CMYK
2
5
SecurityLink India â– 1 April 2017
2 5
CCMMYYKK
CMYK
6
SecurityLink India â– 1 April 2017
6
CMYK
CMYK
SOLAR CAMERA 4G/ LTE/ Wi-Fi/ Hotspot Ready
For remote locations and temporary installations, where it is too complex or expensive to install a dedicated network infrastructure for a traditional surveillance installation. That’s when sparsh deployable solutions make a big difference. They are quick and easy to install, yet offer leading-edge surveillance.
FEATURES Totally self-contained wireless digital IP camera Use cellular network to send video stream to remote location 4G/3G/2G/Wi-Fi/Hotspot ready 2 way communication (optional) High-resolution up to 2MP Battery backup up to 48 hours Integral SD card storage SD Card support up to 128GB
HIGHWAY
For More Information Call:
+91 9555997755
RALLIES
DISASTER MANAGEMENT
BTS TOWER
CONSTRUCTION SITES
sales@sparshsecuritech.com
www.sparshsecuritech.com
SecurityLink India ■ 1 April 2017| Kochi | Bangalore | Chandigarh | Rourkela7| Patna Noida | Delhi | Mumbai | Kolkata | Coimbatore | Lucknow | Kanpur | Nagpur | Raipur
7
CMYK
IW2017_SecurityLink India_210x270mm_v3FA.ai
1
23/5/17
10:21 am
CMYK
C
M
Y
CM
MY
CY
CMY
K
8
SecurityLink India â– 1 April 2017
8
CMYK
CMYK
1 9
SecurityLink India â– 1 April 2017
19
CMYK
CMYK
10
SecurityLink India â– 1 April 2017
10
CMYK
CMYK
11
SecurityLink India â– 1 April 2017
11
CMYK
CMYK
From the Editorial Desk
(102 pages including 6 for cover) Volume I • Issue 12 • 1 July 2017 Editor-in-Chief Santosh Pathak Editor-at-Large Praveer Bagchi
Dear Readers, Greetings from SecurityLink India! 1 July 2017 is now a documented day in the history of India. The date opens the most anticipated and much-acclaimed GST regime in the country with a slogan ‘One India One Tax.’ This registers the second very bold, encouraging, and seemingly a very advantageous economic reform after Demonetization. Demonetization occurred all of a sudden, without any prior indication. It was a robust step to rein in black money, money laundering and terrorism. The move was highly apprehensive, and the implementation and ramifications thereof were truly nerve-racking. The queues before ATMs were scary. Oppositions did also not miss the chance in grabbing undue advantage by distorting the facts, and instead of standing with the public and motivating them, making pointless hues and cries against the move. However, eventually, the confidence of the Government triumphed and with the massive patronage of the public at large, the ruling has been successful. The advent of GST restages similar feel. Its implementation is truly strenuous and far-reaching. However, the Government appears more clear and buoyant about the ruling. They are taking a democratic approach and are open for the suggestions for enhancements and better application of the Act. Recently, the Government heeded to the call of the security industry and took cognizance of the representations submitted by various associations to revisit the initial GST rate for security products at 28%, and bring it either to the exempt or to 5% bracket. The industry pleaded that security is a basic necessity of life. Though marginally done, the rates have been revised and a majority of the security products is now in 18% GST slab. This is a partial victory for the security industry; they have yet to go a long way. Security products truly deserve to be in the Merit List. Industry associations need to get together and make a concerted representation to the government on a single platform – it is the cause for the whole industry and all will share the credit of success. This month SecurityLink India will participate in INTERPOL World 2017 at Singapore, and will bring exciting coverage in August. Until the next issue, safe and happy reading! With warm regards,
12
12
Santosh Pathak Mob: +91 9968172237
SecurityLink India ■ 1 April 2017
12
SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Circulation Pulak Halder Design Shiv Singh Rawat Portal Design & Maintenance Chaudhary Sushil Nayan Bhai Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
CMYK
CMYK
13
SecurityLink India â– 1 April 2017
13
CMYK
CMYK
july 2017
CONTENTS report
28
India Risk Survey 2017 White paper
50
LTO Technology & Video Surveillance
Feature articles Critical Infrastructure Security and Smart Cities
66
Change Approach to Vulnerability Management
69
How to Know, Access Control in The Cloud is Secure
70
National Roundup 18
• SSSDC Associates with HVSU
23
India’s Budding Cyber Policies
• Securens Forays into Warehousing
24
APC’s 5 City SME Connect
19
CP PLUS Ultra HD 4MP Analog Range
20
HIKVISION Multi-touch Interactive Screen
22
• G4S Supports the Constitution Day of Denmark Celebration
21
CAPSI Launches Rakshak Awas Yojna
22
• Axis Secures DEI, Agra
26
CyberArk Channel Partner Program
27
CP PLUS’ Launch Show in Thailand
14
• Matrix Centralized Video Surveillance
• Netmagic Partners with Nutanix
SecurityLink India India ■■ 11 April July 2017
14
CMYK
CMYK 17.- 20. Oktober 2017 Düsseldorf, Germany
Product showcase
40 41 42 43 44 45 46 47 48 49 49
Axis Zipstream • Honeywell Xtralis Vesda-E Vep • Wavestore PT-Series NVRs Dahua Thermal Cameras Uniview Motorized Eyeball Camera ArecontVision MicroDome® G2 Cameras • PPSS SlashPRO™ Clothing • Paxton with Hid Technology Milestone Next Generation Software • QNAP TS-831X & TS-531X NAS • Quantum Intelligent Data Management FARO Zone 3D Software • FLIR ONE Thermal Imaging Cameras • Valerus VMS Version 1.2 Avigilon H4 Thermal Camera Verint Workforce Optimization Solutions • Senstar Buried Perimeter Detection • Vasco Overlay Detection in DIGIPASS Gemalto SafeNet Trusted Access Schlage® NDE Wireless Locks Integration OTS L2+ Managed Ethernet Switches
INTERNATIONAL TRADE FAIR WITH CONGRESS SAFETY SECURITY HEALTH AT WORK
17 - 20 OCTOBER 2017 DÜSSELDORF, GERMANY
PEOPLE
MATTER.
CHALLENGES DO NOT DISAPPEAR, THEY JUST CHANGE. The world of work is changing. And no one knows this better than the people in the workplace facing digitalisation, new technologies, increasing flexibilisation, and massive work intensification. Get set to meet these new challenges – with the sector’s No. 1 trade fair and its 1,900 exhibitors from all over the world.
application/ Case Studies
56-65
International updates
www.AplusA-online.com
72-86
87-95
SecurityLink India ■ 1
15
Messe Duesseldorf India Pvt.Ltd. Centre Point 7th. Floor Junction of S.V. Road & Juhu Tara Road, Santacruz West Mumbai 400 054 Tel.2017 (0091 22) 6678 99 33 _ Fax (0091 22) 6678 99 11 April messeduesseldorf@md-india.com
15
CMYK
2017-04-25 A+A 2017_Indien_Allgemein_105 x 270 + 4mm_SecurityLink India_###_6221
35 36 37 38 39
CMYK
16
SecurityLink India â– 1 April 2017
16
CMYK
CMYK
SAFEGUARD AIRPORTS ALL AROUND THE WORLD
Infinova was preferred by over 100
international airports (7 in Turkey, 4 in Europe, over 30 in ME and 63 in India) to combat terrorism and increase security measures, of which 42 airports are using V2217 Video Management Software.
World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova Middle East (Kuwait): Office # 13, 5th Floor, KFH Bldg # 240, Mirqab, Kuwait Landline and Fax: +965-2247-5678, Email: Sales-ME@infinova.com 17
SecurityLink India â– 1 April 2017
17
CMYK
CMYK
National Roundup
SSSDC Associates with HVSU H
aryana Vishwakarma Skill University (HVSU) has organized a meeting with Security Sector Skill Development Council (SSSDC) at Haryana Institute of Public Administration (HIPA), Gurgaon on 5 June 2017 to explore possible avenues of cooperation between the two agencies towards imparting vocational education in the University. The meeting was held between SSSDC team comprising Kunwar Vikram Singh, Chairman, Maj Gen K Majumdar, COO, and Aaisha Thakur, Manager Enterprises, SSSDC; and Raj Nehru, Vice Chancellor and Ms. Chanchal, Asst. Deputy Director, HVSU. The Chairman delivered a brief presentation to the Vice Chancellor about SSSDC and CAPSI, and emphasized that the private security industry has a workforce of 70 Lacs, of which 14 Lacs are security supervisors. This industry has a growth rate of 25% and rate of attrition at 30%. Besides, he also informed that SSSDC has about 300 affiliated training partners all over India and have a capacity of building more as per requirement. The Chairman sought collaboration between the authorities to enable the formal skilling and education of unskilled private security personnel in an efficient way, and put forth following suggestions from his end. ● SSSDC will help develop curriculum for the Level 6, 7 & 8 security courses jointly with the University. ● They will enable providing training and certification to the security supervisors. ● SSSDC can also help the university with mobilization – making 18
the training infrastructure available through their training partners, contacting end users for on-job training, and finally for placement. ● The Chairman offered a platform of the Security Skills & Leadership Summit, scheduled on 15 October 2017 to launch the B.Voc. courses with the university in presence of an audience comprising heads of the security industry, end users, and several senior government officials. ● He also advised that on-line cum contact programs for existing security supervisors be organized jointly. The Vice Chancellor Raj Nehru appreciated the support of SSSDC and mentioned that the university is aiming at B.Voc. courses in security science where the student will earn credits as per NSQF level 6, 7 & 8, and would have
the option of exit and entry so that he is employable at every level. The University also wants to introduce graduation courses for students with on-job training, for which they want to tie up with 5-6 top security companies. He also informed that the students would be eligible to get stipend. He, however, made it clear that HVSU’s focus is in Haryana. The meeting concluded on a positive note. SSSDC will support in developing curriculum for the graduation courses for security guards. They will form a committee for the empanelment of the University Security course students with the top security employers, and a short term course will be defined for the already employed supervisor to guide them to a path of career progression.
Securens Forays into Warehousing The E-surveillance service provider having its market leadership in ATM and banking security, spreads its footprints in Warehousing and Logistics industry
S
ecurens System has expanded its services in logistics and warehousing with its specially designed solutions. With its award winning state-of-the-art central monitoring station, Securens monitors premises of the leading banks, top retail stores, and popular QSRs. Securens have now spread its reach in warehousing with it’s specially SecurityLink India ■ 1 July 2017
CMYK
designed products ACTIHEALTH, ACTICARE, & ACTIDETER. Warehouses by their very nature are located in remote areas and are ever prone to burglary and shrinkages. Man guarding is an unreliable, inefficient and expensive solution to secure premises. Securens 5th generation e-Surveillance solutions with active deterrence monitors the premises
CMYK
National Roundup
24/7 that not only improves efficiency considerably but also reduces the cost substantially. ACTIHEALTH aids in the supply, installation and commissioning of all surveillance equipment on a PAN India basis and provides comprehensive AMC along with ACTICARE service on a SaaS (Surveillance as a Service) based model. ACTICARE takes preventive measures through regular healthchecks, which ensure that your surveillance equipment works exceptionally well so that they prove to be of great
help during the time of forensic analysis of a crime. ACTIDETER is a time proven system that guarantees results. It not only detects attempted crime, but proactively prevents it from happening, by using video verification and 2-way audio. Sunil Udupa, Chairman and Managing Director of Securens Systems, said, “Warehousing plays a vital role as far as the supply chain is concerned. It acts as the backbone of the supply chain. Our aim is to provide value added 360-degree surveillance solution to our customers on a SaaS
model to help them not only efficiently detect shrinkages but also help them reduce costs in this competitive market space.” Securens has the largest network of surveillance systems spread across the country. Popularly known as the Central Alarm Monitoring Station (CAMS), the technologically advanced control room is built on highly redundant and fail-safe architecture known for preventing crime before it happen. The CAMS monitors more than 21,000 sites 24/7across India and houses over 100 monitoring personnel.
Performance like Never Before
Ultra HD 4MP Analog Range C
P PLUS has recently launched the Ultra HD Analog range of cameras and DVRs. Designed to offer high-resolution imagery for revolutionary clarity, this range marks a major shift in the capabilities of analog surveillance systems from its earlier counterparts. It includes Ultra HD 4MP cameras and DVRs that
offer distinct, detailed images even in low light conditions. Besides, these cameras are equipped with Edge analytics with features like trip wire, intrusion detection, and face detection etc., which make them responsive to any unusual occurrences within a premise. Due to hit markets late this mon-
“The
Ultra HD analog range is great for those who are looking for an IP equivalent performance in analog. It offers excellent image clarity coupled with Edge analytics for smart surveillance – a feature that has been akin to IP thus far. These cameras produce brilliant images even in low light conditions, while the edge analytics ensure no trespassing goes unnoticed.” – Yogesh B. Dutta COO – CP PLUS soon, these cameras will upgrade the existing analog systems hassle-free and cost-effectively, thereby offering the best results without major overhauls.
SecurityLink India ■ 1 July 2017
CMYK
19
CMYK
National Roundup
Multi-Touch Interactive Screen H
ikvision announces that it has launched its most sophisticated multi-touch interactive screen (MTIS) for the Indian market. The MTIS is used as an intelligent teaching tool, integrated with the latest touch technology, high definition display technology, video processing technology, computer technology, network communication technology, intelligent interactive control system and audio control system. With rich teaching resources, it can be used in kindergartens, primary and secondary school teaching class remote learning, training centers and other occasions.
Key features
● Full HD 1080p LCD display. ● Anti-glare glazing surface glass with anti-glare. ● Supports 10-touch and smooth writing. ● 32768x32768 touch difference resolution. ● Full external audio and video interface. ● Supports standard OPS plug-in computer.
● Ideal intelligent & interactive teaching tool. ● Multi-subject themes & images with multimedia resources. ● Real boon to schools, training institutions & remote learning. ● Rich front interface and function keys, easy to operate. ● Low radiation, low power consumption. ● Green environmental protection.
Multi-functionalities
T
he MTIS software can function in multimode enabling lesson preparation, desktop annotation, e-book sync teaching and is capable of switching from each mode. The rich auxiliary teaching tool supports mask, roaming, screenshots, graphics, graphics recognition, handwriting recognition, text input, video playback, perspective tools, pie chart/ histogram, a key table drawing, screen recording and video booth. It contains more than 40 themes of re-
“We are proud to launch this revolutionary and most
essential teaching tool which makes both teaching and learning less tiresome and more interesting. This comes as a real boon not only to our schools but also to training centers and remote learning. I am sure of its positive impact on the academic and training institutions in India.” – Ashish P Dhakan Managing Director & CEO, Prama Hikvision (India) Pvt. Ltd. 20
SecurityLink India ■ 1 July 2017
CMYK
sources such as Math, Physics, Biology, Music, Geography, Information technology, Sports and other images and multimedia resources. With its ‘Writing Erase Function,’ the users are free to write or annotate seven or more writing pen styles. They are free to adjust the handwriting thickness and color. Also, it supports gesture erase enabling blackboard rub to be changed with the size of the gesture area. Highly compatible, it supports directly open or insert the page and other mode to import or export Word, PPT, Excel and other format documents. It
can edit the second save, also embedded in the page with web site to browse. The software provides discipline tools such as Language, Mathematics, English, Physics and Chemistry, to realize the application of multiple tools, such as stroke simulation, triangular plate, compass, periodic table of Chinese and English, chemical experiment instrument. It can extend the TV, computer and other input signals to the teaching platform. Besides, it is screenscreen interactive and is capable of centralized management and multichannel annotation.
CMYK
National Roundup
CAPSI Launches
Rakshak Awas Yojna (RAY) P
rivate Security Sector employs over 70 lakh individuals who are the source of livelihood, support and security for over 2 crores 80 lakhs dependents. Almost all security guards belong to economically weaker section (EWS) of the society and often live in slums and destitute due to their very low wages. The security guards who are ever ready to safeguard all, are themselves constrained to live in the most insecure environment. They are deprived of even their bare fundamentals of life including the basic civic infrastructure, social amenities and decent shelters; albeit they deserve them the most. The recent upgradation of the status of the security guard from an ‘unskilled person’ to a ‘skilled worker’ has brought tremendous motivation, and pride in the profession of guarding in terms of remuneration and standing. The skill ecosystem and policy interventions by the Government have made a holistic impact on the security workforce by empowering them to break through the poverty trap successfully. Central Association of Private Security Industry (CAPSI) launches affordable housing for these security guards under ‘Rakshak Awas Yojana (RAY)’ – offering home for every security personnel under Pradhan Mantri Awas Yojana. CAPSI through its State Chapters has announced to form co-operative societies in multiple metros/ cities by availing the benefits under Pradhan Mantri Awas Yojna for constructing
From L-R: Mahesh Sharma, General Secretary, CAPSI; Mao JianDong, MD, CNTC; Sanjay Raj, Director, Golden Gate; Deepak Kumar Rath, Editor, Udai India; & Kunwar Vikram Singh, Chairman, CAPSI
“Being first responders, concentration of security guards in single location of living will ensure their instant availability to deal with any national disaster situations and other unforeseen internal security emergencies. Moreover, this project will have far reaching socio-economic impact on our national agenda of sustainable growth and poverty alleviation.” – Kunwar Vikram Singh Chairman, CAPSI
houses through public-private partnership (PPP). In the endeavor to provide shelter to every security person, an MOU has been signed with Golden Gate Projects, a Bangalore based company, and CNTC India Company Limited for multiple housing projects – first one to start with the construction of 5000 dwelling units at Mysore, which would also act as a pilot project to asSecurityLink India ■ 1 July 2017
CMYK
sess the demand for these ventures. “We are hopeful of getting good response from prospective buyers since the houses will be priced competitively compared to private ventures. Moreover, our guards can avail government subsidy under Pradhan Mantri Awas Yojana with an easy pay back scheme through monthly installments,” said Mahesh Sharma, General Secretary, CAPSI. V.V. Katti, President of CAPSI expressed his happiness for the pilot project being initiated at Mysore in Karnataka State. He intimated that the delegation of Karnataka chapter of CAPSI will meet Mr. Siddaramaiah, Chief Minister of Karnataka, and request him to launch similar housing projects near Bengaluru and other towns in the state so that security guards may able to get affordable houses to live. 21
CMYK
National Roundup
Dayalbagh Educational Institute, Agra Secured By Solar-Powered Smart Surveillance solution
A
xis Communications successfully installed of a campus-wide surveillance system at Dayalbagh Educational Institute, Agra. The unique feature of this project is that the surveillance system is powered by solar energy, resulting in a zero carbon footprint. The 10,000 strong student community required an efficient and ecologically conscious security solution to monitor the activities around the campus. The deployment is powered with 20 solar plants using rooftop panels across the entire campus. The Axis cameras provide real-time images, high-resolution zoom capability and round-the-clock monitoring. “DEI is known for its work experience courses where students work with faculty to build solutions. In tune with this, instead of relying on any integrator, we preferred to build a security surveillance solution as an open laboratory, which serves as an ideal platform for skill development and research in surveillance analytics. We were pleased to partner with Axis Communications, which managed to surpass our expectations in this regard. Their technology proved to be highly reliable, with
C
exceptional image quality, and superior compression capability that helps in keeping bandwidth low and recording depth high,” said Prof. C.M. Markan, Department of Physics & Computer Science, Dayalbagh Educational Institute, Agra. The 250+ camera installation with multiple monitoring stations and secured datacenter running on solar energy has boosted the security at the university and its residential facility that earlier relied solely on physical security. During a recent visit to DEI security surveillance lab by Telecom Sector Skills Council CEO, Lt. Gen Kochhar was pleased to observe
the Government’s policies on skill development already being practiced in letter and spirit at Dayalbagh and has offered to partner DEI in this national initiative. Axis offers intelligent security solutions that enable a smarter, safer world. As the leading player in network video, Axis is driving the industry by continually launching innovative network products based on an open platform delivering high value to customers through a global partner network. Axis has longterm relationships with partners and provides them with knowledge and groundbreaking network products in existing and new markets.
Centralized Video Surveillance
entralized video surveillance is always a better option for multi-location enterprises. They often encounter snags with scattered video surveillance products. These scattered products do not 22
“We were very pleased to collaborate with Dayalbagh Educational Institute for this project because of their work ethics and the technological challenges in building a customized solution. The aim was to create a robust system that would be powered by clean energy. The challenge was to install a large-scale system that could surveil the campus spread over 100 acres without leaving any blind spots. This required a centralized datacenter with distributed monitoring centers connected across entire campus through underground optical fiber backbone.” – Sudhindra Holla Country Manager, India & SAARC, Axis Communications
provide an integrated solution offering much needed visibility and control for multi-location organizations. Unlike traditional CCTV products, Matrix SATATYA is a profesSecurityLink India ■ 1 July 2017
CMYK
sional video surveillance solution specifically designed for serious deployments. It offers live viewing, real-time alerts and instant switching between live and stored video streams from remote locations
CMYK
National Roundup
India’s Budding Cyber Policies
India is at a nascent stage in deploying cyber intelligence related policies, and measures to curb targeted attacks
W
hile India is ushering in a new era in the digital segment, with an aggressive promotion of cashless payments, digitized documents, M-wallets, smart cities etc., the country may still be significantly lacking in cyber security policies and techniques to tackle any major targeted attack. The recent attacks of WannaCry Ransomware are just one of the many that is a clear indication of how vulnerable the globe is when it comes to cyber intrusions. “While India is spearheading the growth in the digital segment across the globe, an absence of strong policies and a clear vision to curb the forthcoming attacks may prove to be a ticking time bomb,” says Marc Kahlberg, CEO and MD, Vital Intelligence Group. The situation could become alarming if central and state governments deploy technologies and encourage many of their mission critical departments to go online with no significant cyber security measures in place. Regulating cyberspace would prove to be a knee jerk reaction in tackling cybercrimes and terrorism, making it further difficult for intelligence agencies to maintain a constant vigil
across the depths of cyber space and take proactive action where required. “'By regulating cyber space, freedoms of speech will cease to exist, available information will become less and much harder to obtain, and quite possibly, the advancements of certain technology would be either forced underground or would slowly disappear. There are also elements of information that can be attained by allowing the social media platforms to operate, and hence give law enforcement and intelligence agencies actionable intelligence as to what is really happening and in real time. This, however, would require investment, training and indeed acceptance of the fact that the best form of defense in this sphere is a proactive investigative approach,” added Kahlberg. The Vital Intelligence Group plat-
form of technologies incorporates a host of different cyber intelligence solutions including a possible world first FUSION-KEY intelligence software that collects, fuses, manages and supports intelligence mission-enabling command, control, communications, surveillance, intelligence collection and location capabilities, all via advanced engineering and processes of the highest levels. The Vital Intelligence Group is focused on empowering their clients with vital intelligence. They assist in making significantly better cyber risk and security related decisions by providing the most insightful, actionable cyber intelligence available. Vital Intelligence Group is the leading global provider of cyber Intelligence solutions, headquartered in Israel.
eliminating distance and time barriers. Many progressive organizations including Schneider, Tata Motors, Dnata, Samsung, General Electronics (GE), Airport Authority, Indian Railways, and many more rely on Matrix SATATYA for their video surveillance needs.
