protects an organization’s entire attack surface across IT, OT and IoT networks. Cyberbit products have been forged in the toughest environments on the globe, and include endpoint detection and response powered by behavioral analysis, security automation, orchestration and response (SOAR), ICS/ SCADA security (OT security), and the world’s leading cyber range for simulated cyber training.

SecurityLink India ■ February 2019

97


CCTV OPERATOR

ASSISTANT SECURITY OFFICER

SECURITY OFFICER

Company: Express Infrastructure Pvt. Ltd.

Company: Golkonda Hospitality Services And Resorts Limited

Company: Dr. Balabhai Nanavati Hospital

Exp: 0-1

Exp: 5-7

Exp: 5-7

Location: Chennai

Location: Hyderabad/Secunderabad

Location: Mumbai Suburbs

Job Id: 260418008027

Job Id: 080119007704

Job Id: 070119003622

TECHNICAL OFFICER

SECURITY & VIGILANCE

CHIEF SECURITY OFFICER Company: Larsen & Toubro Limited

Exp: 5-10

Company: Busybees logistics solutions Private limited

Location: Panjim/Panaji

Exp: 3-8

Location: Chennai

Job Id: 261218004332

Location: Lucknow

Job Id: 050119002745

Company: Raxa Security Services

Exp: 20-30

Job Id: 080119001273

SECURITY OFFICER

CSO - EX SERVICE MAN

SECURITY SUPERVISOR

Company: Ablage Technologies Private Limited

Company: Sahiba Limited Exp: 5-10

Company: Maruti Online Private Limited

Exp: 2-7

Location: Surat

Exp: 1-6

Location: Thane, Mumbai

Job Id: 020119002699

Location: Ahmedabad Job Id: 291218005372

Job Id: 030119009354

SECURITY EXECUTIVE

SENIOR EXECUTIVE/EXECUTIVE SAFETY & SECURITY

AREA LOSS PREVENTION MANAGER

Company: The Retreat Hotel And Convention Centre

Company: Virtuous Retail property Services LLP

Company: Reliance Industries Ltd.

Exp: 2-3

Exp: 3-8

Location: Rudrapur

Location: : Mumbai Suburbs

Location: Bengaluru/Bangalore

Job Id: 291218002574

Job Id: 090119003610

Job Id: 070119006717

SENIOR OFFICER GUARD- SECURITY Company: Cement Company:Orient Bram Healthcare Private Exp: 3-7 Limited Location: Exp: 0-5 Jalgaon Job Id: 140716006901 Location: Delhi/NCR

SECURITY EXECUTIVE MANAGER Company: IdeaPhoenix International Company: The Mills Ltd. Exp: 5-10 Exp: 4-7 Location: Location: Bengaluru/Bangalore Lucknow Job Id: 120716006216 Job Id: 070119003787

Job Id: 090119001003

PLAN YOUR

NEXT CAREER MOVE Top Jobs. Top Companies @ Naukri.com

Exp: 5-9

EXECUTIVE - SECURITY & COMPLIANCE Company: Mahindra Logistics Limited Exp: 3-7 Location: Chennai Job Id: 281218006783


TOP TOP NAUKRI NAUKRI JOBS JOBS CHIEFCHIEF SECURITY SECURITY OFFICER OFFICER

AREAAREA FIELDFIELD MANAGER MANAGER

SECURITY CHIEFCHIEF SECURITY SR. MANAGER/MANAGER SR. MANAGER/MANAGER

Company: Company: Growth Growth Opportunity Opportunity Solutions Solutions

Company: Company: The New TheStandard New Standard Security Security ServiceService

Company: Company: OCL Iron OCLSteel IronLtd. Steel Ltd.

Exp: 5-10 Exp: 5-10

Exp: 3-8 Exp: 3-8

Location: Location: Rourkela Rourkela

Location: Location: Delhi/NCR Delhi/NCR

Location: Location: Kanpur, Kanpur, Delhi Delhi

Job Id:Job 221218004924 Id: 221218004924

Job Id:Job 030119009266 Id: 030119009266

Job Id:Job 010119002812 Id: 010119002812

SECURITY OFFICER SECURITY OFFICER Company: Company: Just Textiles Just Textiles Ltd Ltd

Exp: 15-20 Exp: 15-20

SECURITY GUARD SECURITY GUARD

SECURITY SUPERVISOR SECURITY SUPERVISOR

Exp: 5-10 Exp: 5-10

Company: Company: Precision Precision Metal Products Metal Products Company: Company: QualityQuality Solutions Solutions Pvt. Ltd. Pvt. Ltd. Exp: 3-8 Exp: 3-8