Features • 10 to 100,000 IP cameras. • Modular and distributed architecture. • Threat identification with intrusion, trip wire, foreign object, loitering etc. • Instant notification with SMS, email, calling and video pop-up.
• Edge recording without need for public IP. • Smart investigation using intelligent video analytics. • Parking management with ANPR. • Integration with access control, fire alarm, POS, weighbridge etc.
“While the country has witnessed an exponential growth in digitization in recent years, a major lag in the formulation of new age cyber intelligence and security policies, as well as an adoption of pro-active self-defensive capabilities may be proving to be a ticking time bomb for the country.” – Marc Kahlberg CEO and MD, Vital Intelligence Group
SecurityLink India ■ 1 July 2017
CMYK
23
CMYK
National Roundup
‘5 City SME Connect’
Schneider Electric IT Division Kicks it off from Ahmedabad Special emphasis was on trusting oneself and adopting modular approach while pursuing the journey of transformation
S
chneider Electric 5 City SME Connect kicked off from Ahmedabad. The other four cities include Mumbai, Chennai, Bangalore and Delhi that will be covered in the next two months. The highlight of the event is to interpret SMEs’ technology challenges and mitigate those challenges with a systematic approach. Everyone knows that SMEs are handicapped owing to a limited set of resources and skill sets; therefore there
said that Edge networks are going to stay while the transition happens from the datacentre centric approach to the cloud-centric approach. He also said that the IT Managers and CIOs should create self-belief within themselves to create any strategy for the company. Rahil Patel, General Manager & CIO of Kalupur Commercial Co-operative Bank Ltd., Paresh Goswami, IT Head, Chiripal Poly Films Ltd., and B. Praveen Kumar, Head, Information
must be right architectural strategy and practice to mitigate those challenges. Power, cooling, racking and stacking that are never taken seriously in an IT discussion are very important for the SMEs. Amod Ranade, General Manager, Datacentre Business Development, IT Division, Schneider Electric emphasized on micro-datacentres and
Systems & Security, Ascendum KPS Private Limited enumerated their own experiences in the transformation process and advised the audience to take steps quickly because the time and technology are disruptive. Amit Dave, Director, Microlink Solutions Pvt. Ltd., expressed his happiness about the positive attitude of the small and medium organizations and
24
SecurityLink India ■ 1 July 2017
CMYK
said that these organizations are quite receptive to new ideas, therefore they are not small and medium organizations rather ‘smart and motivated enterprises.’ Sanjay Mohapatra, Editor, SME Channels said that the SMEs are becoming the lifeline for any country and for India, it is no exception. With ‘make in India’ in place, SMEs’ role is becoming very important. Besides, the government has already said that 20% of government and PSU’s procurement would happen from the SME sector. Therefore, it is important for small and midsize organizations to adopt new technologies so that they can remain more relevant to the market. APC by Schneider Electric, the leading global brand for integrated IT physical infrastructure and software, provides reliable power and availability solutions for IT and communications technologies. With the largest community of partners tailoring solutions for home and business networks, APC products enable individuals and businesses to anticipate the unexpected, protecting critical information and data. It’s certainly in a connected world. APC is a brand of Schneider Electric, the global specialist in energy management and industrial automation.
CMYK
National Roundup
G4S Supports the Constitution Day of Denmark Celebration Danish Embassy Celebrated the Constitution Day of Denmark in association with G4S
T
he Ambassador of the Kingdom of Denmark, Peter Taksoe-Jensen has recently hosted an evening of festivity to celebrate the Constitution day of Denmark in New Delhi, supported by G4S. The event was attended by the British High Commissioner to India, Sir Dominic Asquith; Swedish Ambassador,
forward for a more mutual and beneficial association between the two countries,” said Rupan Sidhu, Director, Corporate Affairs, G4S Peter Taksoe-Jensen, the Danish Ambassador to India and host of the evening said in his welcomed note, “It’s a great pleasure to be in India. It has a great potential to grow due to its’ dy-
namic culture.” The Ambassador also thanked G4S for its support. The day is observed to honor the anniversary of the signing of the Danish constitution of 1849 by Frederik IV. Known to Danes as ‘Grundlovsdag’, or Independence Day, it marks the establishment of Denmark as a constitutional power.
Netmagic Partners with Nutanix
Offering Managed Enterprise Cloud Services (L to R) Peter Taksoe-Jensen and Rajeev Sharma
Harald Sandberg; European Union Ambassador, Tomasz Kozlowski, and CEOs of Danish companies. Rajeev Sharma, MD, G4S said, “We at G4S take a great pride in connecting with the Constitution Day celebration of Denmark. I would like to take this opportunity on behalf of G4S to wish the Ambassador of the Kingdom of Denmark a long and meaningful association with India.” “Our Group, G4S, has its origin in Denmark. In fact, G4S has a secondary stock exchange listing in Copenhagen. We have had a long and meaningful association with the country and we look
N
utanix, a leading enterprise cloud computing company has recently announced its partnership with Netmagic, a subsidiary of NTT Communications and a leading managed service provider in India. This partnership will enable Netmagic to offer private cloud services built upon the Nutanix enterprise cloud platform to customers who either run their own datacenters or using Netmagic’s dedicated datacenters based in India. Along with other recent partnerships, Nuatnix has extended its reach exponentially across India, and is now placed to support the extensive digital transformation currently underway in the country. The Nutanix enterprise cloud platSecurityLink India ■ 1 July 2017
CMYK
form goes beyond hyper-converged infrastructure and offers lower total cost of ownership (TCO), near limitless scalability, faster time to value and small footprint. It allows customers to deploy applications faster and scale rapidly as they grow. In addition, this partnership will enhance the security, scalability, reliability and flexibility for enterprises and provide them a tailor-made solution without compromising on the control of their IT infrastructure. The entire private hosted cloud service by Netmagic will be built on the Nutanix Enterprise Cloud Platform. Netmagic provides a well-structured approach to private cloud design and development. It takes into consid25
CMYK
National Roundup
eration the immediate as well as future business needs to scale-up through hybrid IT or virtual private cloud environments. Once on the Nutanix Enterprise Platform, Netmagic will be able to deliver higher return on investment (ROI) within the existing infrastructure. “Netmagic’s deep understanding of the local market, supreme reach and strong client base combined with our
technological backbone offers a robust and secure private cloud solution to enterprises,” said Sunil Mahale, VP and MD of Nutanix India, “We are confident that this partnership will enable both companies to continue to grow within the FSI and e-commerce verticals in India, and to expand into more untapped markets.” “We are pleased to partner with Nutanix to further leverage our infrastruc-
ture and domain expertise with their leading Enterprise cloud platform. This business alliance enables us with our continued efforts in maintaining our delivery excellence and value proposition,” added Sharad Sanghi, Managing Director and CEO at Netmagic, “This enhanced service offering consolidates our leadership position in the Cloud industry.”
Bolstering Channel Partner Program in India To Meet Increased Customer Demand for Privileged Account Security New distribution partners Inflow Technologies and M.Tech to expand customer access to CyberArk security solution
C
yberArk, the company that protects organisations from cyber attacks has recently announced new CyberArk Channel Partner Program offerings to enhance partners’ privileged account security expertise and ability to drive new business opportunities in India. In addition, newly-announced distribution partners Inflow Technologies and M.Tech will bolster channel support. The channel plays a critical role in delivering CyberArk’s best-in-class privileged account security solutions to joint customers, for raising awareness and triggering new business across the region, including key vertical industries such as financial services, energy and healthcare. “As one of the largest, fastest growing markets in the world, and with high technology adoption, India is a country with tremendous potential for Cyber26
Ark,” said Rohan Vaidya, regional director, India, CyberArk, “The scale and scope of attacks on the most valuable data within organisations means cyber security is an increasingly important board-level issue. CyberArk’s ability to break the cycle of cyber attacks by delivering a critical layer of security will enable businesses across India to implement proactive security strategies.”
CyberArk enables access to new training and certification programs
N
ew CyberArk Channel Partner Program offerings include: ● CyberArk University – New technical certification, expanded course offerings: CyberArk is expanding its Global Certification Program for sales and technical learning, recently adding a new CySecurityLink India ■ 1 July 2017
CMYK
berArk Certified Delivery Engineer (CDE) option. ● CyberArk DNA – Data-driven insight to increase deal impact: Partners using the CyberArk discovery and audit (DNA) tool can generate comprehensive reports for customers and prospects identifying privileged accounts on the network as well as privileged passwords – including hard-coded passwords in applications and scripts – and their status in terms of policy compliance. ● Partner Portal: All CyberArk partners can register for user access to the CyberArk partner portal. With a wealth of resources and training to support partners in selling CyberArk solutions, the Partner Portal also incorporates competitive financial rewards such as deal registration, for the CyberArk partner community.
CMYK
National Roundup
New distribution partners announced
C
yberArk also welcomes two additional distribution partners, bolstering coverage and support for channel partners and their customers in India. Inflow Technologies and M.Tech join iValue to enhance CyberArk’s distribution structure in India. “CyberArk’s approach to helping secure the network allows customers to get ahead of attacks and prevent escalation before real damage is done, instead of wasting cycles constantly reacting to cyber threats,” said Rajesh Kumar, business head, Inflow Technologies, “With this relationship, our channel partners will now be able to offer CyberArk solutions to their customers. We are optimistic about the opportunities that this partnership brings in and we shall focus on partner’s enablement and reach, ensuring that the
benefits of the CyberArk privileged account security solution are accessible to customers across key regions.” “M.Tech is excited to be a distribution partner of CyberArk in India. CyberArk’s technology has significant demand in India across all industries, primarily in the financial services, energy, retail and healthcare markets,” said Bhavin Bhatt, Regional Director, M.Tech, “Partnering with CyberArk means M.Tech is one step closer to completing the entire IT security stack. With the cutting-edge technology of CyberArk and the expertise and reach of M.Tech, this partnership will solve key security pain points for our joint customers.”
CyberArk partner program momentum
C
yberArk works with more than 300 channel partners around the
world and continues to make investments in deepening partner relationships. The company is increasing collaboration with advisory firms, systems integrators and value added resellers around the world and across key vertical markets such as healthcare and government. Additionally, the C3 Alliance, CyberArk’s global technology partner program is a strong differentiator that provides the channel with greater access to integrated technology solutions. The C3 Alliance delivers certified technology integrations between CyberArk and alliance member products that make it easier for channel partners and customers to extend the power of privileged account security across their organisation and enhance their overall security posture.
CP PLUS’ Launch Show in Thailand C
P PLUS hosted a show on 10 June 2017 at Hotel Rama Garden in Thailand to highlight their best sellers and latest range of developments. More than 100 CP PLUS premium partners and system integrators from all across Thailand made their presence at the event. The show kick started with an introduction to CP PLUS’ exemplary growth story; and post that the audience was introduced to
“It was a great show. On showcase were some of our best
selling products and the latest from CP PLUS. The audience was keen to learn about our new technologies, which is an encouragement for us to come back each time with better products and solutions. We look forward to more of such informative and interactive trips; it was certainly a pleasure.” – Aditya Khemka Managing Director & CEO – CP PLUS CP PLUS products and solutions including IP, AHD, HDCVI; time & attendance solutions; and home solutions such as video door phone and intrusion alarm systems. They also displayed their latest body worn cameras for security personnel, mobile DVR solutions, and Ezykam’s SecurityLink India ■ 1 July 2017
CMYK
range of compact plug & play cameras. During an elaborate technical session, Aman Arora of CP PLUS educated the audience about their trending technologies followed by Q&A round. The show was wrapped up with a lucky draw where lucky guests won iPhone 7. 27
CMYK
report
India Risk Survey 2017
E
merging as one of the fastest growing economies in the world, India is expected to outperform most other major economies in 2017, according to international rating agencies. India is estimated to grow at more than 7 per cent in GDP growth in 2017. Pro-investor policies have been implemented by the government to improve ease of doing business. Through flagship programmes such as ‘Make in India,’ ‘Digital India,’ and ‘Skill India,’ and effectively addressing FDI prospects across sectors, the government is striving to promote manufacturing activity locally, boost job creation and skilled workforce, local and foreign investment, and ITpowered infrastructure capable of supporting logistically-robust and multimodal networks. As per the latest IMF projection, India’s growth rate is expected to be 7.2 per cent in the 2017-18 fiscal year and 7.7 per cent in 2018-19 owing to critical structural reforms, favorable terms of trade, and lower external vulnerabilities. It is encouraging to note that the acceleration of structural reforms is bringing a new growth impetus. The Goods and Services Tax (GST), having implemented from July 2017, should help make India more of a single market and thus spur productivity, competitiveness, job creation and incomes and investment in the country. Risks to business establishments are detrimental to growth and development of any country. The nature of risks globally have changed enormously; and with their occurrences becoming more unexpected and their effects becoming more profound, risks need to be taken more seriously. Further, due to rapid digital transformation of businesses, underlying infrastructure is becoming more complex. In these changing times it is critical to understand emerging risks. Knowledge about impending risks can benefit investors, so that they could take well-informed business decisions. Given that India is increasingly attracting the international business community with its extensive regulatory, legal, and diplomatic manoeuvres, companies cannot underestimate the multitude of challenges in business operations in India; particularly with reference to the vastly divergent risk landscape the country offers. A lack of preparation against risk mitigation could leave the entire financial as well as operational functions vulnerable 28
SecurityLink India ■ 1 July 2017
CMYK
CMYK
report
“The sixth edition of the India Risk Survey is based on a comprehensive survey spanning across several sectors of the economy and geographical regions of India. This survey is an endeavour to examine and evaluate the ‘potentially destructive’ risks to business undertakings in India. The survey encompasses 12 key risks that pose a number of threats to the entire economic ecosystem of the country. It is an attempt to sensitise the Government and the corporate world about emerging risks and possible dangers these risks could pose to business establishments. I am confident that this report will be of considerable value and will provide a referral to understand the complexity of these risks across the spectrum of stakeholders i.e., policymakers, corporate and individuals of the civil society.” – Dr. A. Didar Singh Secretary General, FICCI to attacks with disastrous consequences for a long time. A holistic risk-management strategy would help businesses to both anticipate and preempt existing and evolving risks, and also deal with them effectively. The evolving nature of risks is such that they pose a requirement of being regularly assessed and understood. The inter-linkages between the various risks that exist and demand a holistic approach to safeguard the safety and security of people, assets, and information. India is undergoing drastic changes in terms of development in areas of infrastructure, Information Technology (IT), and so on. As we are blooming into a key business destination, a robust system of protection is crucial. The India Risk Survey (IRS) Report is designed to offer industries and organisations the insight necessary to compete in this increasingly complex operation environment. The India Risk Survey 2017, attempts to highlight the perception of risks from leading businesses, drawing from public voices, as well as professionals from different sectors across the country with a focus on operational safety and strategic risks. The report provides an elaborate telling of the current scenario in terms of global risks and threats. By attempting to cover all the levels of management, from top to bottom, the survey has tapped on various industries including IT, manufacturing, retail, infrastructure, transportation, and finance, amongst others. The survey stretched out to all corners of the country and beyond, including APAC, Americas, and the EMEA region.
“The purpose of India Risk Survey 2017 remains to provide a handy guide, calling attention to potential risks, and providing a base to plan the necessary preventive strategies to protect one’s organization from the negative impact of these risks. With every year, the survey aims to engage with the industry, and inform and sensitize all stakeholders about the emerging risks for developing economies like India so that well planned and strategic policy decisions can be made.” – Rohit Karnatak Managing Director – India APAC & EMEA - Global Screening, Pinkerton SecurityLink India ■ 1 July 2017
CMYK
29
CMYK
report
T
he survey consists of 12 risks that pose the most significant threats to business perception and operations in the country. The threats are inter connected and overlap across domains, sectors and geographies. New risks have been identified on the basis of this year’s survey, which are risk of non-compliance, Business Investment Risk and Legal Regulatory Risk.
Information & Cyber Insecurity
I
ndia Risk Survey ranks ‘Information & Cyber Insecurity’ as the biggest risk in 2017. In the recent past, there has been an increase in incidences of cyberattacks and potential espionage on cybersecurity. Given the security problems, there should be increased emphasis on, and investment in, the security of cyber infrastructure, and also raising awareness for safe usage of cyberspace while on the job and doing personal work. There is an immediate need for more attention to counter future cyber-attacks or attempts thereof via rigorous employee training sessions and stronger cooperation between business and the Government on related cyber-security threats. In India, ‘Information & Cyber Insecurity’ has become more pronounced due to the shift that the nation is undergoing towards digitisation of various assets and services being delivered via internet and mobile platforms; and the everpresent loopholes that hackers breach upon. The WannaCry malware incident has been, by far, the worst incident this year in which several systems were attacked, both of the public and the private sectors. The focus should be to create a robust security mechanism to address the cyber-security challenge. This would establish stronger trust between Indian companies and foreign industries. 30
Terrorism and Insurgency
‘
Terrorism and Insurgency’ has been ranked as the second biggest threat to businesses in India, with the risk rising up two spots from its position last year. India has featured 16 times in Global Terrorism Index in the list of 10 countries most affected by terrorism during 20002016. Left-wing extremism (LWE) perpetrated by communist terrorist groups remains the most severe terrorist threat, primarily in the states of Bihar, Chhattisgarh, Jharkhand and Odisha. While Islamic State (IS) has made inroads to the country, India’s security agencies have been adept at intercepting and countering the threat. The persistent risk posed by ‘Terrorism and Insurgencies,’ creates a risk perception in the minds of investors with interest in the Indian market. The higher the risk of terrorism, higher is the perceived risk associated with doing business in the country. India has invested heavily in its security capability to mount effective counter-terrorism and counter insurgency operations, however, the effects of the perception of this risk continues to affect businesses especially with respect to foreign investment.
Corruption, Bribery & Corporate Frauds
T
he ranking of ‘Corruption, Bribery & Corporate Frauds’ find itself at number 3 position in IRS 2017. As per World Bank’s Doing Business 2017 rankings, India currently stands at 130 out of 189 countries. India has been engaging to combat corruption at every level. Though there is an overall sense of lowering corruption, bribery and corporate frauds via influence of new regulations such as GST, Demonetisation, Make in India, the Digital India programme; yet the nature of the risk is such that it continues to pose an increasSecurityLink India ■ 1 July 2017
CMYK
ingly greater threat which refuses to be completely removed.
Natural Hazards
I
ndia is considered at a ‘high risk’ of natural hazards with flooding identified as the most significant risk to businesses and communities. The Survey ranks ‘Natural Hazards’ fourth highest risk to businesses, up from last year’s seventh position. In comparison with developed economies, India has scope to strengthen its institutional capacity, financial resources, and infrastructure to mitigate the adverse effects of natural hazards. floods, earthquakes and cyclones ravage the country every year, causing human and financial loss. In December 2016, Cyclone Vardah hit Chennai and adjoining coastal areas causing large-scale disruption to business operations and severely damaging the agriculture sector, costing the economic loss of INR 141 billion (USD 2.2 billion).
Fire
‘
Fire’ ranks fifth, up by three positions from last year. According to NCRB, a total of 18,450 cases of fire accidents were reported in India in 2015, with 1,193 persons injured and 17,700 killed, of which 42.1% of deaths were due to fire accidents in residential buildings. The majority of fire accidents were reported in Maharashtra, which accounted for 22% of all.
Political & Governance Instability
‘
Political & Governance Instability’ continues to hold its position as number 6 risk in the India Risk Surveys for 2017 and 2016 respectively. The impact of ‘Political & Governance Instability’ in the India Risk Survey 2017 has been indicated primarily as a result of the legis-
CMYK
report
India Risk Survey 2017
action in September 2016, an estimated Crime 180 million Indian public sector workers rime remains a serious concern went on a 24-hour general strike against for the Indian economy as it the labour and economic policies of the reflects a breakdown of public law government. Industries dominated by & order and permeates all sections blue-collar jobs that employ low-skilled of the society. ‘Crime’ as a risk faclabourers are faced with criticism regard- tor dropped to the eighth position in ing inadequate working conditions and 2017, from its third ranking in the last unsatisfactory compensation. year’s India Risk Survey. However, as In the agricultural sector, that em- per National Crime Records Bureau ploys 47.2% of the population, farmer (NCRB) data, overall crime in India distress led to widespread agitations. In increased by 1.3% in 2015. A total of June 2017, farmers’ agitation in Maha- 73, 26,099 crimes were reported, with rashtra and Madhya Pradesh demand- 29, 49,400 crimes registered under ing higher prices for their produce and the Indian Penal Code (IPC) and 43, a loan waiver impacted the food prices 76,699 under Special & Local Laws and the supply of raw products like veg- (SLL). Delhi accounted for 25% of The aim of the IRS 2017 is to identify prominent risks that are critical in nature and rank them based on their pertinence to businesses and regions of India. The methodology consisted of a risk survey that was administe etables, fruits, and meat to wholesale all crimes registered in major Indian across India and abroad. The respondents varied from employees from lower, middle to upper management professionals. All results received have been presented graphically along with trend observations for each risk markets and manufacturing industries. cities.
lative assembly elections that were conducted in 2017, and that of the upcoming legislative assembly elections in 2018. It should be noted that the Central Government continues to push reforms for creating a more conducive environment for business to flourish and to further attract more investors. However, social tensions and unrest, and strained political deadlocks continues to be a stumbling block.
C
Strikes, Closures & Unrest
I
n contrast to last year’s survey, ‘Strikes, Closures & Unrest’ dropped six positions to rank seven; although labour unrest in the country was rampant and led to disruption in business continuity, causing the increase in operational cost. In ‘the world’s largest ever’ industrial
Methodology and Respondents The highest risk is ranked at number 1, with the lowest at number 12.
Regionwise Contribution
Methodology and respondents
East 3.74% North 32.76%
Outside India (Including APAC EMEA & AMERICAS) 11.70%
The methodology consisted of a risk survey that was administered across India and abroad. The respondents varied from employees from lower, middle to upper management India Risk professionals. The highest risk is ranked at Survey 2017 number 1 and the lowest at number 12.
West 10.76%
South 14.04%
Pan India 26.99% North
Pan India
South
West
Outside India (Including APAC EMEA & AMERICAS)
East
20.03
25
SecurityLink India ■ 1 July 2017
CMYK
Printing Solutions 0.16
Defence consultant 0.16
Investment consultant 0.16
Communications/Information 0.16
Aerospace 0.16
Imports and Exports Trading Company 0.16
Houskeeping 0.16
Facility Management including 0.16
NBFC 0.16
Defence 0.16
print publishing 0.16
Construction 0.16
Market Research 0.16
AGRICULTURE AND FOOD 0.16
PROCESSING 0.16
Publishing 0.49
trading & investing 0.33
NGO 0.81
Shipping, Ports & Aviation 0.65
Logistics 0.81
Transport 1.63
Telecom
Hospitality
E Commerce/Digital Platforms 0.98
2.28
1.79
Retail
Media & Entertainment 1.63
2.44
2.44
Power, Oil & Gas
2.61
2.44 Medical & Healthcare Services
4.4
6.68
Others
Financial Services
0
IT/ITES
5
Education Security Services & Solution Providers Infrastructure
7
6.84
10
Consulting
10.59 Manufacturing
10.1
10.59
20 15
Govt / PSU
(FIGURES IN PERCENTAGE)
Industry-wise Contribution
31
CMYK
report
Business Espionage
the IRS 2017. With major changes setting to women’s safety at workplace are of Business Espionage’ climbed one regarding India’s position as an indus- critical importance. IRS 2017 has given spot to ninth position in IRS 2017. trial destination, the issue of IP theft has special attention to this risk as there is a The current scenario is looking at a achieved more importance. India’s posi- need to create stronger and wider awaremore pressing task in avoiding business tion in the US Special 301 list does not ness for women to feel comfortable and espionage. Due to the sensitive nature put India in the most favourable position. safe while at the workplace and while of critical infrastructures of businesses The Indian Government laid out the new commuting. today, namely the cyber-domain, busi- Intellectual Property Rights Policy which ness espionage is becoming increasingly aims to promote research and develop- Accidents more sophisticated and more covert. ment through tax benefits and is likely to Accidents’ retain the 12th position in This makes it difficult to detect and ad- result in a positive investment regime in the risk ranking in IRS 2017. Accidress an issue. The inherent problem the country. On the issues of counterfeit dental deaths require a comprehensive and piracy andand software, with business consists espionageof is 12 the risks possible The survey that pose the of films, music sectors geographies. New risks have been study due to the different incidents that most significant threats business identified on the basis this the year’s survey, the illegal activities are still prevalent. domino-effect which would to lead to an perception fall of under category. The incidents and operations in the country. Though each which include: risk of non-compliance, business extensive collapse within a company. will always have a direct impact on the risk is assessed individually, for the purpose investment risk andbusiness. legal regulatory risk. of accidents, Higher incidence Threatsofto Women’s Safety the survey, a deeper understanding requires whether industrial or& individual, Intellectual Property Theft Threats to Women’s Safety’ work- ranks India RiskatSurvey ‘Information Cyber increasa holistic reading that treats each vector es liability for businesses, place ranked eleventh in IRS 2017. Intellectual Property (IP) Theft’ Insecurity’ as the biggest risk in 2017. In theparticularly as part of a larger reality. The threats are for the insurance sector. in The dangers and implications of threats climbed one position to tenth rank in domains, recent past, there has been an increase interconnected and overlap across
‘
Executive Summary ‘ ‘
‘
Overall Risk Rating 15
11.03 9.37
9.34
10 8.66
8.4
8.38
8.28 7.87
7.51
7.65
7.11 6.4 5
4
Trend Analysis: Comparative perspectives on risk Govt./ PSU Vs Private Sector
T
he survey results suggest that the perception of risk categories moderately differs between the Government/ PSU and the private sector. 32
CMYK
en ts cid Ac
af te y nS
ea t
st
oW om e
Pr op er ty
ec tu al Int ell
SecurityLink India ■ 1 July 2017
Th r
sp sE es
This is a significant change from the 2016 survey findings which observed a significant difference in perceptions between the sectors. Both the Government/ PSU and private sector have ranked ‘Information & Cyber Insecurity’ as the greatest threat to their operations. This perception can be attributed to a substantial increase in the attempt-
Th ef t
ag e ion
e im Cr Bu sin
Fir tic e al Ins & G ta ov bil er ity na nc e St rik e & s, C Un lo re sur st es
Po li
I Cy nfo be rm r I ati ns on ec & ur ity Te Ins rror ur ism ge & Co nc y rru Co pt rp ion or , B at r e F ibe ra ry ud & s Na tu ra lH az ar ds
0
ed cyber-attacks and potential espionage on cyber-security this year. The information and cyber-domain remains one of the most important critical infrastructure for the government and the private sector, with the government’s extensive shift towards IT-powered governance. This, coupled with the private sector’s multi-modal engagement and
CMYK
report
same is, however, ranked at No. 7 by the private sector. ‘Terrorism & Insurgency’ has been equally perceived as the third highest threat by both.
and Survey corporate sectors. investment in the sector has made it the government India Risk 2017 The Government/ PSU rates ‘Pomost vulnerable to attacks. Protection of critical infrastructure operations has litical and Governance Instability’ as the highest risk toon its Risk operations, the emerged as a major -challenge for the second Risk Ranking Comparative Perspectives RISK RANKING - GOVT./PSU Vs PRIVATE SECTOR
0
1
1 2
2 2
3
3
4
4 4
5
5
6
6 6
7
7 8
8 8
9
9
10
10 10
11
11 12
12
12 14
Intellectual Property Theft Score
Business Espionage Score
Accidents Score
Threats to women saftey
Crime Score
Strikes, Closures & Unrest Score
Fire Score
Natural Hazards Score
Corruption, Bribery & Corporate Frauds Score
Terrorism & InsurgencyScore
Political & Governance Instability Score
Information & Cyber InsecurityScore
Govt/ PSU
Private Sector
the private sector. ‘Terrorism has been The survey results suggest that the perception of risk the companies the survey, were graded Company turnover turnover & of Insurgency’ INR 200 crores (USD 30.93 equally perceived as the third highest threat by both the categories moderately differs between the Government/
F
according viz. up to and million) belowThe INR 100 crores rated orand thethe second consecutive year, Government/PSU privateand sectors. Government/ PSU private sector. This is a the significant changeto the turnover PSU ranks ‘Corruption, Bribery & Corporate Frauds’ at from the 2016 survey findings which observed a significant 15.46 million), ‘Information & Cyber Insecurity,’ ‘Corsurvey included a study of the risk INR 100 crores (USDNo. 4, while the private sector deems this risk as the difference in perceptions between the sectors. Both second highest ‘Natural Hazards’ has beenFrauds,’ rankedand the Government/PSU and private sector have ranked perception by companies on the basis between INR 100 crores to 200 croresthreat. ruption, Bribery & Corporate at No. 5 by the Government/PSU, while the private sector ‘Information & Cyber Insecurity’ as the greatest threat 15.46-30.93 million), oftotheir giving a peek intocan the be (USD ‘Terrorism & Insurgency’ asperceives the top three ratesand thiscompathreat at No. 4. The Government/PSU their turnover, operations. This perception attributed to ‘Fire’ at No. 6, while the private sector ranks this risk at coma substantial increase in attempted cyber-attacks and nature of challenges small and medium nies with a turnover of more than INR risks respectively. For medium-scale No. 5. ‘Strikes, Closures & Unrest’ ranks at No. 7 for the potential espionage on cyber-security this year. The crores (USD million). level enterprises face in comparison toone200 panies, however, ‘Political & Governance Government/PSU, and at No. 6 for the private sector. information and cyber-domain remains of the most India Risk30.93 Survey 2017 ‘Crimes’ has been rated at No. 8 by both the Government/ important critical infrastructure for the government and large corporations. For the purpose of Companies exceeding an annual Instability’ makes the second risk. PSU and the private sector. ‘Threats to Women Safety’ the private sector, with the government’s extensive shift ranks No. 9 for the Government/PSU, while the private towards IT-powered governance. This, coupled with the sector perceives this risk at No. 11. The Government/ private sector’s multi-modal engagement and investment PSU ranks ‘Accidents’ at No. 10, while the private sector in the sector has made it the most vulnerable to attacks. rates this threat at No. 12. ‘Business Espionage’ is rated Protection of critical infrastructure operations has No. 11 on the threat perception of the Government/PSU, emerged as a major challenge for the government and 1 1 1 0 while the private sector ranks this at No. 9. ‘Intellectual corporate sectors. The Government/PSU 2 2 2 rates ‘Political 3 3 3 2 as the second highest Property Theft’ is rated No. 12 in the perceived risks for the and Governance Instability’ 4 4 4 risk to its operations, the4same is ranked 5 Government/PSU, while holding the No. 10 rank for the 5 5 at No. 7 by 6 6 6 private sector.
Risk Ranking – Company Turnover
7 7
6
7 8
8
8
9
8
9
9 10 10
10 11
10
11
11 12
12
12
12 14 Information Corruption, Terrorism & & Cyber Bribery & Insecurity Corporate Insurgency Frauds
12
Natural Hazards
Fire
Strikes, Closures & Unrest
Crime
Political & Governance Instability
Threats to women safety
Intellectual Business Accidents Property Espionage Theft
Turnover 0-100 crores
1
2
3
4
5
6
7
8
9
10
11
12
Turnover 101-200 crores
1
5
3
4
6
7
9
2
12
10
8
11
Turnover Above 200 crores
1
2
3
6
5
7
8
4
9
11
10
12
For the second consecutive year, the survey included a SecurityLink study of the risk perception by companies on the basis of their turnover, giving a peek into the nature of challenges small and medium level enterprises face in comparison to large corporations. For the purpose of the survey, the
Bribery & Corporate Frauds’, and ‘Terrorism & India ‘Corruption, ■ 1 July 2017 33 Insurgency’ as the top three risks, respectively. Similarly, small companies with an annual turnover of up to INR 100 crore (USD 15.46 million) ranked ‘Information & Cyber Insecurity’, ‘Corruption, Bribery & Corporate Frauds’, and
CMYK
CMYK
report
Region wise risk ranking
T
hree regions of India – North, South, and West – view ‘Information & Cyber Insecurity’ as the top most risk for businesses in the country. However, the East region perceives ‘Natural Hazards’ as the highest risk. This rating is because of the annually observed
seasonal flooding during the monsoon season, resulting in the shifting of major rivers, and causing landslides and infrastructural damage. The hilly and forested terrain of India’s north-eastern states isIndia another key risk for businesses Risk Survey 2017 in the region. The eastern region ranks ‘Political & Governance Instability’ and
‘Information & Cyber Insecurity’ at No. 2 and No. 3, respectively. For respondents from Outside of India,‘Information & Cyber Insecurity’ comprises the top-most risk, followed by ‘Terrorism & Insurgency’ and ‘Corruption, Bribery & Corporate Frauds’ at No. 2 and No. 3 positions, respectively.
Top three risks in each region of India
North
1
Information & Cyber Insecurity
2
Corruption, Bribery & Corporate Frauds
3
Terrorism & Insurgency
South
1
Information & Cyber Insecurity
2
Terrorism & Insurgency
3
Corruption, Bribery & Corporate Frauds
East
1
Natural Hazards
2
Political & Governance Instability
3
Information & Cyber Insecurity
West
1
Information & Cyber Insecurity
2
Natural Hazards
3
Corruption, Bribery & Corporate Frauds
Top three risksranking across industry sectors Industry wise risk Commerce, Media & Entertainment, and
I
NGOs sectors, constiranking of Corruption, Bribery & present a more comprehensive, diverse, tute Insecurity the highest risk. ‘Terrorism & InsurEducation Information & Cyber Corporate Frauds and sectoral perception. ‘Information & gency’ is the top risk for sectors including e- Commerce Natural Hazards Intellectual Property Theft CyberGovt. Insecurity’ is ranked the top risk Hospitality and Others. For the Retail sec& PSU Information & Cyber Insecurity Terrorism & Insurgency by the education, Government/ PSU, Fi- tor, ‘Political & Governance Instability’ Financial Services Information & Cyber Insecurity Terrorism & Insurgency nancial Services, Infrastructure, IT/ ITES, presents the highest risk. For a majority Hospitality & Insurgency Fire as Terrorism & Inof sectors, risks such Logistics & Transportation,Terrorism ManufacturInfrastructure Information & Cyber Insecurity Fire Bribery & Corpoing, Medical Services, Security Service surgency,’ ‘Corruption, IT/ITES Information & Cyber Terrorism & Insurgency Providers, and Telecom sectors. For the erate Insecurity Frauds,’ ‘Fire,’ and ‘Strikes, Closures Sector ndustry-wise
Logistics & Transportation
No. 2 Risk ‘Natural Hazards’
No.categories 1 Risk risk
Information & Cyber Insecurity
Corruption, Bribery & Corporate Frauds Corruption, Bribery & Corporate Frauds
& Unrest’ are the primary concerns. For 3 Risk most No. sectors, the top five risks are primarily a combination of these perceived Fire threats. The e-Commerce Business Espionagesector perceives ‘Intellectual Theft’ and ‘BusiPolitical Property & Governance Instability ness Corruption, Espionage’ as the second and thirdBribery & most Corporate important Frauds risks. ‘Threats to Women Information & Cyber Safety’ have been indicated among the top Insecurity Terrorism & Insurgency five risks observed in the Hospitality and Corruption, Bribery & e-Commerce sectors. Corporate Frauds Natural Hazards
This Manufacturing survey is a joint effort of FICCI and Pinkerton to highlight the severity of Political risks and their impact on the & Governance Information & Cyber Insecurity Instability industry, economic sectors and geographical regions of the country. The results of the survey are Mediaacross & Natural Hazards Information & Cyber Insecurity Fire Entertainment based on a collation of a set of 12 risks that have been identified a series of brain-storming sessions. Corruption, Briberyafter & Fire Medical Services Information & Cyber Insecurity Corporate Frauds The India Risk Survey 2017 thus aims to focus onCorruption, the majorBribery risks &that have the potential to adversely imStrikes, Closures & Unrest NGOs Natural Hazards Corporate Frauds pact businesses in thePolitical country. The India Risk Survey 2017 also provides inputs that& we hope will help Information Cyber & Governance Fire Retail Insecurity Instability cross-sector business leadership in devising risk-mitigation strategies, in order to create a &secure busiCorruption, Bribery Security Services Information & Cyber Insecurity Terrorism & Insurgency Corporate Frauds ness environment. However, the applicability of each risk to individual organisations may vary. 34
Telecom
Information & Cyber Insecurity
Natural Hazards
Others
Terrorism & Insurgency
Information & Cyber Insecurity Strikes, Closures & Unrest
SecurityLink India ■ 1 July 2017
CMYK
Terrorism & Insurgency
7
CMYK
product showcase
Zipstream to Embrace 360° Cameras & 4K Resolution
Axis announces enhancements to its Zipstream compression technology to support the increased data streaming and storage demands of 360-degree panoramic cameras and 4K resolution. Zipstream ensures that important forensic details of video footage are maintained, while minimizing bandwidth and storage requirements by an average of 50% or more. Axis also announces two new domes that include the enhanced Zipstream, offering 360-degree, high-resolution coverage, cost-effectively
C
ustomer demands for video surveillance can appear contradictory – an increasing desire for improved quality, resolution, and coverage, with a simultaneous need to control costs in relation to bandwidth and data storage. The response from Axis Communications is to continually develop its unique Zipstream video compression technology, to embrace the developments in network camera capabilities. “Storage and bandwidth make a significant part of the total cost of a surveillance system. Axis developed Zipstream to address the specific needs of the security industry. That is, to minimize these requirements without losing forensic details,” said Johan Paulsson, Chief Technology Officer at Axis Communications, “We are happy and proud to announce that the enhancement of Zipstream now embraces both panoramic and ultra-high resolution cameras.” Axis also announces AXIS M3047-P and AXIS M3048-P network cameras, which take advantage of the enhanced Zipstream technology to deliver 360-degree coverage in a costeffective way. They are compact fixed mini dome ‘fisheye’ cameras giving complete coverage to customers with more limited means. Featuring an attractive, smaller design than their predecessors, the new
cameras are flat and subtle, without any dome over the lens, which makes them more discreet and eliminates the risk of reflections in the dome. Smoke-detector and vandal-resistant casings, as well as a black casing are offered as accessories for both cameras. The cameras support both camera-side as well as client-side dewarping. The smooth client-side dewarping in AXIS Camera Station or other video management systems can be easily performed in live view or on recorded material of the full 360° overview. AXIS M3047-P, with a 6-megapixel sensor, and AXIS M3048-P, with a 12-megapixel sensor, both deliver full frame rate video, excellent image quality including overall sharpness and light sensitivity. “Combining these new 360-degree domes with the enhanced Zipstream
SecurityLink India ■ 1 July 2017
CMYK
technology really does deliver a costeffective solution for customers, providing comprehensive coverage while ensuring the detail of that panoramic view is not lost when streaming and storing data,” added Petra Bennermark, Global Product Manager, Axis Communications. Axis offers intelligent security solutions that enable a smarter, safer world. As the market leader in network video, Axis is driving the industry by continually launching innovative network products based on an open platform - delivering high value to customers through a global partner network. 35
CMYK
product showcase
New PT-Series Xtralis Vesda-E Vep NVRs Aspirating Smoke Detector With Hot-swappable Storage Next Generation Life Safety Offerings
H
oneywell has recently announced the next generation of Xtralis VESDA® aspirating smoke detectors that redefine the ASD technology and will set a new benchmark in the industry for reliable very early warning smoke detection. Honeywell’s Xtralis VESDA-E VEP offers improved detection performance – 1.5 times greater sensitivity than VESDA VLP, up to 6 times better dust rejection to minimize nuisance alarms – saving building owners significant potential costs from fire department calls. The technology offers higher detection stability over a wider range of environments and improved consistency through its Flair Detection Technology. Its new unique particle characterization capability provides analytics for targeted detection and efficient and effective response. VESDA-E VEP enhances the user experience with out-of–the-box operation utilizing auto configuration to aid commissioning, an intuitive 3.5” LCD touch screen display for simplified status investigation, and wireless remote review with the iVESDA™ app for proactive maintenance. New standard features including built-in Ethernet and WiFi provide ease of connectivity with commonly used handheld devices and the PC-based Xtralis® VSM monitoring package. The series occupies the same mounting footprint, pipe, conduit and electrical connector positioning as VESDA VLP, providing a virtually seamless retrofit option. The new system enables longer pipe runs for convenient detector mounting, reducing maintenance costs. Detector coverage is extended by up to 20% in high-ceiling environments, which also helps reduce costs for customers. VESDA-E VEP is also compatible with existing VESDAnet installations, allowing monitoring of both VESDA-E and legacy detectors via the latest iVESDA application. Xtralis VESDA-E VEP extends the VESDA-E product family that revolutionized the smoke detection industry with its unique ASD offering into standard detection applications. 36
W
avestore’s PT-Series NVRs are designed to offer a robust and reliable recording, management and control solution for a host of security and video surveillance projects. With the ability to connect up to 48 network cameras per standalone unit, they can also be configured into server groups to satisfy large and distributed video surveillance installations, all accessible to an operator via Wavestore’s easy to use WaveView client software. “The PT-series enables WaveView to be accessed locally for day-to-day operation simply by plugging a monitor, keyboard and mouse directly into the unit, whilst additional remote connections of authorised WaveView clients can easily be achieved either from a computer or mobile device,” says Julian Inman, Head of Product Management at Wavestore, “With the addition of the PT-Series to our range of NVRs and Hybrid Video Recorders, our partners can take full advantage of deploying fully scalable solutions that can be administered, managed and controlled on a common VMS platform.” PT-series NVRs can accommodate 4x3.5” hot-swap hard drives to provide up to 24TB of storage. Thanks to industry leading throughput, users can typically expect 31 days storage of images from over 40 Full HD cameras being recorded in real-time, 24 hours a day. Customisable recording rates can be set per individual channel for both normal and ‘on alarm’ recording and a wide mix of camera technologies, including 360° degree fisheye cameras, can be deployed across an installation. Available from Wavestore’s network of authorised distributors, the new PT-Series NVRs come with the option to upgrade or expand channels at any time in the future without having to reinstall the VMS software. Users can choose from Base, Premium or Enterprise VMS levels and purchase the exact number of camera licenses required for the application at hand. All PT-Series NVRs are provided with a full three-year return to base hardware warranty and come pre-installed with Version 6 of Wavestore’s VMS embedded directly onto their Linux operating system.
SecurityLink India ■ 1 July 2017
CMYK
CMYK
product showcase
Thermal Camera for Commercial Market
Thermal cameras are endowed with unique features such as night surveillance, remote surveillance and temperature detection that other cameras generally do not compete with. Debuted in military field, thermal cameras have played a key role in wars. After years of research and development, infrared image processing technology and the craftsmanship of the detectors are becoming more proven and the cost of the components is lowering, and this is how thermal imaging technology has entered into industrial market
D
ahua technology has recently launched an entry-level thermal mini-hybrid bullet camera DH-TPCBF2120. Featuring mini size, dual-channel spectrum, intelligent functions and affordable price, DH-TPC-BF2120 is a thermal camera truly for the commercial installations that is installed just like any other security surveillance camera.
Product features
Mini-sized and durable
D
H-TPC-BF2120 has an external dimension of 9.39”x3.56”x3.56” and the ingress protection grade reaches up to IP67 having strong environmental adaptability against water, dust and other contaminants.
Dual-channel spectrum, external infrared lamp
D
H-TPC-BF2120 deploys Dahua’s advanced image analysis and intelligent algorithms in the optical camera,
and fully integrates them into the thermal camera. This camera combines one thermal camera for monitoring in total darkness and one Image Fusion optical camera with SONY STARVIS™ sensor to acquire high-resolution color Application scenario image. It is connected using one IP ad- Perimeter protection dress. IR led illuminating is turned on at ultiple DH-TPC-BF2120 thernight to make sure no detail is missed in mal cameras can be utilized to any lighting conditions. form a perimeter intruder detection system, which performs as an invisible tripwire using thermal imaging techIntelligent functions n addition to basic functions such nology. When installed at the recomas ROI, IVS, PIP, image fusion etc., mended height of 5 meters and with an DH-TPC-BF2120 supports multiple FOV of 56°x44°, one DH-TPC-BF2120 intelligent functions such as meet- thermal camera covers a fence of 29 ing the demand of daily video sur- meters long. Whether it is day or night, veillance, fire hazard warning and as soon as someone enters a targeted alarm message delivery. Fires are usu- area, a warning will be sent to the conally caught by imperceptible hidden trol center. It is truly an ideal choice for flames, which are hard for applications such as residential parks, general surveillance systems industrial parks, gardens and large to detect. Utilizing thermal parking lots. imaging technology, DHTPC-BF2120 is able to dis- Fire detection cover hidden flames quickly ig internal spaces with goods preand effectively. It precisely sent a fire hazard which is difficult locates the fire allowing time- to detect by smoke sensors. Surveillance ly emergency response to nip cameras, however high-resolution they are, cannot effectively detect the locathe fire in the bud.