Location: Location: Mumbai Mumbai

Exp: 3-8 Exp: 3-8

Location: Location: Kolkata Kolkata

Job Id:Job 030119000291 Id: 030119000291

Location: Location: Surat Surat

Job Id:Job 191218007232 Id: 191218007232

Job Id:Job 210918004813 Id: 210918004813

SECURITY SUPERVISOR SECURITY SUPERVISOR

ASSISTANT MANAGER ASSISTANT MANAGER SECURITY SECURITY

SECURITY OFFICER SECURITY OFFICER

Company: Company: Modern Modern Vidya Niketan Vidya Niketan Company: Company: Holiday Holiday Inn Resort Inn Resort Goa GoaCompany: Company: VelloreVellore Institute Institute of of SocietySociety Technology Technology Exp: 2-7 Exp: 2-7 Exp: 5-10 Exp: 5-10 Exp: 20-22 Exp: 20-22 Location: Location: Panjim/Panaji Panjim/Panaji Location: Location: Faridabad Faridabad

Job Id:Job 010119000874 Id: 010119000874

Job Id:Job 020119003060 Id: 020119003060

CHIEFCHIEF SECURITY OFFICER SECURITY OFFICER

Location: Location: VelloreVellore Job Id:Job 171218007804 Id: 171218007804

SITE SHIFT SITE SHIFT SECURITY SECURITY LEADLEAD

ASSISTANT ASSISTANT INSTRUCTOR INSTRUCTOR

Company: Company: Ramada Ramada Plaza JHV Plaza (Unit JHV (UnitCompany: Company: Pinkerton Pinkerton Corporate Corporate Risk Risk Company: Company: Software Software Data India DataLtd. India Ltd. of MallofHotel Mall Limited) Hotel Limited) Management Management India Private India Private LimitedLimited Exp: 10-20 Exp: 10-20 Exp: 5-10 Exp: 5-10

Exp: 4-6 Exp: 4-6

Location: Location: Varanasi Varanasi

Location: Location: Bengaluru/Bangalore Bengaluru/Bangalore Location: Location: Hyderabad/Secunderabad Hyderabad/Secunderabad Job Id:Job 181218002506 Id: 181218002506

Job Id:Job 020119002691 Id: 020119002691

Job Id:Job 281218901393 Id: 281218901393

MANAGER - ASST. GM GM MANAGER - ASST. (SECURITY) (SECURITY)

PERSONAL PERSONAL SECURITY SECURITY OFFICER OFFICER (FEMALE) (FEMALE)

SECURITY OFFICER SECURITY OFFICER

Company: Company: Shree Shree Cement Cement Limited Limited Company: Company: G. D. Foods G. D. Foods MFG. (I) MFG. Pvt. (I) Pvt.Company: Company: LodhaLodha developers developers Ltd. Ltd. Ltd. Ltd. Exp: 15-25 Exp: 15-25 Exp: 4-8 Exp: 4-8 Location: Location: Gulbarga Gulbarga

Exp: 25-30 Exp: 25-30

Location: Location: Mumbai Mumbai

Job Id:Job 010119002267 Id: 010119002267

Location: Location: Neemrana Neemrana

Job Id:Job 201218002695 Id: 201218002695

Job Id:Job 251217001743 Id: 251217001743

Apply Apply for these for these Jobs Jobs 1. Login 1. Login to www.naukri.com to www.naukri.com 2. Type 2. Type the Job theID Job in ID thein‘Search the ‘Search Jobs’ Jobs’ Box Box 3. Click 3. Click the ‘Search’ the ‘Search’ button button

5,00,000 5,00,000 JOBSJOBS NAUKRI NAUKRI ON MOBILE ON MOBILE


NATIONAL ROUNDUP

Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)

“Security Link India” payable at New Delhi dated__________

* Please subscribe through admin@securitylinkindia.com

WE ARE UPDATING OUR DATABASE For free listing in Database:

For

Advertisement Contact: editor@securitylinkindia.com

* Send your detail to admin@securitylinkindia.com

Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 100

SecurityLink India ■ February 2019


(India’s Leading Monthly Magazine & e-News Portal on Security, Safety & Fire)

PRINT & DIGITAL India’s Leading & Awarded Media Platform for Security (Physical, Homeland and Cyber) & Fire Safety

The Best Reach to the Indian Market SecurityLink India (Print)

e-Newsportal: www.securitylinkindia.com

4 Total Print – 12000 plus

4 Average Monthly Traffic: 250000+

4 Total Readership: 50000 plus

4 Average Unique Visits: 30000+ 4 E-mail Blasts – 35000+

Exciting opportunity for the promotion of your products and services through advertisements and advertorials Recognized by

Find us at:https://www.facebook.com/SecurLinkIndia/

Online distribution through

https://twitter.com/SecurityLinkIND https://www.linkedin.com/in/securitylink-india-424a75145/

Reach us at: info@securitylinkindia.com; editor@securitylinkindia.com


RNI No.: DELENG/2016/68892 POSTAL No.: DL(S)-17/3502/2019-21

PUBLISHING DATE: 1 POSTING DATE: 9 & 10


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.