M
I
B
Perimeter Protection
SecurityLink India ■ 1 July 2017
CMYK
37
CMYK
product showcase
tion and scale of the fires. Thanks to its thermal technology, DH-TPC-BF2120 is an ideal device to guard such spaces like warehouses, exhibition halls etc.
Summary
D
ahua DH-TPC-BF2120 is the first thermal camera truly for commercial market. Though an entry-level product in Dahua thermal camera portfolio, DH-TPC-BF2120’s numerous intelli-
DH-TPC-BF2120
gent functions make it a one-stop solution for small and medium sized surveillance projects. Supporting ONVIF protocol, DH-TPC-BF2120 is compatible with mainstream third-party VMS platforms in the market such as Genetec (Security Center 5.6 GA), Milestone
(XProtect Corporate 2017 R1) as well as Dahua DSS (Dahua Security Software). The launch of DH-TPC-BF2120 will increase the potential market space of thermal imaging, protecting the investment of Dahua customers. With a mission to build a safer society and promote smarter living, Dahua will continue to focus on ‘Innovation, Quality and Service’ to serve partners and customers all around the world.
Extra effort is what makes big difference
New Motorized Eyeball Camera U
NV IPC363X series is the newly released model of motorized eyeball camera. The patented industrial design considers both of the appearance and the usability, and finds the fine balance between them. It is designed for both indoor and outdoor applications, and can be widely used in many types of sceneries such as retail, school, enterprise, building, gas station and so on.
Image quality
I
PC363X series includes two models with 2MP and 4MP resolutions respectively, and both have builtin Hisilicon H.265 DSP. Uniview patented ISP technology helps reach high image quality but with less bitrate. Both models support 38
120dB WDR which ensures clear image with rich details when confronting sharp lighting contrast.
Hardware design
I
PC363X series applies an all metal body for application. The eyeball camera used IR anti-reflection glass. The black anti-reflection material can also improve 8% IR transmission. Moreover, it applies smart IR to detect brightness of view and adjust a suitable IR light compensation. It supports IP67 with 100% leak test before shipment.
Software design
U
NV IPC363X applies abundant functions that would greatly benefit users. It embeds H.265, SecurityLink India ■ 1 July 2017
CMYK
U-Code and multiple smart functions. H.265 compression can reduce up to 50% bandwidth but keep high image quality. U-code is an enhanced encoding technology released by Uniview that can reduce up to 95% bandwidth while no details missing. Smart functions in IPC363X series are face detection, intrusion, crossing line, people counting, audio exception detection, defocus detection, scene change detection.
Easy to use
I
PC363X series fully considers users’ needs and embeds many user-friendly functions. It has built-in microphone for audio input making it unnecessarily to install an individual voice pickup. By using up to 128GB SD card for edge storage, it can prevent unpredictable network connection breaks. The motorized lens can save installation cost, and the 3-Axis can provide a wide adjustable view.
CMYK
product showcase
MicroDome® G2 Camera Series With Integrated IR Models
A
recont Vision® announces the expansion of the compact MicroDome® G2 ultra-low profile camera family with the immediate availability of new models with built-in infrared (IR) illumination. “Integrated IR is the latest capability added to this extremely compact camera series for professional video surveillance,” said Brad Donaldson, Vice President Product Development, for Arecont Vision, “No other dome camera of this size offers customers as many choices and advanced features as the MicroDome G2 series.” MicroDome G2 with IR offers a wide range of models with 1.2MP, 1080p, 3MP, or 5MP resolution choices. Lens options range from 2.1 to 16mm, supporting the widest possible surveillance application requirements. Remote focus simplifies set-up and significantly reduces installation time. The installer can mount the MicroDome G2 camera on a wall, ceiling, or structure, points the sensor at the area to be covered, and then screws down the bubble. Once off the lift or ladder, the installer selects ‘Short Range Focus’ or ‘Full Range Focus’ from the camera web page for rapid setup over the network, and then fine-tunes the focus if required by the scene. Arecont Vision SNAPstream™ (Smart Noise Adaptation and Processing) technology reduces camera bandwidth consumption in all MicroDome G2 with IR models without impacting image quality.
The MicroDome G2 with IR provides outstanding aroundthe-clock surveillance for both indoor and outdoor applications. The series is designed for applications with challenging lighting conditions featuring a built-in day/ night mechanical IR cut filter and IR illuminators. For environments with strong backlighting, reflections from wet flooring, streets, or puddles, or contrast due to fog, mist, or glare, optional wide dynamic range (WDR) equipped 1080p and 3MP models are available. Built-in CorridorView™ technology provides better coverage of hallways, corridors, and other narrow spaces without wasting pixels on unchanging areas. The MicroDome G2 series features Arecont Vision’s installer-friendly mount enclosures to simplify installation. The rugged, tamper-resistant, die-cast aluminium housing features a polycarbonate dome bubble that is both IK-10 impact-resistant and IP66 weatherproof rated for indoor and outdoor use. MicroDome and all other Arecont Vision cameras run the in-house developed massively parallel image processing (MPIP) architecture on a field programmable gate array (FPGA) integrated circuit. All core features and technologies are developed by Arecont Vision, and installed cameras can be upgraded with new capabilities via remote firmware updates, thereby extending the SecurityLink India ■ 1 July 2017
CMYK
useful life of the device. By employing the unique MPIP architecture, Arecont Vision cameras do not require the use of common embedded operating systems, nor do they make use of 3rd party code or chip-sets for core features. This approach eliminates the potential risk of hidden backdoors, and the range of other cybersecurity weaknesses widely documented in other camera brands. Arecont Vision cameras are unable to be maliciously repurposed for use in Distributed Denial of Service (DDoS), network penetration, ransomware, and other cyberattacks, or to be used to spread to malware and computer viruses to other network-enabled devices. The MicroDome G2 with IR is ONVIF (Open Network Video Interface Forum) Series S compliant. They are integrated with the industry’s leading video management system (VMS) and network video recorder (NVR) choices through the technology partner program and its MegaLab™ test and certification facility. 39
CMYK
product showcase
SlashPRO™ Slash Resistant Clothing Protecting Those Who Protect Others
S
lashPRO™ slash resistant clothing is designed to protect frontline professionals working in hostile environments
including prison and correctional facility officers, homeland security professionals, police officers and those in the private security sector. Slashing dangers are relatively frequent for these workers and an occupational risk faced on a daily basis. Rapid blood loss often leads to fatality, and it is the SlashPRO™ mission to protect professionals at risk, with a range of easyto-wear, slash and cut resistant clothing. One of the most recent reported incidents took place at the Maghaberry Jail in Northern Ireland which saw a female prison officer being slashed across her face. The SlashPRO™ clothing range provides extensive protection to body and limbs, also covering the five main arterial areas: Radial (wrist), Brachial (along bicep), Carotid (throat), Axillary (beneath arm pit) and Femoral (thigh region). Rusty Keeble, CEO of The Gang Enforcement Company said, “The slash-resistant combat shirt is one bad ass piece of officer protection wear. The design is 40
comfortable, professional-looking and allows you to move freely and naturally.” It certainly took a while to finalise all garment designs and develop full confidence that all customer needs will have been met by the first series of designs. Robert Kaiser, CEO of SlashPRO™ and parent company PPSS Group says, “I am absolutely over the moon knowing SlashPRO™ Clothing has finally been launched. “Following sev-
eral reported incidents, which have seen officers around the world being slashed and suffering rapid blood loss, we at PPSS Group felt strongly that slash resistant clothing can prevent such injuries and ultimately save lives.” Orders for SlashPRO™ clothing have been taken from highly regarded professionals and companies worldwide, of which many have provided excellent testimonial to the quality of the clothing range.
Adding Hid Technology™ to the Reader Range
P
axton Access, the manufacturer of IP access control and door entry solutions, has added Genuine HID Technology™ to the majority of its access control reader range, in pursuit of market feedback. In addition, for extra convenience, dealers can now purchase nine of Paxton’s most popular readers with pre-activated HID Global® licenses included. These readers are ready to use right out of the box with no extra cost and no additional license required. Genuine HID Technology is one of the most popular credential formats and this update to the company’s reader range helps support the ease of system migration when updating to a new Paxton access control solution. This also provides a cost benefit as users can retain their existing credentials. Gareth O’Hara, Chief Sales Officer at Paxton Access says, “This is something that our customers have told us they want, and we have listened. With the release of this technology, taking over an existing system is even easier. Simply enrol your HID credential in the Paxton system and continue to use them alongside Paxton tokens without changing any hardware. This is great for sites already using this technology as your customers won’t need to buy new credentials, saving them money.” SecurityLink India ■ 1 July 2017
CMYK
CMYK
product showcase
Next-Generation Software for Connected Solutions M
ilestone Systems has recently released XProtect 2017 R2. They meet the increasing demand for connected business and video systems by releasing three new products – XProtect Essential+, XProtect Express+ and XProtect Professional+. These new products cover installations from a few to thousands of cameras. All the products fully support hardware acceleration, where system performance can be boosted just by adding a supported graphics card that can handle the heavy lifting in decoding video, leaving room for the system to handle other tasks.
Expanding possibilities through connectivity
S
upport for Milestone’s integration programming platform (MIP SDK) and built-in customization options with the rules engine enable tailored video solutions made by Milestone Partners.
This could be video analytics or integrations to other systems like building management systems, financial systems or other enterprise systems. XProtect Express+ and XProtect Professional+ support Milestone Interconnect, enabling these systems to be part of a larger network of video business systems. These new products open new possibilities for the Milestone community because they enable video service solutions targeted to each customer’s needs. If the customer has the Milestone Care maintenance service, system performance monitoring can be handled on-
line to give all the benefits of advanced video systems with full remote operation. “As the number one global VMS vendor, we are positioned to drive open platform innovation through the solution power of the Milestone comSecurityLink India ■ 1 July 2017
CMYK
munity. With these new products, we are giving our community a whole new range of possibilities. Milestone proactively designs for the market trends we see growing with networked systems,” says Bjørn Skou Eilertsen, Chief Technical Officer, Milestone Systems.
New features in Milestone XProtect 2017 R2
A
s video management systems are becoming more business-critical; cybersecurity is a growing concern in today’s fast technology curve. The XProtect 2017 R2 update also includes several security enhancements for improved cybersecurity including securing the video recordings using strong encryption for the media database. The integrity of the recordings is ensured by digitally signing using SHA-2 (Secure Hash Algorithm 2), an important security standard. These new features support Milestone in meeting the highest security demands of customers. As part of the continued refining of Milestone’s software usability, audio functionality in XProtect has been enhanced. New features have also been added for handling maps to improve operational efficiency. 41
CMYK
product showcase
Cost-effective
TS-831X and TS-531X NAS
Now support QM2 expansion cards and feature an upgraded Quad-core 1.7 GHz CPU
Q
NAP® Systems, Inc. has announced that its cost-effective 10GbE-ready TS-831X and TS-531X business NAS now support QNAP’s innovative QM2
PCIe expansion cards. By installing a QM2 card, users can easily configure M.2 SSDs for the NAS to enjoy boosted performance with SSD caching or a caching pool, or add additional 10GbE 10GBASE-T connectivity. Both the TS831X and TS-531X now also ship with an upgraded AnnapurnaLabs, an Amazon company Alpine AL-314 quad-core 1.7 GHz processor that delivers higher performance. Both the 8-bay TS-831X and 5-bay TS-531X feature a pair of 10GbE SFP+ ports to facilitate bandwidth-demanding tasks. To tackle IOPS-demanding applications, a QM2 M.2 SSD/ 10GbE PCIe expansion card can be installed in the NAS to add up to two M.2 PCIe/ SATA SSDs for increasing read/ write performance and to add extra 10GbE connectivity (individual QM2 cards may vary in functionality). Besides SSD caching, QM2 can form a RAID 1 or RAID 0 caching pool or auto-tiering volume, while Qtier auto-tiering technology can 42
be enabled at the same time to ensure 24/7 optimized storage efficiency. “QM2 is ideal for NAS with a single PCIe slot to boost performance and connectivity,” said Jason Hsu, Product Manager of QNAP, “It allows M.2 SSD caching and a caching pool without occupying any drive bays, and optimizes storage efficiency across M.2 SSD and high-capacity SATA HDDs with aroundthe-clock acceleration.”
The 1.7 GHz quad-core TS-831X and TS-531X deliver private cloud functionality to fulfill business needs in storage and backup/ restoration. Both models are scalable by attaching QNAP expansion enclosures, support VJBOD (Virtual JBOD) to expand the storage of other QNAP NAS, and feature Container Station for developing containerized applications, IoT and microservices.
Intelligent Data Management For High-Performance, Project-Based Workflows
New integrated solution provides more granular data visibility and access across scale-out storage environments
Q
uantum Corp. has recently announced the integration of Data Frameworks ClarityNow software with its Xcellis™ scale-out storage and Artico™ archive appliances, providing increased visibility into usage and other intelligence regarding large unstructured data. Through deeper insight into their data, users with highly demanding storage environments – which can include hundreds of storage nodes, dozens of file systems and multiple different vendors – will now be able to scan, organize, access and migrate their data much more easily
SecurityLink India ■ 1 July 2017
CMYK
and efficiently to meet their business or mission objectives.
Unmatched performance for complex file types; easy file and project migration
Q
uantum has integrated ClarityNow with its Xcellis workflow storage and Artico archive gateway appliances to enable easy migration of files from any other NAS environment to take advantage of the better performance, access, sharing and cost management which Quantum’s
CMYK
product showcase
StorNext®-powered appliances provide. The combined solution provides business-relevant views across all file systems, allowing users to manage files by project, client, researcher, storage cost or other metrics. The combination of Quantum scale-out storage appliances and DataFrameworks ClarityNow enables data owners such as project managers, principal investigators, lead engineers and
researchers to view and search the archive without an IT request. This combination thereby reduces the drain on limited IT resources and decreases both the operating costs and capital expenditures – often by 10x or more – associated with managing large amounts of file-based data across complex storage environments.
Zone 3D for Public Safety Professionals New software platform enables ‘CSI’ effect for crash, crime, and fire investigation
F
ARO® the world’s leading source for 3D measurement and imaging solutions for factory metrology, construction BIM/ CIM, product design, public safety forensics, and 3D solutions applications, announces the availability of the FARO Zone 3D software. This revolutionary platform, through its advanced smart tools is the first of its kind to enable investigators to move fluidly between 2D and 3D environments and enhance the quality of incident reconstruction analysis or presentations for public safety professionals. FARO Zone 3D dramatically elevates the visual impact of presentations, including courtroom exhibits, by enabling accurate 2D and 3D scene diagrams, 3D scene walk-throughs, and full scene reconstruction animations. FARO Zone 3D also enhances the ability of public safety professionals to plan for, and respond more effectively to, emergencies by creating accurate representations of real-world locations within local communities. Key leading-edge functionality of
FARO Zone 3D includes:
Advanced smart tools to drive a more confident result
● Precise diagramming and measurement tools. ● Blood spatter analysis tools. ● Bullet trajectory analysis tools. ● Dynamic momentum and skid crash analysis tools. ● Vehicle crush analysis tools. ● Accurate scene replication with more than 10 million 3D models included or imported from free, online sources. ● Accurate 2D and 3D animations and walk-throughs.
Enhanced flexibility to drive a faster result
● Easily draw and edit in 3D or in 2D, and see both views simultaneously. ● Explore ‘what if’ animation scenarios in real time with exact measurements taken from the scene. ● Quickly and simply import measureSecurityLink India ■ 1 July 2017
CMYK
ment data from other sources such as drones, satellite maps, or laser scanners. ● Import FARO laser scan data directly from FARO SCENE software. ● Backwards compatibility with FARO CAD Zone and ARAS applications. “FARO is committed to delivering innovation that enables investigators to do their job faster, easier, and more effectively,” states Jeff Ruiz, Vice President Global Public Safety – Forensics Business Unit, “FARO Zone 3D is a major industry milestone that harnesses the power of 3D in a solution specifically developed for crime, crash, and fire investigators.” FARO Zone 3D is currently available for ordering. 43
CMYK
product showcase
Available for Smartphones and Tablets
3rd Gen. FLIR ONE Thermal Imaging Cameras The FLIR ONE Pro is FLIR’s most advanced smartphone camera to date
F
LIR Systems, Inc. has recently announced that the new third generation FLIR ONE® and FLIR ONE Pro thermal imaging cameras are available for pre-order worldwide with product deliveries starting in late June. Powered by FLIR's Lepton® thermal micro-camera core, the FLIR ONE builds upon a legacy of enabling thermal imaging on smartphones. The latest FLIR ONE is FLIR’s most affordable smartphone thermal camera while the first edition FLIR ONE Pro is the most advanced FLIR ONE to date. New features like its predecessors, both new FLIR ONEs come equipped with a thermal and a high-definition visible camera. Using FLIR’s patented multi-spectral dynamic imaging (MSX®) technology, both FLIR ONE models emboss high-fidelity, visible-light details onto the thermal imagery to dramatically improve image quality. The FLIR ONE and FLIR ONE Pro offer a breadth of new and improved features including: OneFit™ adjustable connector enables the connection to adjust up to four millimeters to accommodate a variety of smartphone cases without the need to remove the case. This patent pending feature is available for both iOS and Android devices. Improved FLIR ONE App that now features in-app tips for problem solving, use cases, and a community for sharing images and videos. Smartwatch compatibility with the Apple watch and select Android smartwatches, provide the ability to stream live thermal imagery to see around corners and take images 44
or video from your smartwatch. FLIR ONE Pro: The all-new FLIR ONE Pro, designed for professionals and consumers alike, is the most advanced FLIR ONE ever created. With a distinctive ruggedised design that is drop tested to 1.8 meters, the FLIR ONE Pro is made to withstand work and outdoor environments. Combining FLIR’s MSX with FLIR’s video signal processing technology, VividIR™, the FLIR ONE Pro delivers the highest thermal image quality and clarity of all FLIR ONE generations. It also offers exclusive, advanced FLIR ONE App features, including multiple spot temperature meters and selectable onscreen temperature
tracking regions. “Our goal with the third generation FLIR ONE and FLIR ONE Pro is to equip more consumers and professionals alike with the ability to experience the power of thermal imaging and the world's sixth sense,” said Andy Teich, President and CEO of FLIR Systems, “With continued research and development, we’ve combined the functionality of previous versions with greater affordability to provide a thermal camera accessory at just $199.99. Meanwhile, we have also created a more powerful FLIR ONE Pro for those who require more functionality and image clarity either at home, at play, or on the jobsite.”
Valerus VMS Version 1.2 New features enhance a simple user experience
V
icon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components, announces the release of Valerus 1.2, the latest version of its popular video management software. With the latest release, Valerus further enhances the simple, completely hassle-free user experience that the software has been designed to deliver.
New features include:
● Three powerful search options
SecurityLink India ■ 1 July 2017
CMYK
that help find recorded video evidence as quickly as possible. Thumbnail Search, Museum Search and Events Framework Search provide three distinct methods for searching, depending on the nature of the query. ● Built-in dewarping and viewing controls for 360º cameras that allow Valerus users to get the most out of today’s popular, highresolution fisheye cameras. Multiple view perspectives, including quad views and 180º perimeters,
CMYK
product showcase
provide the same level of detailed coverage that would typically require the use of many megapixel cameras. Presets and pan/ zoom capabilities further enhance the flexibility and performance the cameras can deliver. ● Enhanced health dashboard statistics that provide detailed graphs for every camera and NVR on the network, making it easier to assess system behavior and diagnose problems. ● Additional network settings give system administrators more flexibility in how to setup, secure, backup
and maintain their Valerus system. Valerus now supports encrypted communication over https networks, provides the ability to regularly backup system configuration settings, and allows for easy systemwide software updates by pushing new software from the application server to all NVRs. It also supports both IPV4 an IPV6 devices. ● Security Keypads and PLC Controllers that can now connect to Valerus systems, allowing for camera views, presets, and even web pages to be quickly called up using numerical values.
Bret McGowan, Vicon’s Senior V.P., Sales and Marketing says, “All new features of Valerus 1.2 have been added not just to enhance system performance, but to increase the ease with which customers make use of the system.” Valerus 1.2 will be available for download via the Vicon website in early July, 2017. Valerus customers eligible for upgrades can download the new software and update their system without any system relicensing. Prospective new customers are encouraged to download a free 30-day trial of Valerus Pro to experience the full range of features.
H4 Platform with H4 Thermal Camera Combination of built in self-learning video analytics and thermal imaging provides accurate detection in a wide range of environments
T
he Avigilon H4 Thermal camera line provides exceptional detection and performance with the combination of thermal imaging and Avigilon’s patented self-learning video analytics. Operating beyond the visible spectrum, the H4 Thermal camera line is designed to detect the movement of people and vehicles even in areas with poor visibility, challenging lighting conditions, absolute darkness and partly camouflaged objects. Through Avigilon self-learning video analytics, operators receive notification of detected activity that may require further investigation, helping them take decisive action when needed. “With our patented self-learning video analytics built in, our H4 Thermal camera line is designed to help
The H4 Thermal camera line combines self-learning video analytics and thermal imaging for accurate detection in a wide range of environments
our customers detect, verify and act on events in locations where environmental conditions are challenging,” said Mahesh Saptharishi, Avigilon’s Chief Technology Officer, “Expanding our product line with thermal imaging technology continues to broaden the range of Avigilon solutions available to meet our partners’ and customers’ SecurityLink India ■ 1 July 2017
CMYK
needs.” The bullet-style, all-environment design is outdoor ready and well suited for a wide range of applications including critical infrastructure, transportation and government. The H4 Thermal camera line is expected to be available for order in the fourth quarter of this year. 45
CMYK
product showcase
Packaged Workforce Optimization Solutions For Mid-Sized Contact Centers
Company’s proven, flexible WFO solutions available to mid-market contact centers in the cloud or on-premises mid-market solution packages available through extensive channel partner network
V
erint® Systems Inc. has recently announced the availability of its workforce optimization offerings for businesses with small and medium-sized contact center operations. Available either in the cloud or onpremises, the mid-market offerings include best-of-breed capabilities across Verint Workforce Optimization™ solutions. Through its mid-market solutions for Workforce Optimization (WFO), Quality Management™ (QM) and Workforce Management™ (WFM), Verint makes key, award-winning functionality readily available to midmarket contact centers at attractive price points. These powerful, easy-touse software and services packaged solutions include fully-unified WFO software, a single user interface, and unique business process workflows right out-of-the-box. In addition, other Verint solutions such as Analytics-Driven Quality™, Speech Analytics™, Desktop and Process Analytics™ and Knowledge Management™ can be added and licensed by individual product. Designed to help ensure simplified, rapid deployment, the Verint mid-market solutions integrate with all leading automatic call distributors (ACDs), providing channel partners with maximum flexibility and giving 46
organizations even more options and choice of integrated platforms. Leveraging these solutions, businesses can gain greater insight and achieve better outcomes for enhancing customer interactions and experiences, heightening engagement, improving processes, optimizing workforce performance and managing costs.
Mid-market solution packages
V
erint mid-market solutions include robust functionality, an intuitive interface and streamlined navigation to drive maximum uptake and usage and help ensure a lower total cost of ownership. Solution packages include: ● Verint Quality Management helps contact centers move away from random call sampling by efficiently selecting and evaluating large numbers of interactions across business channels based on business drivers and relevance, employee performance and customer input. ● Verint Workforce Management provides an easy-to-use, web-enabled solution that simplifies the complex task of staff forecasting and scheduling, without the expense and administrative burden of thick-client solutions. SecurityLink India ■ 1 July 2017
CMYK
● Verint Workforce Optimization allows organizations to enhance business performance and the customer experience using QM, WFM, performance management and e-learning capabilities to enable effective staff scheduling, the capture and analysis of customer interactions, the ability to manage and measure employee performance against goals, and the need to deliver targeted learning and development for skill enhancement and employee development. Verint has formed an extensive network dedicated to support the midmarket through channel partners serving the contact center market. “Verint continues to advance its commitment to organizations with contact centers of all sizes, and is uniquely positioned for the growth opportunity in the mid-market through our extensive partner network and cloud-based, ACD-neutral packaged solutions,” says Nancy Treaster, SVP and General Manager, Strategic Operations, Verint, “Strong reseller relationships are an integral part of our strategy for growth, and we recognize that our partnerships are a critical path to key end users in both geographic and vertical markets.”
CMYK
product showcase
Fiberpatrol®
For Buried Perimeter Detection Applications Covert and undetectable fiber optic sensor ideal for protecting long perimeters and borders
S
enstar has recently announced FiberPatrol for buried perimeter detection applications. Using a buried fiber optic cable and a centrally-located sensor unit, FiberPatrol provides covert detection of intruders, vehicles, and tunneling for up to 72km (45mi) per processor. “The advanced technology behind FiberPatrol has been protecting critical infrastructure around the world for many years as a fence-mounted intrusion detection solution,” said Product Manager Stewart Dewar, “Engineered for buried applications including pipeline protection, we can now provide the same reliable and accurate detecting and locating
abilities, with intruders not even aware they are being monitored. These buried detection capabilities further broaden Senstar’s market-leading portfolio of perimeter intrusion detection products.” FiberPatrol detects and locates a wide range of above and below ground threats associated with long perimeters including borders. From someone walking, running or crawling above the sensor, to heavy vehicle engine vibrations, to digging and tunneling activities, FiberPatrol pinpoints intrusion attempts to within ±10 m (±33 ft) accuracy. FiberPatrol requires no powered or conductive items in the field, making
the sensor completely immune to EMI and lightning and intrinsically safe in the presence of explosive atmospheres. It can accurately detect and locate intrusions even when there are multiple simultaneous intrusions or in the presence of spatially-distributed environmental noise that would mask the detection capability of other long-range fiber optic sensors. As well, the system’s resilient design allows detection to continue right up to the point of a cut in the sensor cable. FiberPatrol for buried applications is ideal as a standalone protection option or as an additional layer of protection for a fence line.
Overlay Detection in DIGIPASS for Apps Protecting Mobile Applications
DIGIPASS® for Apps Runtime Application Self-Protection now includes overlay detection to help protect against increasingly common mobile app overlay attacks
V
ASCO® Data Security International, Inc., a leading global provider in digital solutions including identity, security and business productivity, has recently announced its ability to help organizations detect and mitigate mobile application overlay attacks through added functionality in the DIGIPASS for Apps Runtime Application Self-Protection (RASP) module. Overlay attacks are increasingly being deployed to steal user login information. The ongoing attack on Android devices named Marcher has already targeted 117 banking applications. Over-
lay malware allows attackers to create screens that sit on top of legitimate Android applications and intercept information that can compromise a user’s security and privacy. To help prevent damage during an overlay attack, organizations can use the overlay detection functionality from DIGIPASS for Apps, which offers a library of APIs that natively integrates application security, biometric authentication, risk analysis and more into mobile applications. While the attack is occurring, the overlay detection functionality can close the targeted app and SecurityLink India ■ 1 July 2017
CMYK
open a browser to notify the end user and the organization from which the legitimate app originates. “Mobile malware attacks are only increasing, making it more important than ever for organizations to deploy technology that helps prevent against further damage,” said VASCO President and Chief Operating Officer, Scott Clements, “This kind of real-time, frictionless and convenient security for mobile transactions helps organizations mitigate risk and better ensure trust in the digital world.” 47
CMYK
product showcase
SafeNet Trusted Access
Simplifies and Secures Access to Cloud Applications New access management service helps companies mitigate risk with integrated single sign-on, multi-factor authentication and risk-based analytics
G
emalto has recently launched SafeNet Trusted Access, an access management and identity protection service, to secure cloud and on premise applications. Powered by a robust risk-based analytics engine, Gemalto’s solution delivers integrated Cloud Single-Sign-On (SSO) and multi-factor authentication (MFA) capabilities so companies can easily implement secure,
conditional access and additional authentication levels when outlined in the policy engine. According to recent research, enterprises in 2017 are expected to utilize an average of 17 cloud applications to support their IT, operations and business strategies. With SafeNet Trusted Access a user can log on once to access all approved applications, as defined by the policy for that application. “The adoption of cloud apps is fast becoming mainstream. Yet IT teams lag in their ability to effectively manage and restrict access to these apps and offer their employees the convenience they expect. With SafeNet Trusted Access, IT Managers can set scenario-based policies linked to associated risk factors and implement step up authentication for a 48
particular application or group of users, depending on the level of sensitivity and role,” said Francois Lasnier, Senior Vice President of Authentication Products at Gemalto, “We built this newest addition on the expertise and success of the award winning SafeNet Authentication Service to support our customers as they migrate their enterprise workflows into the cloud. We designed this next-generation MFA and Cloud SSO platform with the goal of making it easier for IT to align security with business processes.” “Historically, controlling access to resources has been ‘red-light/ greenlight’ or binary – you’re either allowed in or you’re not, and once they are in, most SSO offerings are blind to anything a user does once they are granted. By combining analytics with IAM, SafeNet Trusted Access provides companies with the ability to identify anomalies in ac-
● Improves user experience providing Smart Cloud Single Sign-On (SSO) for authentication when defined by the access policy. ● Simplifies access management to cloud applications such as Office 365, ServiceNow and Salesforce.com. ● Leverages a powerful datadriven policy engine for enterprises to optimize business security and user convenience via scenario-based access conditions. SecurityLink India ■ 1 July 2017
CMYK
cess patterns that could indicate risk and help prevent data breaches,” said Garrett Bekker, Principal Analyst at 451 Research.” Gemalto's SafeNet Trusted Access key features include: ● Scalability: The solution features built-in integration templates making it easy for companies to add new and existing cloud applications as needed. ● Supports long-term IAM strategy: Companies benefit from a broad range of Gemalto’s stronger authentication methods and form factors such as one-time-passwords and biometrics. ● Risk-based analytics and detailed access policies: Scenario-based policies define access controls, assess whether a login attempt is secure, apply the appropriate level of authentication and require additional security measures when necessary. ● Visibility: Provides the right level of visibility into workforce identity and access activities & events. ● Centralized access management: A single pane of glass gives visibility into all access events streamlining security audits, tracking and help desk requests like password resets. ● Regulatory compliance: IT can ensure compliance with relevant legislation and standards using the solution’s data driven insights on user behavior, access events and policy enforcement.
CMYK
product showcase
Schlage® NDE Wireless Locks Integration Integration offers users real-time monitoring capabilities using S2 NetBox access control system
S
2 Security, and Allegion™ have announced S2 NetBox series product support for Schlage® NDE wireless locks. S2 NetBox access control and event monitoring system users can now easily manage and control the locks using Allegion’s ENGAGE™ Gateway and Bluetooth® technology. “We’re excited to offer support for and sell the popular Schlage NDE wireless locks,” said Mike Riegelman, Vice President of Business Development at S2 Security, “NDE locksets, in particular, offer real-time lockdown capability, which is an advancement in wireless solutions.” The integration allows users to manage access control and event monitoring, such as real-time lockdowns, directly
from S2 NetBox without requiring third-party hardware. The Schlage NDE combines the lock, credential reader, door position sensor and request to exit (REX) into a single unit. Ideal for interior doors, NDE wireless locks are simple to retrofit into standard doors without drilling additional holes. And, these locks connect directly to a smartphone for quick set up using the ENGAGE mobile app. “The integration with S2 NetBox brings new opportunities to both companies, and most importantly, to our customers,” said Brad Aikin, Electronics Portfolio Leader at Allegion, “The access control system seamlessly
works with Schlage NDE locks to provide advanced security capabilities at every opening. Plus, customers enjoy many conveniences of using credentials throughout the building.” NetBox software Version 4.9.08 is now generally available for S2 Security Certified Integrators to download on S2 Support Central.
L2+ Managed Ethernet Switches O
T Systems introduces new L2+ managed Ethernet switch series which provides IP network surveillance devices’ management functions. The new L2+ managed Ethernet switches provide easier manageability, robust security and embedded Surveillance Device Management (SDM) system to allow users to automatically manage, monitor and deploy the surveillance network system. It offers an easy network configuration; displays the live streaming and graphical monitoring of topology, floor and google map view; and provides real-time monitoring
and troubleshooting. The system also supports one-click login and auto discovery to easily classify the third party-device name, IP address, connected port number and link status. The new L2+ managed Ethernet switch series is especially designed for IP surveillance applications. Managing IP network surveillance systems through the L2+ managed Ethernet switches becomes intuitive and efficient. SecurityLink India ■ 1 July 2017
CMYK
49
CMYK
white paper
LTO Technology & Video Surveillance
Benefits and Best Practices By Josh Woodhouse – Senior Analyst, Video Surveillance, IHS Market
T
he video surveillance industry has evolved dramatically over the last 50 years. From the days of whirring VCRs, where individuals were literally, ‘caught on (VHS) tape,’ to the introduction of digital video recorders and spinning hard disks – and now, an era of network-based video surveillance and associated IT infrastructure. During this transition, the hard disk drive displaced VHS tape as the typical media for storing video surveillance footage. However, with the number of higher megapixel cameras on the rise and longer retention requirements, end-users are struggling to deal with the data and cost requirements associated with storing this amount of footage. In systems with long-term data retention, end-users can now use filebased tape storage such as LTO (Linear Tape Open) technology in combination with disk, to effectively meet their requirements in a cost effective manner
without compromising on the quality of the video stored or the length of time the video footage is retained.
Influential factors driving demand for cameras Legislation
T
he level of pertinent legislation and regulation varies both nationally and internationally. Typically in North America and Western Europe there is little legislation relating directly to the general installation or use of video surveillance equipment, however, specific industries such as critical national infrastructure or casinos and gaming may be subject to specific regulations. Compliance with privacy and data protection laws tend to have a large influence on video surveillance installations and their data retention policies. In May 2017, the German government responded
The number of video surveillance cameras sold globally in the last decade has increased year-on-year. In the 2017 calendar year, IHS Markit forecasts there will be over 127 million video surveillance cameras sold via professional channels. 50
SecurityLink India ■ 1 July 2017
CMYK
to an increase in security threats and the lack of video evidence available in public places including stations and city centers, by introducing new legislation altering current privacy laws to allow greater installation of video surveillance cameras. Legislation and regulations are particularly influential in the Middle East. These can dictate which organizations must install video surveillance equipment, the level of coverage and include equipment specifications such as minimum camera resolutions, frame rates, and footage retention times. For example, in Qatar, hotels and shopping malls must store footage for a minimum of 120 days.
Multiple use
T
oday, video surveillance equipment has multiple uses beyond that of traditional security or loss-prevention applications such as: ● Monitoring, control and recording of business operations. ● Health and safety - crowd monitoring and control. ● The collection of consumer marketing information, especially in retail sector.
of a better quality image Ccan M Ybe K measured through the camera’s specifications. IHS Markit has measured an uplift in the specification of cameras across several different parameters. Figure 3 shows the uplift in one element: resolution. Currently the most common network camera shipping is 1080p resolution but there will be continued growth in shipments of higher resolution cameras. Four megapixel cameras are increasing in popularity and with vendors white paper marketing 4K resolution cameras for wide area surveillance even higher resolution cameras are expected to gain market share. Equivalent 4K resolution video is four times the file size of 1080p.
Decline in camera prices
D
ecrease in average selling prices of equipment is enabling end-users to obtain a larger return on investment. IHS Markit data shows that since 2012 the average price of a network surveillance camera in the American market has more than halved. Over the last five years, the composition of the competitive environment has changed significantly through the growth of many Chinese video surveillance vendors who typically sell cameras and recording devices at prices below their western competitors.
Higher specification of cameras
I
HS Markit has measured uplift in the specification of cameras across several different parameters. Currently the most common network camera shipping is 1080p resolution but there will be continued growth in higher resolution cameras. Four megapixel cameras are increasing in popularity and 4K and even higher resolution cameras are expected to gain market share. Various compression technologies have been developed to mitigate some of the effects of an increase in camera image quality and the associated demands on network transmission, compute and storage. The typical compression used in the surveillance industry in 2017 is based
In 2017
In 2020
98 million 3 % network surveillance cameras will be shipped globally through professional sales channels
29 %
of these network surveillance cameras will be 4K resolution or above
of network surveillance cameras shipped are forecast to be 4K resolution or above
Figure on the3 H.264 AVC (MPEG-4 Part 10) ble. For security purposes the value usustandard. Many vendors released allya relates the recording of amay security A video surveillance camerahave installed to capture specifictoscene running 24/7 only capture minimal changesupdates in activity e.g.last peopleincident. moving in However, its line of sight. much innovative proprietary in the the Therefore uncertainty of of the information it captures is largely irrelevant. Various compression technologies have 18 months often marketed as some form which parts of recorded video are gobeen developed to mitigate some of the effects of an increase in camera image quality of ‘H.264+’ and ‘smart bandwidth man-transmission, ing to becompute useful often meansThe trade-offs and the associated demands on network and storage. typical compression used in the surveillance industry in 2017 is based on the H.264 AVC agement.’ The next generation H.265 between the quality at which (MPEG-4 video is Part 10) standard. Many vendors have released innovative proprietary updates in the last 18 (HEVC) compression is still some way stored and the length of time it is stored. months often marketed as some form of “H.264+” and “smart bandwidth management”. off mass market adoption in the videoareas of aTypically, thedynamically retention These compressions tend to filter out static frame not ofextending interest while adjusting the industry. frame rate Despite of areas ofadvances interest to reduce bitrate compared with standard surveillance time for video surveillance data isH.264 juscompression. The next generation H.265 (HEVC) compression is still some way off mass in compression technologies demand for tified by the perceived increase in the market adoption in the video surveillance industry. This is largely due to lack of clarity with storage continues increase. ofvideo video surveillance data. As license fee payment,tobackward compatibility withvalue existing management software (VMS) programs and the uplift in processing power required to encode and decode. Therefore, while end-users are realizing the full value of there is an increasing volume of cameras marketed as “H.265” and “H.265 ready” shipping in this data, theyinwish to retain it of forH.265 longer Increased value ofis still data 2017, IHS Markit believes there much progress required the integration in periods. This may be due to a new ap& retention times thelonger video surveillance ecosystem before it displaces the use of H.264. Caught On Tape, Now Keep It Secure forstorage video continues surveillance data, or he vast majority of recorded video plication Despite advances in compression technologies demand for to increase. • In criminal investigationsfootage having extended footage for forensicavideo investigations and perceived security threat has increased. surveillance is never repost-recording analytics available for retrieval can be critical in detaining all involved suspects andAs preventing offences. retention periods increase the retention does not increase Sometimes, viewed. muchrepeat detail asLonger possible probability in building a full picture of crimes and capturing crucial evidence, especially if there isbe a probability suspects collaborators prior to committing uniformly across a system. Strategishould retained untilor it can be visited deter-a location a crime. Using analytics to search previously recorded footage for a particular face, mined which parts areisrelevant orif valuabehavioural pattern or vehicle only possible data has been cally retained.important or mission critical cam-
T
Greater number of cameras
1.6 Exabytes
Greater video surveillance storage requirements 5
Of data generated per day by new surveillance cameras shipped globally in 2017. 1 Exabyte = 1,000 Petabytes (PB) = 1,000,000 Terabytes (TB)
Average data generated daily by new surveillance cameras shipped globaily
3,000 Higher specification cameras
Additional
2,500 Petabytes
● Anti-litigation purposes for collecting potential video evidence in case of lawsuits. ● Traffic monitoring and enforcement systems. The multiple uses of video surveillance systems has assisted in the propagation of the network surveillance camera as another Internet of Things (IoT) sensor which can be integrated into more complex and larger systems.
336
PB/day 2015 - 2016
2,000 1,500 1,000 500
Increased value of data & longer retention times
0 2014 Source: IHS Markit
2015
2016 2017 Year
2018
2019 © 2017 IHS Markit
Figure 4
Figure 4 shows the three key drivers greater video surveillance storage requirements. SecurityLink India ■ 1ofJuly 2017 These are: 1. A greater number of video surveillance cameras entering the market – an increase in new camera systems as well as an increase in the average number of cameras being connected in individual systems.
CMYK
51
CMYK
white paper
eras may have a different policy to other cameras. In general, retaining footage for longer increases the size of the available potential usable dataset for analysis.
Requirements specific to storing video surveillance footage A different approach to traditional IT data storage
V
ideo surveillance storage has some specific requirements and differs from traditional IT data storage in the following ways: ● Video surveillance storage workloads should be configured heavily towards writing data to storage media. Most stored footage is never accessed and is deleted without it being reviewed. Therefore, generally, the requirements to read data are much lower than the requirements to write. This is different to traditional IT workloads which are typically more mixed. ● Video surveillance workloads can be typified as requiring high bandwidth due to the need for multiple concurrent data streams to be recorded at any one time. The throughput should be designed to cope with these requirements particularly during periods of high activity which may cause spikes in bandwidth required. It is critical in events such as those where recording must be maintained from all video streams at the defined quality with no dropped frames and no data loss. ● Often a video surveillance storage system requires a high level of redundancy and failover. No system is 100% redundant. However, in the event of a failure and rebuild process, the system requires enough redundancy to continue performing its primary function i.e., the recording 52
of video surveillance footage. ● Video footage should remain accessible to the video management software regardless of where it is stored. Data retained for long periods of time in separate silos can inhibit users if separate manual interaction is required for access. Keeping latency to a minimum for playback and post recording analytics should also be an objective. ● Where there is a low probability of data access but a need for longterm retention the energy costs of data storage should be a consideration. Treating all data with the same policy and storing all data, regardless of age, in the same manner can have ramifications for energy costs. ● Systems should be designed with the ability to scale and support future expansion in capacity with minimal disruption. Future expansion can come about due to change in: internal policy, legislation/ regulations or the video surveillance front-end (additional cameras or upgraded replacement cameras added to the system). Flexible systems where additional capacity is easy to add are required to cope with future changes such as these.
Video surveillance data as evidence
I
n addition to how a video surveillance workload can differ from traditional IT data storage, there are other considerations specific to video surveillance data, and that its use as evidence in civil or criminal court proceedings. When storing video surveillance footage there is potential that the data may be used as evidence in court. However, it is not clear until post recording what data is going to be relevant. Therefore storing the best possible quality SecurityLink India ■ 1 July 2017
CMYK
footage whilst maintaining a chain of custody should always be a primary concern. Reducing quality of footage for budgetary reasons can undermine the purpose of storing it in the first place. When footage is required as potential evidence there are further considerations: ● Should evidence of a crime be collected, a complete chain of custody to ensure the video evidence has not been tampered with or doctored is required. Keeping data in a unified system, meaning the footage can be replayed by the server which recorded it, can help to keep the chain of custody. ● Chain of custody in the cloud is possible through the use of Criminal Justice Information Services (CJIS) compliant datacenters. However, data storage here can be subject to premium costs which are often negated in a total cost of ownership (TCO) analysis. ● Stored video footage should be able to be exported easily whilst maintaining the chain of custody. ● If a police department has stored evidential video surveillance footage that has been involved in a conviction or a serious crime, they are often required to store this evidence for the duration of any custodial sentence. This has the potential to increase the retention period to decades.
LTO technology and video surveillance No one-size fits all approach to video surveillance storage
A
huge range of storage requirements spans different video surveillance end-user groups. Therefore, treating all video surveillance data with
CMYK
white paper
This approach is outdated as multia one-size fits all approach can lead to inefficiencies. The value and require- ple tiers of active storage, across differments for video surveillance data often ent storage media (disk, tape and flash) changes over its lifetime – so configur- can be connected in one system. This ing a storage solution with one type of means the characteristic of each storage storage and the same storage policy can tier is utilized to best fit to the video surveillance storage requirements and the be inefficient. Commonly, when choosing a storage entire system remains accessible by the solution, a trade-off between budget and user and any software applications. File-based magnetic data tape stormission ensues. Often to meet a budget the quality of video surveillance footage age can provide an important tier for the or duration it is stored for is compro- storage of video surveillance data in an mised. This does not always need to be active multi-tiered storage approach. the case. Often performance, capacity and retention can be balanced whilst What is LTO technology and minimising sacrifices of redundancy, ac- LTFS cess or scalability. Using multiple tiers inear tape open (LTO) technology of active storage can help achieve this. is an open format of magnetic tape In general IT and in some video sur- data storage jointly developed by HPE, veillance storage systems where a two- IBM and Quantum. In the non-video Caught On Tape, Now Keep It Secure tier approach of (active storage and ar- surveillance wider IT market, LTO techWhat is LTO technology and LTFS chival) implemented, nology isstorage primarily Linear tapehas open been (LTO) technology is an openoften format the of magnetic tape data jointly used for data backdeveloped by HPE, IBM and Quantum. In the non-video surveillance wider IT market, LTO visibilityis primarily and integration between the and up,longdisaster recovery and long term technology used for data back-up, disaster recovery term data retention. It is often used for making multiple copies of data and for cold storage offsite in vaults. Since two tiers through a single file system and data retention. It is often used for makthe 2010 release of the fifth generation, LTO technology has included the linear tape file system (LTFS). LTFS utilizes partitioning to create an index which points to the requested application has been problematic. Once ing multiple copies of data and for cold file positions on the tape. This means that data can be dragged-and-dropped and viewed in a similar way tomoved hard disk drives. data was to the archive tier it be- storage offsite in vaults. Since the 2010 The LTFS inactive. format provides a self-describing cartridge which meansrelease applications notfifth requiregeneration, LTO techcame For users to gain access ofdothe any additional information to read the data stored. In the event of a disaster where loss of data occurs, data can be recovered from tape. IT staff had to be involved to manually nology has included the linear tape file In a tape library used for long-term retention the time to locate (LTFS). and start reading retrieve theconfiguration data. If using a tape archive, system LTFS utilizes partitiondata is slower than a disk array. However, this is offset by the potential to offer tape as a lowercost, alternative to hard disk drive arrays for longer term does the high-capacity entire contents were manually copied ing toretention. create Tape an index which points to the not substitute disk as primary storage. back to disk and it then needed manually requested file positions on the tape. This The LTO format has a published technology roadmap with future specifications . Figure 5 shows what thethrough. LTO technology roadmap means in terms of videomeans surveillance storage. searching that data can be dragged-and-
L
9
10
LTO Technology Roadmap
Using tape in video surveillance storage - example Available now
Days Footage Stored Per Catridge x10 1080p camera streams (15fps)
Future releases
Generation 7
Generation 8
Generation 9
Generation 10
6 TB RAW
Up to 12.8 TB RAW
Up to 26 TB RAW
Up to 48 TB RAW
13
29
58
107
7
14
29
54
days
days
days
days
OR x5 4k camera streams (15fps)
days
days
days
days
dropped and viewed in a similar way to hard disk drives. The LTFS format provides a selfdescribing cartridge which means applications do not require any additional information to read the data stored. In the event of a disaster where loss of data occurs, data can be recovered from tape. In a tape library configuration used for long-term retention the time to locate and start reading data is slower than a disk array. However, this is offset by the potential to offer tape as a lowercost, high-capacity alternative to hard disk drive arrays for longer term retention. Tape does not substitute disk as primary storage. The LTO format has a published technology roadmap with future specifications.
What can LTO technology offer the video surveillance user?
W
hen utilized in a multi-tiered storage solution, an LTO tape library can be implemented as a cost effective, connected, long-term, highcapacity storage tier. End-users can manage their storage system and remain within budget as tape can provide a larger capacity storage tier and longer term retention for the same cost. This means end-users can compromise less on video quality and retention time by using tape. Every detail can be stored until users can determine later what should be kept. The utilization of tape to store video will not be best suited for all video surveillance applications. Multi-tiered storage works well with a high number of camera feeds which require extended storage retention at maximum quality. Data is transferred automatically between storage tiers based on predefined policies. The capacity of each
Notes: LTO roadmap correct as of April 2017. Camera storage calculations rounded to nearest whole day of storage. Assume constant 24hr/day recording. 1080p cameras 15fps recording 24hrs/day using H.264 compression. 4k cameras assumed to use H.265 compression with 32bit color representation.
Figure 5
SecurityLink India â– 1 July 2017
CMYK
53
CMYK
white paper
tier and policy governing data transfer total cost than all-disk or disk-cloud between them is typically based on hybrids. Using tape in a multi-tiered storage the likelihood of requiring the highest performance. For example, the most solution for long-term retention can recent video may be kept on the high- mean that rather than pushing data to est performing disk tiers in the initial the cloud for storage, users can retain 7-14 days post-recording when access full ownership and access to their data is most likely to be required. After this, for minimal cost. Cloud storage can be it is moved to a tape tier (at which point used as an effective storage tier, particuit is deemed unlikely to be required for larly in collating data from small camreview). However, the key point about era count multiple site installations, or as an offsite backup of a small amount this Onconfiguration Caught Tape, Now Keep It Secure is that data remains available through the VMS should re- of mission critical camera feeds. HowWhat can LTO technology offer the video surveillance user? ever, a storage astier viewutilized be required. In addition, anyanvideo When in a multi-tiered storage solution, LTO tape library canas be implemented a for high capacities cost effective, connected, long-term, high-capacity storage tier. End-users can manage their flagged up in a security or operational or long-term retention, often there are storage system and remain within budget as tape can provide a larger capacity storage tier and additional costs to cloud storage which eventterm ofretention interest may a means different longer for the samehave cost. This end-users can compromise less on video quality and retention time by using tape. Every detail can be stored until users can determine policy and may be retained for longer. reduce its viability; for example, high later what should be kept. Where events are required to be kept bandwidth costs, access and retrieval The utilization of tape to store video will not be best suited for all video surveillance applications. charges etc. Chain long term or works videowellevidence is used, a feeds Multi-tiered storage with a high number of camera which require extended of custody is also a storage maximum quality. Data is transferred automatically betweenas storage key concern there are often significopy retention may beat automatically transferred tiers based on pre-defined policies. The capacity of each tier and policy governing data transfer cant premiums a list price for to a particular tierbased or even to the between them is typically on the duplicated likelihood of requiring highest performance.beyond For example, most recent video may be kept on the highest performing disk tiers initial the use of ina the government (for example offsitethe storage. 7-14 days post-recording when access is most likely to be required. After this, it is moved to a secure data center. The approach well unlikely suitedtotobe systape tier (at which point it is is deemed required forCJIS) review).certified However, the key point this large configuration is that data remains available through the VMS should Total costreview of ownership (TCO) temsabout with capacity and retention be required. In addition, any video flagged up in a security or operational event of interest may analysis should be used in conjunction requirements forandvideo have a different policy may besurveillance. retained for longer. Where events are required to be kept long term or video evidence is used, a copy may be automatically transferred to a particular with performance analysis to make a Tape storage for high capacity, low tier or even duplicated to offsite storage. use and long-term retention used in purchase decision for storage. A balFigure 6 shows a simplistic example for video surveillance storage. combination with disk provides lower ance between cost and performance is Using tape in video surveillance storage - example Disk tier
28% total capacity
x 450 1080p cameras (15fps) x70 high performance surveillance grade HDD 280TB RAW
Disk tier stores 14 days worth of footage
Single file system connecting tiers
File based tape tier
72%
x120 LTO generation 7 cartridges 720TB RAW
Tape tier stores 36 days worth of footage
total capacity
Total capacity 1PB RAW
In total 50 days footage
Notes: 1PB: 1000TB total storage. 4TB RAW capacity/HDD; 6TB RAW capacity/LTO-7. 1080p cameras 15fps recording 24hrs/day using H.264 compression. Storage figures are approximate to demonstrate simplistic example. More than two tiers of storage can be utilized.
Figure 6
54
SecurityLink India â– 1 July 2017
CMYK
often necessary. In many scenarios the speed of data recall offered by a tape library is not sufficient and it should be discounted. Yet, for some users if they can trade off immediate, for near immediate access speeds to their oldest data, tape can bring high capacity, longterm retention storage, at price points they would otherwise have been unable to afford. Once the disk tier is configured further disk storage may only be required if additional bandwidth or camera streams are added. When only increasing the length of time data is retained building out capacity on tape can become even more economical as capacities scale. In one example of a TCO analysis, when maintaining a storage system over a decade the comparison between a LTO tape library, an all-disk and a disk-cloud hybrid solutions found that the TCO for the LTO library solution was nearly seven times lower than the all disk solution and over five times lower than a diskcloud hybrid solution. As an approximate cost comparison of individual media, a recent LTO technology cost audit found an average retail price of $0.02/GB RAW, for a LTO generation 7 cartridge. IHS Markit’s HDD market tracker estimates a typical enterprise grade HDD price at $0.06/ GB. Access all your recordings without leaving the VMS application. No need to think of tape as a separate archive. The use of tape storage in the video surveillance industry has suffered from several misconceptions. One of the most prominent ones is that a tape library is disconnected from the rest of the system. When tapes are used in a modern multi-tier storage configuration the tier is not disconnected and can be accessed through a single file system shared be-
CMYK
white paper
tween tiers. The file system is storage media agnostic and operates as ‘one drive.’ The tape tier will typically have slower performance than the disk storage tiers and this has caused problems with application access in the past. Some video management software (VMS) programs have search time-outs and if files cannot be found instantly may return errors or even move to a database repair mode which can impair performance. However, many current leading VMS programs are now directly able to access and control tape libraries with a plug-in. This enables users, without leaving their VMS application, access to a timeline of footage. A reference architecture and example workflow for the ‘batch pre-fetch’ plug-in is shown in Figure below. The batch pre-fetch plugin unlocks the full value of tape storage in a video surveillance solution as it enables the user of the chosen VMS application a simple workflow to tap into a huge data pool within the application. Providing users with all recorded video in one place could make a critical difference in forensic investigations and video analytics. Often, older recordings Caught On Tape, Now Keep It Secure stored in public cloud solutions and cold
store libraries cannot be accessed and controlled directly from a VMS application. In these cases, to achieve the same level of functionality, a VMS user or IT personnel may manually have to recall data and import to the VMS. The batch pre-fetch plugin alleviates the additional time and cost and retains the metadata to connect to the full files.
Use cases
T
he use of tape storage in a multitiered video surveillance environment has been successfully deployed in city surveillance projects, is popular with police departments to store both fixed video surveillance cameras and body worn camera video and has been deployed in the private sector. The concepts described here could be suited to any video surveillance application with extended retention requirements which face budget challenges. When choosing a video surveillance storage solution, analysis should go beyond basic capacity calculations. Integrators and end-users should assess how the usage and value of recorded footage can change over time and how retaining access to all data in a single
Reference architecture VMS Server Network
Single file system shared between storage tiers Highest capacity LTFS tape server
Highest performance disk recording server pre-defined amount of time
Most recent recording stored here
Small stub files retained on disk assist in locating archived footage (pre-fetched)
Batch pre-fetch plugin allows the user direct access and control of tape tier within the VMS application
older recording stored here
Full older recordings available for disk playback
Reviewing older footage workflow - stay in your VMS application
Request to view older footage in VMS
Figure 7
Specify times and cameras in VMS timeline
Batch pre-fetch recalls required files from tape back to disk for use
SecurityLink India ■ 1 July 2017
The batch pre-fetch plugin unlocks the full value of tape storage in a video surveillance solution as it enables the user of the chosen VMS application a simple workflow to tap into a huge data pool within the application. Providing users with all recorded video in one place could make a critical difference in forensic investigations and video analytics. Often, older recordings stored in public cloud solutions and cold store libraries cannot be accessed and controlled directly
CMYK
system can change the TCO analysis. Despite some misconceptions, tape as an element of a modern storage solution can provide some specific cost benefits when used to build out capacity for long-term retention.
Conclusion
T
he evolution of the video surveillance industry is causing a video surveillance data explosion. The multiple uses of cameras and lower prices mean there are now a greater number of video surveillance cameras entering the market than ever before. The greater number of cameras and higher specification new models are producing increasing amounts of data. The length of time this data is being retained for is also increasing. These factors have placed greater demands on storage systems and on budgets to be capable of securely retaining large amounts of video surveillance data for extended periods. The requirements of certain video surveillance environments for high capacity, long-term retention with infrequent recall of older footage mean file-based tape such as LTO technology paired with disk storage can provide an excellent value proposition as a video surveillance storage solution. LTO technology can offer users full access and control over their data with long-term retention and high reliability whilst keeping costs to a minimum. LTFS and the batch pre-fetch plugins, available for many leading VMS solutions, enable end-users to simply go back in time further within their preferred video management application, gaining valuable insights which may otherwise have been lost due to compromises on stored video quality or retention times. 55
CMYK
application/ case study
Bolstering Efficiency, Service and Next Generation 9-1-1 Readiness
Boston Police Selects NICE Solutions The first police department in the U.S. is now redefining what it means to be a technology leader
N
ICE has recently announced that the Boston Police Department (PD) will be deploying the full suite of NICE Inform solutions for quality assurance, multimedia incident reconstruction, and IP telephony and radio recording. The solutions will be deployed at three sites including its primary and backup 9-1-1 centers. The new technology will also support Boston’s EMS dispatch operations, which is co-located with the Police 9-1-1 center. The NICE solutions anchor on other technology investments that the Boston PD has made as it transitions to an IP-based, interoperable, next generation 9-1-1 (NG9-1-1) ready, public safety environment. “Our mission is to use innovative strategies and partnerships to protect and serve the citizens of Boston,” said Shawn Romanoski, Director of Telecommunications, Boston Police Department, “The work we’re doing with NICE to upgrade our 9-1-1 center technology is one way we’re accomplishing that. It’s also critical to our preparation for next generation 9-1-1.” NICE's certified direct integration with the Airbus DS VESTA® VoIP 9-11 system means that the Boston PD can reliably capture its IP-based emergency communications. It will begin accepting SMS 9-1-1 texts next year, and thanks to the new NICE technology, they’ll already be prepared to record and manage 56
these communications as well. “As the first police department in the U.S., the Boston Police Department enjoys a rich tradition of being a pioneer in policing and public safety,” said Christopher Wooten, Executive Vice President, NICE, “With their continued work with NICE, the Boston PD is now redefining what it means to be a leader by applying technology to improve service and solve everyday problems, while building a solid foundation for the future.”
“We’ll be far more automated from a QA perspective, and we’ll be able to complete evaluations and provide feedback much faster,” said Romanoski. Boston PD also plans to use NICE's screen recording, synchronized with voice recordings, to better understand what happens during calls. “It’s going to be a great tool for us for QA and training,” added Romanoski, “If something goes wrong, we’ll be able to understand why and correct it.”
Expediting records Boosting efficiency and requests quality assurance he Boston PD churns out
C
onsistent, ongoing quality assurance (QA) is vital to every public safety answering point (PSAP). The Boston PD will use NICE Inform evaluator to ensure that its telecommunicators are following proper protocols and that the systems they rely on are properly supporting them – so they can provide the highest levels of service to Boston’s residents and visitors. Like many police departments, the Boston PD performs QA reviews on telecommunicator calls today, but until now it has been a highly manual and subjective process. With NICE Inform evaluator, manual call selection will be replaced by automated call selection; and paper-based forms will be replaced by electronic scoring where evaluation results are automatically tabulated, tracked and shared. SecurityLink India ■ 1 July 2017
CMYK
T
about 6,000 records requests annually, for district attorneys, detectives, media and private citizens. NICE Inform will eliminate wasted time on duplicate requests. Records will be stored in Inform's electronic incident folders, cross-referenced to computer aided dispatch (CAD) incident IDs or court case numbers, so there will never be a need to do the same work twice. “With our old system, whenever we received a duplicate request, we would have to go back and recreate the entire incident recording all over again,” said Romanoski, “Once we create a scenario in Inform and save it, we can easily find and retrieve the original and provide an exact duplicate.” NICE is working with its partner Business Electronics (BEI) to deploy the NICE solutions at the Boston PD.
CMYK
application/ case study
Combating Theft & Liability Claims
Cash Saver Uses 3xLOGIC Video Surveillance Surveillance in three store locations definitely delivering solid ROI for Castle Retail Group
3
xLOGIC, Inc. has recently announced that Cash Saver stores, located in Memphis, TN, have installed 3xLOGIC NVRs and upwards to 120 cameras in three of its four store locations. Cash Saver is a cost plus food outlet, and promises a whole new way to save on groceries for Memphis. The company keeps the cost of operating its stores low with lower rent, no fancy décor, and less advertising. When Cash Saver began installing 3xLOGIC video surveillance, their main motivations were safety and curtailing losses. Since that time, Mark Gatlin, VP of Store Operations, has seen a lot more uses for his high-quality video images, “We’ve used the system many times to combat slip and fall claims. We’ve had car accidents, car break-ins; recently, we had a purse snatching, and we got a very good picture of the assailant.” Cash Saver has approximately 60 cameras at their largest location, the 24-
hour Madison Avenue store. Two other stores about one-third the size of the Madison flagship location have approximately 30 cameras each. All stores have 3xLOGIC V7000 NVRs recording 3MP and 6MP 360-degree surveillance 3xLOGIC cameras, as well as fixed cameras. Gatlin expects to install 3xLOGIC video surveillance in a fourth store in the near future. Areas under surveillance include outside parking lots and sidewalks and just about every area on the sales floors, storage rooms, food preparation areas, and more. Gatlin has two monitors of video feeds on his desk and he chooses which cameras to view. He pointed out that the system is good for thwarting false liability claims and providing evidence of wrongdoing, but it is also helpful in providing good customer service. “We had someone claiming that they bought six steaks, they left the store and then returned saying there were only two steaks in their bag. By checking the receipt time stamp and then looking at the corresponding video, we can see what actually happened, we don’t have to guess anymore.” Gatlin monitors video during his work SecurityLink India ■ 1 July 2017
CMYK
hours, and his assistant managers and co-managers use the system during other shifts. For this 24-hour grocery store, the 3xLOGIC system is definitely a force multiplier. “Another great aspect,” said Gatlin, “Is we’ve had false claims but also honest mistakes, at the end of the day when everybody watches the video, the conversation is over.” Gatlin can also be sitting at home relaxing, and he can pull up video feeds on his smart phone. “The image quality is very good, and when you show somebody the video and it pinpoints every action, it’s like having an unbiased eye witness,” continued Gatlin, “The stores only maintain video for a certain number of days, but if there is an incident, they burn a CD for their records and for sharing with law enforcement. We’ve cooperated with the police on upwards to a hundred different incidents.” Gatlin concluded, “When we bought the system, we took it on a try and buy basis, and after 13 months we were convinced we were seeing ROI every day, this system will pay dividends for years to come. We’re very pleased with our 3xLOGIC system.” 57
CMYK
application/ case study
Motorola and mm-lab
Drive Safety and Efficiency at Bosch’s Automotive Proving Ground in Boxberg, Germany
M
otorola Solutions and its partner mm-lab equip Bosch’s automotive proving ground in Boxberg, Germany, with the mm-lab Proving Ground Management System (PGMS) and Motorola’s LEX L10 Mission Critical LTE Handheld devices. The future-proof system integrates all proving ground management processes at Bosch for improving the safety and efficiency on the test tracks of the world’s largest supplier of automotive components. The rugged Motorola LEX L10 LTE handhelds provide best-in-class audio quality, voice clarity and echo cancel-
lation for enabling secure and reliable voice notification in the test vehicle as well as clear communication between ground operators and test drivers on the track. As soon as test drivers log on to the Android On-board Unit (OBU), they are identified by the mobile telephony ● Motorola LEX L10 mission critical LTE handhelds offer exceptional audio quality, performance, 4G LTE broadband connectivity and Android on-board unit support. ● New proving ground management system from mm-lab improves safety on test tracks while accurately tracking and analyzing all vehicle movements. ● The telematics solution can be adapted to the requirements of different Bosch proving grounds worldwide and fully integrated into existing infrastructure. service and added to all relevant user groups. The Motorola LEX L10 also connects the ground operators and test drivers to the private LTE network at Bosch’s proving grounds using highperformance broadband technology. “We see a growing demand for customised mobile applications that support companies like Bosch that are looking to meet highly dynamic requirements, where reliable communication through broadband networks is key,” said Mark Schmidl, Corporate Vice President of Sales for Motorola Solutions in Europe, Middle East and
58
SecurityLink India ■ 1 July 2017
CMYK
Africa, “Our Motorola LEX L10 mission critical LTE handhelds together with mm-lab’s proving ground management system enable Bosch to communicate with their test drivers on the proving ground at any time, thus optimising the test results for their customers and enhancing their own technology evolutions.” The mm-lab PGMS telematics solution monitors tracks, analyses all vehicle movements, and increases proving ground safety by providing audio-visual warning signals, for instance when one of the text drivers is driving in the wrong direction. The system also increases the efficiency of management processes used in administrative services, integrating text and voice communications and adding multiple applications such as access control for test tracks and the reception system at proving grounds. “With our PGMS telematics solution and the Motorola LEX L10 handhelds we provide Bosch with a future-leading system, which fulfils all requirements of the world’s leading automotive supplier,” said Michael Meiser, Managing Director at mm-lab, “The system can be adjusted to the individual needs of the different Bosch proving grounds worldwide, and is fully integrated into the existing infrastructure – from the barrier control to the accounting system.” In total, Bosch operates nine proving grounds on four continents, cov-
CMYK
application/ case study
ering all climate requirements for efficient testing and precision tuning of its customers’ vehicles. This includes a multitude of test tracks for all speeds, every incline, various amounts of tractions and the simulation of land or ice. Bosch’s proving ground at Boxberg, Germany, offers facilities including a high-speed oval, a driving-dynamics area, brake-measurement tracks and
handling courses for testing different driving conditions and driver assistance systems such as brake tests on various road surfaces, driving on rural roads, climbing/ downhill tracks with high gradients. “We were looking for an integrated system that supports all operations on our proving grounds,” said Michael Gromig, Managing Director of the
Bosch Test Center Boxberg, “Thanks to the new proving ground management system provided by mm-lab and Motorola Solutions, we have implemented a state-of-the-art solution that increases the safety of our test drivers, reduces administration and accelerates the smooth realisation of our processes. Customers and operators alike benefit from the new integrated system.”
Highways England to Deploy
Open Standards-based CCTV System O
NVIF®, the leading global standardisation initiative for IP-based physical security products, announced that Highways England has adopted an ONVIF-centric open standards approach to video technology for the continued expansion and management of its national highway CCTV and traffic system. The use of an open, standards-based CCTV system allows the national transport organisation to support existing CCTV cameras while providing a pathway for adding new, ONVIF Profile S conformant cameras from a variety of different vendors to the system. Highways England sought a standards-based approach for its CCTV and traffic system, which oversees motorways and major roads in England, in order to maximise the value of its bespoke CCTV cameras and to help keep tax payer-funded expenditures as low as possible. In addition to enabling continued control of existing CCTV assets and an incremental migration from legacy analog to IP, a standards-
based approach offers Highways England the ability to use new innovative CCTV technology as it appears in the general market. As part of the ONVIFcentric, open standards approach, Highways England will specify that any new cameras added to the CCTV system must be conformant to ONVIF Profile S, whilst recording shall conform to ONVIF Profile G. “Government entities and municipal councils are increasingly choosing to base their physical security infrastructure on open standards, like those established by ONVIF, in order to maintain a CCTV system that is vendor-neutral, flexible and future-proof,” said Jason Moss, Technical Director of Intelligent Transport for Mouchel, the consulting group assisting Highways England with its CCTV system, “This approach allows Highways England with help from its system integrator Costain to migrate to an open standards-based system incrementally as bespoke cameras reach their end of life and are replaced with ONVIF Profile S-conformant models SecurityLink India ■ 1 July 2017
CMYK
from different vendors with use-appropriate feature sets.” “This collaboration with Highways England is a valuable one because we are given the opportunity to work closely with an end user who is solving a very real problem shared by many organisations – the need to modernize their CCTV infrastructure without replacing their entire system,” said Per Björkdahl, Chair of the ONVIF Steering Committee, “An added benefit of the collaboration is that Costain has become an ONVIF member and will bring a valuable perspective to the work of ONVIF in the future.” Highways England and two other major stakeholders are also joining forces with ONVIF to establish standard interfaces that can be used to allow users of their legacy and future CCTV systems to safely and securely access each other’s images. This will provide a truly open standards-based approach and provide flexibility in vendor selection to Highways England operations for the future. 59
CMYK
application/ case study
Selects
Software Integrity Platform Securing Internet of Things (IoT) Devices
Dahua deploys Synopsys solutions to build security and quality into its software development lifecycle and supply chain
D
ahua Technology Co., Ltd. has recently announced its selection of Synopsys to enhance the security of its Internet of Things (IoT) devices and solutions. By implementing Synopsys’ comprehensive portfolio of solutions and services, Dahua strengthens its offerings, building security and quality into their software development lifecycle (SDLC) and supply chain. “We are committed to delivering our global customer base – from residential to enterprise – the highest quality and most secure Internet-connected devices,” said Fu Liquan, Chairman of Dahua Technology, “Synopsys’ comprehensive solutions and services allow
us to minimize software-related business risks by building security into the development process, which reduces the vulnerabilities that can jeopardize our products.” Dahua Technology has implemented Synopsys tools to address software security and quality issues throughout the SDLC using multiple technologies including static analysis, fuzz testing and software composition analysis. It has also joined the building security in maturity model (BSIMM) community and will undergo a BSIMM assessment, a comprehensive benchmarking process that provides an objective, data-driven view into its current software security
initiative. Using the BSIMM results, Dahua will establish a baseline measurement of its software security program, which will be used to guide its efforts to continuously improve the security and quality of its products over time. “As organizations introduce IoT devices into the market, it’s essential to ensure their security and protect customers’ data and privacy,” said Andreas Kuehlmann, Senior Vice President & General Manager for the Synopsys Software Integrity Group, “Dahua’s decision to engage with Synopsys highlights their commitment to provide their customers with IoT devices that incorporate the highest level of security.”
U.S. Department of Homeland Security Re-awards
DOMino Cybersecurity Contract to Raytheon Company to begin protecting government networks against advanced cyber threats
T
National Protection and Programs Directorate. “Raytheon stands ready to help protect the networks of more than 100 federal government departments and agencies,” said David C. Wajsgras, President of Raytheon Intelligence, Information and Services, “Our cuttingedge vulnerability testing, proactive threat hunting and remediation technologies will enable critical systems to
60
SecurityLink India ■ 1 July 2017
he U.S. Department of Homeland Security re-awarded the development, operations and maintenance contract, known as DOMino, to Raytheon. The IDIQ contract has a value of up to $1 billion over five years. Raytheon will be the prime contractor and systems integrator to help safeguard the .gov domain by providing design, development, operations and maintenance services in support of DHS’s
CMYK
be resilient in the face of ever increasing cyber-attacks.” Under the contract, Raytheon will help develop DHS’s next generation national cybersecurity protection system, delivering new and upgraded capabilities, including: ● Intrusion detection and prevention. ● Automation. ● Analytics. ● Information sharing.
CMYK
application/ case study
Portable Barriers to Protect Public Events Hoping to prevent deadly vehicle attacks such as those that have struck in London, New York City and France in recent months, the Fremont City Council approved spending more than $540,000 for 12 Delta portable barricades to protect public events including Festival of Arts
T
he barricades are intended to keep cars and trucks from driving onto roads and plazas where events such as the Fremont Festival of the Arts, Street Eats, Niles Antique Faire and Flea Market, and the Festival of India are held. Fremont Police Chief Richard Lucero said special events are an important part of a community’s fabric. “They provide an opportunity for people to come together in different ways than they do in their ordinary, dayto-day life and have a chance to connect,” he said, “In order for it to be effective, it’s got to be safe.” Lucero said the potential danger of cars driving into public gathering areas to kill and hurt people is “Very Real,” adding that the barricades are a ‘good, flexible way to be able to protect these venues cost efficiently.” A city staff report on the barricades purchase quoted a May report from the U.S. Transportation Security Administration that stated, “Terrorist organizations overseas have advocated conducting vehicle ramming attacks – using modified or unmodified motor vehicles On May 18, a woman was killed and 22 others injured in Manhattan when a man who police said was high on drugs drove his car through Times Square, hitting pedestrians before being stopped by a street barrier. Law enforcement authorities said that attack did not appear to be an act of terrorism.
– against crowds, buildings, and other vehicles.” Fremont will buy a dozen MP5000 model, 20-foot portable barricades from Palmdalebased Delta Scientific Corp. The barricades have a battery-operated road plate that can be lowered to allow emergency or police vehicles through when necessary. The cost is $543,330, according to the staff report.
Seen above is a digital rendering of the Delta Scientific Corp. MP5000 barricade, which Fremont will purchase 12 of to protect outdoor festivals and parades
On June 3, three men ran over pedestrians on London Bridge with a van, then got out and attacked other people near Borough Market with knives. Eight were killed that night and many others injured in the terrorist attack. The company says each barricade can be set up within 15 minutes and are lowered into place with hydraulic jacks. Although some vehicle incidents are the result of drivers experiencing a medical emergency while behind the wheel and losing control, Delta sales manager Jeremy Andrews said terrorist attacks are the primary reason such barricades are used at military bases, embassies, colleges and other organizations. “After 9/11, our business has grown tremendously,” Andrews added. Lucero said, “The purchase of barricades is simply about protecting the SecurityLink India ■ 1 July 2017
CMYK
people that are in the venue.” Andrews said the barricades can also be used quickly if an impromptu road closure is needed for repairs or police activity. The company plans to deliver the barricades before the Aug. 5 start of the Fremont Festival of the Arts. The report said, “The city also hopes the investment in city-owned barricading would help reduce the cost currently borne by event sponsors, helping encourage more community building events.” City staff will be working up a ‘comprehensive, permanent downtown barricading plan’ to present to the council later this year. Delta always keeps an inventory of the MP5000s for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. In many cases, they are needed for events that come up quickly such as politician or celebrity visits and other unexpected incidents. 61
CMYK
application/ case study
Providing Ground Electronic Intelligence Capabilities to a European Country Elbit Systems Awarded an Approximately $390 Million Contract to Provide an Array of Ground Electronic Intelligence Capabilities to a European Country
E
lbit Systems Ltd. recently announced that it was awarded a contract, in an amount of approximately $390 million, to supply an array of ground electronic intelligence capabilities to a European country. The contract, which includes various
intelligence capabilities, as well as communications and command and control solutions, will be performed over a threeyear period. Bezhalel (Butzi) Machlis, President and CEO of Elbit Systems said, “Our wide and synergetic range of capabilities
allows us to provide our customers with a unique and high quality solution, creating a force multiplier. As in other projects, we once again are providing the customer with a unique intelligence solution, based on cutting-edge technologies, operational know-how and experience.”
Contract for Secure Driver’s License Cards and Issuance Four Canadian Provinces Award New Contract to Gemalto for Secure Driver’s License Cards and Issuance
G
emalto has won four contracts to provide a new, highly-secure polycarbonate driver's license in New Brunswick, Newfoundland and Labrador, Nova Scotia and Prince Edward Island. The Atlantic Provinces sought a provider with a strong position as an innovative partner capable of producing laser-engraved polycarbonate in Canada, in order to bring their residents better identity protection through a more secure driver’s license. Gemalto will provide its Premium polycarbonate and help transition the provinces from an over-the-counter issuance process to secure central issuance. This not only enables the enhancement of the credential with the advanced, fraud and tamper-resistant security features only possible through central issuance, 62
but also creates a more efficient process for Registry of Motor Vehicle operators by eliminating on-site printing. In addition to the credential issuance itself, Gemalto will also implement a comprehensive enrollment solution that will include photo capture, digital signature pad, and a facial biometrics recognition system compliant with the latest International Civil Aviation Organization (ICAO) standards. This advanced, endto-end solution will streamline existing processes and provide a foundation for future supplemental technologies such as an electronic ID (eID) or digital driver's license (DDL). “The Atlantic Provinces had a strong, unified vision of what we wanted to achieve as a result of this contract and provider evaluation process,” said Paula SecurityLink India ■ 1 July 2017
CMYK
Biggar, Minister of Transportation, Infrastructure and Energy for Prince Edward Island, “We selected Gemalto because their broad experience and security capabilities can improve what we are doing today, and their innovations in technology will help us achieve what we want to do in the coming years.” “We are thrilled to be working with the Atlantic Provinces to create a new opportunity for residents to realize the benefit of the latest card security and durability with their new driver's license,” said Steve Purdy, Vice President of Government Programs in North America at Gemalto, “Moving to central issuance will bring efficiencies and improve the customer’s experience, both during enrolment and with the day-to-day use of their driver's license or ID card.”
CMYK
application/ case study
Movistar – TEMM Tower (MEXICO) The company implements SCATI video surveillance system in order to manage the security of its headquarters and other buildings all around the country
T
elefonica is a Spanish telecommunications company that provides service and support to more than 322 million customers in 21 countries, Mexico among them. The goal of the company is to facilitate communication between people, providing the most secure and advance technology in the market. With this philosophy, the security department chooses to establish a comprehensive video surveillance platform, able to guarantee permanent monitoring, with agile and efficient management from the control center; furthermore, an extended storage solution facilitates the analysis and the delivery of the information with quality in the shortest time possible.
Solution
T
he solution implemented by SCATI in the headquarters of Telefonica- Movistar in Mexico DF includes more than 200 recording platforms, located in different buildings all around the country. Its main goal is to develop a powerful video surveillance network with more than 3,000 cameras connected. This facility is managed with the SCATI tools: SCATI WACTHER, SCATI ROUND and SCATI WALL. They are all managed from Telefonica’s control center. The SCATI VISION recording platforms offer high avail-
ability and fault redundancy, and also a new point of view to mass storage needs with high-capacity and performance. This way, the management of the recording platforms is carried out through SCATI WATCHER, a solution that enables the operator to cover all possible needs such as viewing, equipment set-up, alarm management, advanced searches, map management, setting-up groups of devices etc. In the control center it also included a solution for professional monitoring of a large number of cameras. With SCATI WALL software the operator is able to implement scenarios and camera sequence settings, to operate PTZ cameras, to identify individuals thanks to the digital zoom, etc.
Advantages
T
hese solutions help to enhance the security level of the company, reducing risks and achieving savings in the control of losses. It also enables the company to fulfil diverse requirements with regards to storage capacity and quality of the recording systems. Thanks to the use of SCATI’s platform, the company made a great leap in video surveillance management, as the operator has quick access to every equipment. It also gives SecurityLink India ■ 1 July 2017
CMYK
the possibility to generate self-maintenance routines, that make possible a permanent monitoring, and therefore it is possible to program maintenance periods and to prevent errors thanks to automatic alerts. The combination of the different security elements needed to guarantee the comprehensive protection of the corporate buildings enables the availability of high-quality and highresolution images, in case something happens. SCATI video surveillance solution offers high-availability, data redundancy in case one disk fails and automatic failover capabilities. It is a security platform that enables the security department of the company to have an integrated solution that can be handled by a control center – a fully scalable solution that could support the development of the security facility as the corporative building needs change. The integral management of all the security elements not only facilitates growth and easy adaptation to future needs, it also means savings in costs and therefore a profitable solution. With this system, able to manage and monitor the video surveillance recording systems, the company guarantees the protection of the different buildings where thousands of people work every day, not only employees but also clients and visitors. 63
CMYK
application/ case study
Proxim Wireless at Tranvía de Tenerife Celebrating a Decade of Mobile Connectivity
P
roxim Wireless Corporation has recently announced the ten year anniversary of connectivity for the Tenerife Tram Network. Located in the Canary Islands, Spain, the Tenerife Tram, is a light rail/ tram system that runs across the main Island of Tenerife, passing through underground tunnels and along high-speed expressways and winding around corners and densely populated localities on the Island. Since the commencement of the tram service in 2007, Proxim’s high performance Tsunami® point to multipoint mobile network solutions have off loaded live feeds from HD cameras deployed along the rail track and in the vehicles to the local NOC and security center. The deployment takes advantage of Proxim FastConnect® – Proxim’s advanced mobility technology, WORP® – wireless outdoor routing protocol for guaranteed QoS and triple play application support, and Proxim ClearConnect® – suite of dynamic and adaptive, interference mitigation radio frequency technologies. The deployment includes 63 Tsuna® mi base stations along the 16 km track and 25 subscriber stations, transmitting video feeds from the onboard surveillance cameras in the vehicles to the base station units deployed trackside. “I am glad to announce that in the last ten years we have seen no significant downtimes in the network. Proxim’s solution just performed seamlessly – consistent speeds at all times,” said Pablo Martín, IT Director, Tenerife Tram, “Our security teams are able to view high quality video feeds from all the cameras con64
nected via Proxim’s Tsunami® radios.” “Ten years of operations for a complex deployment such as this proves our commitment to high performance and reliability,” said Greg Marzullo, CEO and President, Proxim Wireless, “We at Proxim are dedicated to offering maximum value to our customers, and will
continue to offer reliable solutions designed for mission critical applications such as the Tenerife Tram. In an era of disposable technology our customers understand that when performance matters, Proxim is the best choice for long term reliability and return on your investment.”
New X-Series LED Displays Bringing Better Quality, Easier Installation to Indoor Applications
Indoor applications are particularly sensitive to quality Barco’s new X-series LED displays offer providers in that sector a powerful combination of superior quality, easier installation and enhanced reliability
T
hrough a combination of product upgrades, innovative technology and superior design, the new X-series displays from Barco meet a number of
SecurityLink India ■ 1 July 2017
CMYK
key requirements in the indoor display market. Suppliers of museums, houses of worship, retail, airports and control rooms can now call on superior tearfree images, easier installation and enhanced reliability backed by a new three-year warranty. “We really went back to basics in terms of what suppliers need in terms of outcome in 2017,” says Wim Buyens, Senior VP - General Manager Entertainment, “Image quality was obviously top of the list, but we also reduced the number of panels required to create a great effect and ensured that the panels will be as impressive years from now – a key benefit when
CMYK
application/ case study
looking at the total cost of ownership.”
Tear-free images thanks to InfinipixTM
S
uperior image quality is obviously a key element in indoor displays, as it guarantees the ‘wow’ factor. But how the image is processed can really affect the overall impression. ‘Tears,’ when the image jars, are incredibly disruptive to the viewing experience as they pull the audience out of the story being told. They are also catastrophic in a broadcast backdrop. Barco’s new Infinipix technology ensures smooth images – even when multiple
panels or image sources are involved. Infinipix effectively creates a second ‘redundant’ data path to ensure all the LEDs receive the signals no matter what happens. What’s more, the X series comes in a range of four pixel pitches – 1.29, 1.58, 2.5 and 4mm to match just about any use.
Reliability means peace of mind
W
hat today’s users need is not just another LED tile. To be competitive, they require a direct view LED display system that offers superior qual-
ity and can be used and maintained for multiple years and that keeps delivering the best image quality. So Barco’s new X-series could not come at a better time, as it brings them: ● Unique calibration for constant image quality. ● 2 data paths to eliminate the risk of image tears. ● Accurate colors under every conditions. ● 44% larger tile size (480x480) for fewer seams and fewer tiles to install. ● A 3-year warranty – extendible to 5 years.
& Enhance Smart Lock Security with Mobile Convenience G
emalto is enabling security and reliable connectivity for Dessmann’s new smart lock platform. The new solution from the global manufacturer of smart locks and safe boxes incorporates Gemalto’s Machine Identification Modules (MIM) and Secure Elements (SE), empowering users to lock and unlock doors with their smartphones or create digital key chains for multiple locks. The solution provides increased security compared to traditional locks. The mobile app can be used to create spare or temporary virtual keys remotely and can simplify shared accommodation services. For instance, it is able to track and monitor who unlocked a door recently. The application also sends instant notifications if a door is forced and can automatically trigger the lock’s built-in alarm. The smart lock market is likely to expand rapidly over the next few years. According to Transparency Market Re-
search, its compound annual growth rate is estimated to reach up to 18.3%, leading to a substantial increase in market value, from US$226.7 million in 2016 to US$1.01 billion by 2024. Fuelled by rising standards of living and increased awareness regarding physical security and safety, the Asia Pacific region is fast becoming an important market for the smart lock industry. “Security is at the heart of any innovative smart lock technology and remains important for us. We are constantly on the lookout for complementary technology that enhances the security of our products and services.” said ZHU Zhiling, CEO of Dessmann, “Gemalto has a catalogue of solutions and expertise we need for our new smart lock. Its ability SecurityLink India ■ 1 July 2017
CMYK
to deliver end-to-end security solutions as well as a roadmap to future IoT-optimized connectivity like LTE Cat NB-IoT instantly won us over.” “The world is turning digital at an unprecedented pace, with smart homes quickly emerging as the new cornerstone of connected living. We are expecting connected smart locks to become a natural part of people’s everyday life in the near future,” said Suzanne Tong-Li, Senior Vice President of Greater China and Korea for Mobiles Services and IoT, Gemalto, “Our complete suite of secure IoT solutions and services help manufacturers achieve the highest level of trust for consumers, which is essential for services like virtual keys.” 65
CMYK
feature
By Malcolm Cooper – Analyst, MitKat
R
ecently there have been several policies, simulations, active designing and implementation of smart city concepts in several locations around the world including India. Today, the world is talking about connecting everything to the internet. The fourth industrial revolution (Industry 4.0), a term used to draw together cyber-physical systems, the Internet Services and Internet of Things (IoT), has started to revolutionize projects such as smart grids and smart cities.
66
Critical Infrastructure Security and Smart Cities There is no universally accepted definition of a smart city, with different schools of thoughts describing this concept in terms of annotations depending on their geographical scope, location and socio economic settings. Faced with rapid urbanization, city planners are turning to technology to solve a wide range of problems associated with modern cities. To provide for the aspirations and needs of the citizens, urban planners ideally aim at developing the entire urban eco-system, which is represented by the four pillars of comprehensive development – institutional, physical, social and economic infrastructure. This can be a long-term goal and cities can work towards developing such comprehensive infrastructure incrementally, adding on layers of ‘smartness.’ Ideally the planning of a smart city originates from the end user. The needs of the end user are assimilated in a systematic manner and are then distributed into several smart layers such as transportation, energy, utilities, finance, social, and logistics, amongst others. A true smart city is networked in such a manner that there is a balance between sustainable socio economic growth and urbanization. There are several examples of successful smart cities in the world such as San Diego in southern California and Glasgow in Scotland. The above illustrations show a few aspects of steps required to convert a city into a smart city. There are also sevSecurityLink India ■ 1 July 2017
CMYK
eral aspects of smart cities that are directly related to critical information systems and critical infrastructure. These components directly connect an end user to the service provider in terms of information display and service availability. For example, an end user can directly monitor the usage of piped gas from a mobile application; at the same time sensors in a house detect motion and usage, and the service can be cut off in case no one occupies the premise. This close networked platform is usually achieved through machine to machine communication (M2M) or an IoT platform. So how do we define these critical infrastructure platforms? Critical infrastructures are usually divided into physical and socio-economic infrastructure systems. Physical critical infrastructure encompasses all basic services such as electricity and water supply, waste (water) management, transport or information and telecommunication technologies. Socio-economic infrastructures instead include facilities such as banks, hospitals and schools but also public administration. Critical infrastructure is also a term used by governments to describe assets that are essential to the functioning of the society and economy. Future cities will challenge existing safety and security engineering models e.g., the United States electricity blackout in 2003 showed that in interdependent networks a very small failure in one network might
CMYK
feature
lead to catastrophic consequences. New and complex cascading failure modes will arise out of unforeseen or emergent system characteristics as they are developed in an incremental and ad hoc fashion, especially where more sophisticated technologies are added to an already ageing physical infrastructure. A common concept between smart cities and critical infrastructure is cyber physical systems with city as the platform or (CPS). There are a number of definitions of CPS. Common features effectively describe control systems, networked and/ or distributed, incorporating a degree of intelligence (adaptive or predictive), and work in real time to influence outcomes in the real world. These definitions point to the diverse nature of CPS found in transportation, utilities, buildings, infrastructure, manufacturing, and health care. Although CPS have similarities with traditional data processing systems e.g., their networked or distributed nature and a degree of automation, the real-time nature of their interactions with the physical world is a significant difference. Interactions are sensors detecting and measuring physical parameters with actuators to control physical processes. Feedback loops allow data about the environment and the physical processes to be collected and computed. Actuation may be automatic or by an alert to a human operator. Critical infrastructure systems are CPS, whose failure would have economic or social impact. Society expects systems will operate in a safe, secure and consistent manner. In response to environmental, demographic and societal pressures, cities may no longer conduct business as usual. Traditional city models are no longer appropriate, as transport and utility infrastructures become unsustainable and require significant investment.
Some cities have embraced the concept of the ‘city as a platform,’ a hyperconnected urban environment that harnesses the network effects, openness, and agility of the real-time web. The focus has been on access to data, leading to development of smartphone apps and portals allowing citizens to ‘connect’ with city services and institutions. To address cyber security requirements, we need to understand the proliferation of functions in this hyperconnected world. Where functions in individual CPS interact, they will create new functions that will proliferate over time. To protect these complex systems, we need to understand their network of functions, relationships and interdependencies. A study of critical infrastructure interdependencies led to the identification of six dimensions, which can be used to examine CPS and supporting infrastructures: ● Type of interdependency e.g., cyber, physical, logical or geographic. ● Environment e.g., business, economic, public policy, legal, regulatory, security, technical, health/ safety, or social/ political. ● Coupling and response behavior e.g., adaptive, inflexible, loose/tight or linear/ complex. ● Infrastructure characteristics e.g., spatial, operational, organizational or temporal.
● Type of failure e.g., common cause, escalating or cascading. ● State of operation e.g., normal, stressed/ disrupted, restoration or repair. Identifying critical city infrastructure in every smart city project is of prime importance. Whilst there are a number of definitions for critical national infrastructure, from a city perspective the concept of critical infrastructure is not well defined. The UK’s definition of critical national infrastructure (CNI) is: “Those facilities, systems, sites and networks necessary for the functioning of the country and the delivery of the essential services upon which daily life in the UK depends;” where criticality is determined based on a criticality scale, which assesses impact of events or scenarios on a national scale. From a city perspective, the criticality addresses elements necessary for the delivery of essential services to the populace who are resident and/ or work in the city, and their impact is focused at city rather than national level. The critical infrastructure must encompass both the city’s normal operating state, and its ability to effectively respond to natural or other disasters. The definition of a city’s critical infrastructure translates the principles underlying criticality at a national level to apply them at a city level based on four factors: ● The impact on delivery of essential
Element
Relevance to cyber–physical systems
Confidentiality
Protection of personal and other sensitive data
Possession/Control
Prevent unauthorized manipulation or control of systems
Integrity
Prevention of unauthorized changes to or deletion of data, and maintenance of system configuration
Authenticity
Prevention of fraud or tampering with data
Availability
City infrastructure able to operate without disruption or impairment
Utility
Maintaining data and systems in a useful state throughout their lifecycle
Safety
Prevention of harm to individuals, assets and the environment
SecurityLink India ■ 1 July 2017
CMYK
67
CMYK
feature
societal functions and services e.g., to provide water, food and shelter, and to maintain law and order. ● The economic impact on the well-being and viability of the city e.g., the ability to operate as a business and financial center and provide employment. ● The impact on life, health and wellbeing of city occupants e.g., to provide medical and social services to protect and care for citizens. ● The ability to respond to major incidents or disasters e.g., to provide emergency services including sites to manage emergency operations and to provide housing in the event of a disaster. The future city will be a complex environment comprising a variety of technologies, existing and emerging. The cyber security approach may vary considerably, depending on factors such as assets and systems complexity, ownership and use. An application of these elements may be seen in the table given in the previous page. With the increasing sophistication and integration of city systems and the need to protect their growing populations, there is a need for city planners to consider risk, resilience, asset security and cyber security in a holistic manner. An analysis framework needs to be constructed holistically for each individual system. The below frame work was tested on the CCTV and area management systems in the United Kingdom. The approach used to test the 68
framework was to identify the set of affected systems, which included a number of control rooms. The context and role of the control rooms was examined, including the relationships between the areas of coverage. The resilience requirements were investigated, taking into account the need to manage major annual events and public safety incidents. Finally, the cyber security requirements and current systems issues were investigated. In collating the results a number of deficiencies were identified including a significant loss of capability following a system upgrade. The discovery of this loss and the rapid advances in the technology employed in ‘smart’ cities confirmed the need for regular reviews, to monitor changes in systems and infrastructure, and identify new dependencies and emergent functionality arising from systems integration or interconnectivity. The smart city infrastructure will ultimately hook on to the ICS (Industrial Control Systems) database and Operations Technology (OT) infrastructure for a multiple flow of information. ICSs, which are a part of the OT environment in industrial enterprises, encompass several types of control systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCSs), and other smaller con-
trol system configurations such as programmable logic controllers (PLCs), remote terminal units (RTUs), intelligent electronic devices (IEDs) and other field devices. ICSs were originally designed to increase performance, reliability and safety by reducing manual effort. Security was achieved by physical isolation, or a so-called air gap (security by obscurity). It is only a matter of time before a lot of ICS information is routed to sophisticated applications across enterprises through a wide area network where security by obscurity no longer offers valid protection. Governments plan to connect ICSs to the Internet for projects such as smart grids and smart cities, which will significantly increase the risk of intrusion from malicious actors and ultimately affect these grids and cities.
Conclusion
T
he expectation of future cities is that the information and communications technologies, autonomy and CPS will be harnessed to deliver a safe, secure and sustainable environment for their rapidly growing populations. This dependence on technology is not without significant risk as the complex CPS that are already being developed will increasingly interact with each other. When the systems start to behave as a platform, the city becomes exposed to cascading failure modes, where apparently unrelated events may cause significant disruption or even loss of life. A consolidated frame work analysis, testing, simulations and subsequent contingency infrastructure can effectively mitigate these risks. About the Author Malcolm Cooper is an ex Naval Aviation Officer and has also worked in the technical consulting space. He is currently an Analyst at MitKat Advisory Service’s Information Services and Consulting Team.
SecurityLink India ■ 1 July 2017
CMYK
CMYK
feature
Change Approach to Vulnerability Management S
kybox™ Security has announced the availability of threat-centric vulnerability management (TCVM) for the Skybox™ Security Suite, signalling a fundamental shift in the approach to managing and prioritizing vulnerabilities. TCVM changes vulnerability management from an exercise of trying to patch ‘everything all the time’ to focused, intelligent action that considers real-world threats. TCVM does this by correlating multiple factors to determine vulnerability risk, including: ● The context of an organization’s environment such as potential attack paths and security controls in place, each asset’s exposure and importance to the business, and details of existing vulnerabilities. ● Intelligence on vulnerabilities being exploited in the wild. With the prioritization center in Skybox™ vulnerability control, security leaders can automatically analyze the thousands, even millions of vulnerabilities in their environment (including cloud and virtual) to pinpoint those that are truly putting their organization at risk. This means narrowing a huge volume of ‘known’ vulnerabilities that are potential threats down to a small, manageable number. They are identified as imminent threats known to be exploited in the wild. In addition, TCVM enables a systematic approach for ongoing, gradual risk reduction of potential threats that could escalate in the future. Skybox TCVM leverages ongoing intelligence of the active threat landscape produced by the Skybox™ research lab. The lab aggregates information from more than 30 security data feeds along with research of exploits available on more than 700,000 dark web sites and
validated by Skybox’s security analysts. For example, Skybox analysts have been closely monitoring three major event categories impacting organizations today – the use of a specific, commercialized set of exploit kits, the rise of targeted client-side vulnerabilities, and the continued popularity of Internet of Things (IoT) botnets. ● A small, targeted number of exploit kits are dominating the dark web. In the first part of this year, five major exploits kits dominated chatter on the dark web, targeting nearly 70 vulnerabilities in Firefox, Adobe Flash, Microsoft Internet Explorer and Edge, Java, Microsoft XML Services and more. These vulnerabilities are known to distribute different malware as payload – for example, popular ransom ware and banking trojans. ● Threat actors continue to target specific vulnerabilities included in exploit dumps by hacker groups such as The Shadow Brokers. The group, notorious for allegedly leaking the National Security Agency (NSA)’s hacking tools, continues to pepper the dark web with exploit dumps like the major one on April 14 that contained many OS and server-side exploits. These dumps and targeted vulnerabilities impact web apps built with Apache Struts plus VMware, Cisco, Oracle and Microsoft products, to name just a few. ● Poor IoT security is still vulnerable. Botnets are exploiting vulnerabilities in network devices, gateways, cameras and other internet-connected devices, delivering distributed denial of service (DDoS) attacks through things like the ‘HTTP Port 81 BotSecurityLink India ■ 1 July 2017
CMYK
net’ and the Amnesia botnet which is the next generation of Mirai malware after source code was published and shared online. “Security leaders understand that the threat landscape is always changing. The difference now is that we’re seeing the growth of an increasingly commercialized cybercrime market. This is making it easier than ever for threat actors to attack, adjust and attack again until they accomplish their objective,” said Skybox CEO, Gidi Cohen, “They tend to aim for the easy targets – and the biggest ROI – by exploiting a surprisingly small number of vulnerabilities, many of which current vulnerability management approaches don’t consider as priorities. This has to change. Security leaders have to be smarter and way more targeted in their approach – aligning it to what’s happening in the real world – if they are to stay ahead of cybercriminals.” Skybox TCVM makes focused action possible by combining attack surface visibility, threat-centric vulnerability intelligence, and attack vector analytics to identify and prioritize an organization's biggest risks according to vulnerabilities known to: ● Exist and are exposed in the network. ● Be actively exploited in the wild; or known to be attacked within a specific industry or geography. ● Have an exploit available, but are not known to be part of an active exploit campaign. ● Exist but are not exposed in the network. Threat-centric approaches to vulnerability management require the use of multiple technologies using several different types of security analytics. 69
CMYK
feature
How to know
Access Control in The Cloud is Secure? A
ccess Control as a Service (ACaaS) has grown into a mainstream product offering from many access control manufacturers, and it is gaining significant growth in the market. With the adoption of this technology, end users and integrators need to ask several pertinent questions. It is extremely important to understand the security of the communications, the quality of service, who the provider of the cloud service is, the redundancy of the servers, disaster recovery, scalability of the platform, and finally the stability and availability of the service. With this information end users and system integrators can make a sound decision on which product to select and if the provider can be trusted to deliver the critical action of physically opening and closing doors successfully. At ISONAS we take each of these issues very seriously and have worked tirelessly to provide the most transpar-
70
ent service to a customer while leading the industry in security and scalability. When selecting an Access Control as a Service provider, we recommend looking for the following best practices to ensure clarity in the decision making process.
1. Overall structure
W
here is the platform hosted? Amazon Web Services has created a business solely around hosting services. ISONAS Pure Access Cloud is hosted on a complex structure within Amazon Web Services. We chose AWS because of their best in class cyber security infrastructure and their extensive global flexibility in hosting and deployment of Pure Access.
2. Perimeter security
D
oes the platform have perimeter security? Typical first line of de-
SecurityLink India â– 1 July 2017
CMYK
fense is through the firewall that can deny or allow traffic. Networks should be surrounded by firewalls and reverse proxy units, which protect the systems within. Intrusion detection and prevention measures should be set up to alert and mitigate potential risks before they can get into the network. All perimeter security logs should be reviewed daily as well as alerting on key terms for a rapid response to threats. At ISONAS, we measure and monitor 430 individual metrics 24/7 with real time alerting to our technical team and we use an industry leading service to provide this comprehensive level of IT infrastructure.
3. Internal security
H
ow the cloud provider manages their internal systems is a good reflection on how they manage additional systems and will prevent another avenue for an attack. Systems should be under a network access control layer as well as local firewalls limiting only the required ports for operation to be active, and only responsive to specified networks. As a second layer of protection, host intrusion detection and prevention act as a threat reduction as well as Antivirus and Malware mitigation. Internal team access to systems should be group based and only granted on an as needed basis via a secure password manager portal where access can be granted and revoked at any time.
CMYK
feature
4. Encryption
O
ne of the most basic pieces of security is ensuring the web application has an SSL (Secure Sockets Layer). An SSL establishes an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private. Pure Access Cloud utilizes SSL encryption governed by the reverse proxy. Even the passwords used by the web servers to access the database are encrypted to mitigate against data leakage. Automated file watchers keep a close eye on configuration details in the servers to ensure no access is granted without administration approval. All information on ISONAS hardware is encrypted using AES-256 bit algorithms. Communication between Pure Access Cloud and each connected access point can also be AES 256 bit encrypted.
5. Data protection
T
he worst time to find out backups didn’t work is when you need them the most so employing backups and snap shots of the database is vital. This will ensure that data cannot be lost due to failure or even accidental deletion. All recovery methods should also be tested on a regular basis to ensure that restore and recovery is fast and accurate if required.
6. Testing
A
ll products should undergo thorough and rigorous automated and manual testing to ensure that the product that is placed in front of customers is stable without issue. ISONAS utilizes 3rd party penetration testing on a regular basis to subject our systems and configurations to the highest level of cyber security standards.
7. Monitoring
A
ll systems should be monitored heavily. A good practice here at ISONAS is that each server has up to 30 points monitored from services to configuration files to up/ down time. Ports are monitored as well as web services. Our services are monitored by Selenium style scripts that not only see if the web services are up but actually log in and click links and log out measuring the performance of the services. These checks are done every 5 minutes from locations in the US and internationally as well as internal network monitors.
8. Redundancy and load balancing
A
s systems scale and grow, there is risk that traffic to the platform could create performance issues, therefore the ability to load balance information is critical to preventing an overload. Systems should be redundantly load balanced using affinity in the virtual IP configuration to ensure a seamless customer experience. In addition, applications should be stateless and share cache information so if a system stops responding the customer will not be affected and it can be repaired without downtime being a factor.
to handle all facets of the support process from the customer to SaaS application. At ISONAS, security is taken seriously. The patented Pure IP hardware products from ISONAS offer a technologically advanced solution that eliminates the panel in access control. Their platform requires the Pure IP RC-04 reader-controller and a category 5 cable to drive data and power to the edge and open and close doors. The combination of their revolutionary hardware and world class software application, Pure Access Cloud, provide customers the ability to scale rapidly and secure their building for less. With the industry leading cloud application and Pure IP hardware along with their technical expertise in SaaS deployment, they have created a product and infrastructure that is extremely easy to use, administer, and manage from any device in any location in the world. When combined with the security, availability, testing, monitoring, redundancy and support there is simply no better choice in the market.
9. Support philosophy
I
s there a support program and team in place to assist if there are issues? Here at ISONAS we don’t believe in traditional tech departments where there are separate network, server, security, cloud and support teams. We fundamentally believe that a rapidly scaling business and application needs a team that can manage all systems, anytime and anywhere. Our team is empowered and trained SecurityLink India ■ 1 July 2017
CMYK
Authored by Robert Lydic Global VP of Sales, ISONAS 71
CMYK
International Updates
e-Document Physical Security Certification Initiative T he Secure Identity Alliance (SIA), the global identity and secure eServices advisory body, announces the launch of a new initiative to help issuers and manufacturers evaluate the integrity and effectiveness of current and planned secure e-Document physical security design features. With the current lack of a formal, industry-recognized evaluation process for design, this certification initiative will see the development of a much-needed ‘common criteria-like’ approach to the development of security features for passports, identity cards, driving licences and similar identity-based e-Documents.
The security risk-based scheme will analyse a wide variety of factors. It will identify threats, create different protection profiles based on the specific document, and evaluate effectiveness against detailed criteria. It will assess how widely security features are distributed across different parts of the document and the overall security design of the document. The results will enable issuers and manufacturers to identify potential gaps, streamline their planning and development processes, and ensure the highest levels of document security. “The integrity of today’s e-Documents is an issue at the very heart of gov-
ernment strategies to identify and protect its citizens,” says Frederic Trojani, Chairman of the Board, “As it stands today, and without a common and formal evaluation scheme, issuers risk long development cycles and potential exploitable gaps in eDocument security. Having established a clear need for consistency and maximum security, the initiative will provide considerable support throughout the design and manufacturing process. “I call on all organizations responsible for the development of e-Documents to join the scheme to help us build a truly effective and common reference scheme.”
Integrating ACTEnterprise & Eventys F
ollowing the recent acquisition of Dublin-based company ACT, one of Vanderbilt’s latest product offerings blends access control and video together – ACTEnterprise access control software, now supports integration with Eventys EX network video recorders (NVRs). Eventys NVRs offer methodical video recording of up to 16 IP cameras. Now, thanks to ACTEnterprise, cameras connected to an Eventys EX NVR can
72
be associated with access control doors, making the security solution’s rewards considerable. Vanderbilt believes this blend of access control and video surveillance will make the day-to-day management of multiple security systems more efficient. This is because it minimizes the use of different systems for different tasks by combining operations in a single interface. Information is structured in one place therefore improving situational awareness. The integration also improves response times as the single system interface makes monitoring alarms and events more effective and efficient. The combination of both products also provides greater monitoring capabilities by SecurityLink India ■ 1 July 2017
CMYK
linking the live video to real-time access logs. For example, this feature enables users to see who has badged at the door to get in but has been denied access. If someone attempts to use an inactive tag to gain access to a restricted area, an alert is triggered by ACTEnterprise and the Eventys cameras will record who was at the door trying to badge through. Up to 500 Eventys EX NVRs and 4000 IP cameras can be connected to ACTEnterprise without the need for an additional PC or a server. In applications that include Eventys EX NVRs, ACTEnterprise software fully integrates the NVRs into the access control system, which makes verifying alarm events very easy.
CMYK
International Updates
Study
Trusted Identities
Bridging Gap Between Connected Workers & Smart Buildings
A
recent study conducted by IF-
hanced monitoring and a better user
• 51 percent of respondents have
SEC Global reveals how trusted
experience as people enter and move
already integrated time and at-
identities can serve as the backbone
around buildings, access various sys-
tendance systems.
for smart buildings and today’s con-
tems and consume building services.
• 45 percent cite asset tracking as
nected workforce. Sponsored by HID
According to the report, 85 per-
the most likely system to be inte-
Global, the access control study on
cent of respondents are aware that
the connected workplace explores
identities can be connected across
• System integration can also be
the trends in smart buildings and the
multiple systems and devices, and
a trigger for access control up-
increasingly important need for iden-
more than 60 percent believe that
grades – at least 40 percent cited
tity-aware building systems that of-
having everything on one ID card or
converged physical and logical ac-
fer greater convenience, security and
mobile device will provide operational
cess as a decision factor.
productivity.
efficiencies. More than half have al-
• Other top upgrade triggers include
“Most respondents want more
ready connected their building sys-
enhanced security (65 percent),
integrated smart buildings and busi-
tems to access control applications,
multi-factor
ness applications that seamlessly
and converging systems can even be
percent), and multiple ID form fac-
work together. While many of them
a factor in deciding to upgrade the
tors such as mobile devices and
are realizing these benefits by using
access control infrastructure.
cards (41 percent).
grated in the future.
authentication
(46
common management frameworks
Top applications include integrat-
• Two-thirds of respondents believe
with centralized databases, this ap-
ed logical access, AV conferencing,
that IT and facilities/ security man-
proach is generally quite expensive,”
elevators, secure print, locks for inte-
agement teams need to work to-
said Ashish Malpani, Director of Prod-
rior draws and racks and HVAC con-
gether more closely when buying,
uct Marketing with HID Global, “The
trol. Other key findings include:
installing and using new technolo-
study reveals how trusted IDs offer a
• 63 percent define their building as
gies.
viable alternative for achieving a con-
‘smart’ to at least some degree, a
Another finding from the IFSEC
nected building at lower cost, better
13 percent increase as compared
Global study is the growing aware-
ROI and improved user experience –
to a 2016 IFSEC Global report on
ness of the Internet of Things (IoT),
all by providing systems with knowl-
smart buildings.
with 86 percent of respondents either
edge of identities and their authoriza-
• 60 percent of access control sys-
‘very aware’ or ‘modestly aware’ of
tions for access to elevators, parking
tems are already integrated with
the IoT. For a more connected work-
garages, vending machines, printers
other buildings systems.
place, trusted IDs can help organiza-
• Roughly the same percentage
tions take a first step towards inte-
IFSEC Global’s study focused on
believe that system integration is
grating building systems by securing,
how the access control infrastructure
hugely beneficial for user conveni-
customizing and enhancing IoT ap-
combined with trusted identities can
ence while adding value to existing
plications that help connect people,
connect disparate systems for en-
systems.
places and things.
and other systems.”
SecurityLink India ■ 1 July 2017
CMYK
73
CMYK
International Updates
Dahua International Academy, Poland D
ahua Technology has established the first Dahua International Academy in Poland in May 2017 for both internal and external trainings. The academy aims to provide comprehensive and systematic trainings to Dahua local employees and customers to let them acquire deep understanding of Dahua products & solutions, local storage & logistics capability, as well as access to technical support services in local market. Dahua Poland Academy covers all the training programs in Central & Eastern Europe and Nordic regarding
Courses held by Dahua Poland Academy
company information, sales & marketing strategy, channel policy, products & solutions and so on. So far, it has successfully held two sessions of ex-
Some Comments from Dahua Customers
The Finnish Group of 16 People during Training
74
SecurityLink India ■ 1 July 2017
CMYK
ternal trainings, attended by customers from countries such as Czech Republic, Hungary, Croatia, Romania, Norway and Sweden. Training to a group of 16 people from Finland highlighted the initial stage of this academy. Dahua Poland Academy is scheduled to hold one training every month. Customers and employees from Central & Eastern Europe and Nordic are welcome to register for attendance. In future, they will constantly adjust the courses to better deliver the targeted information to the attendees, which mostly are Dahua customers. Dahua International Academy is not only a way of showcasing Dahua leadership in global security surveillance industry, it serves the purposes of enhancing customer adhesiveness and further promote localization progress in Central & Eastern Europe and Nordic. Customers in the region highly recognized the Academy and expressed their gratitude to the strong support from it. With a mission to build a safer society and promote smarter living, Dahua continues to focus on ‘Innovation, Quality and Service’ to serve partners and customers all around the world.
CMYK
International Updates
Smart City Device Shipments to Top One Billion by 2026 By Pablo Tomasi, Senior Analyst, Smart Cities and IoT, IHS Markit
T
he smart city market can be observed through various lenses; however, through all of them, fragmentation is the current state: The smart city market continues to grow, presenting great opportunities for all players, despite its current fragmented state. This fragmentation appears in the type of smart city projects developed, in the technology, in the ecosystem, and in the solutions. Smart cities are home to many projects with diverse scopes and sizes across various verticals, although pilot projects remain most common as the market continues to test solutions, models and results. Fragmentation is tied to market complexity, ecosystem and other challenges: Players in the market range from small start-ups to international giants and span a variety of backgrounds, from telecom operators and network vendors to software companies, device manufacturers and connectivity players. Each company works to advance its own market strategy, contributing to a fragmented landscape. Fragmentation is also evident in the wide array of competing technologies used for smart city initiatives. These include the proprietary, such as Sigfox, and the standardized, such as 4G and NB-IoT. Long term, few technologies will obtain a leading market share; however, the shakeout process will be long, and multiple technologies that target different use cases and needs will continue to coexist.
Successful business models should leverage an extremely wide ecosystem of possibilities and collaborations to move the market into its next stage: Most smart city projects remain in the pilot stage with key obstacles which must be addressed before the full development of the market can occur. Business models which promise long-term project sustainability and desired results are a key market challenge. Given the nature of the market, opportunities can be strengthened by leveraging adjacent sectors. Whether through advertising or leveraging mobile network deployments, business models can tap into other revenue streams to monetise a smart city initiative. The market will continue to grow as it tackles major issues affecting multiple stakeholders, from governments to cities and citizens: Smart cities are long-term prospects and companies and cities involved are wise to focus on long-term results. The more smart-city initiatives tackle fundamental issues facing cities and countries, the more they are likely to become essential parts of government and business agendas. As a result the entire value chain will grow: IHS Markit forecasts that smart city device shipments will increase from 202 million in 2017 to 1.4 billion in 2026. Vertical applications related to physical infrastructure and mobility show particular potential for growth; in 2026 these applications are expected to comprise approximately 65 percent SecurityLink India ■ 1 July 2017
CMYK
● Smart city device shipments expected to grow from 202 million in 2017 to 1.4 billion by 2026. ● Smart city market is growing but fragmentation defines its current state. ● Various vertical applications, horizontal layers and heterogeneous stakeholders contribute to market complexity and fragmentation. ● Business models and long-term project sustainability must be addressed to unlock full market potential. and 22 percent of total device shipments, respectively. The largest market will be Asia Pacific with more than 700 million smart city device shipments by 2026. Other key regions will be North America and Europe, with more than 400 million and 200 million shipments, respectively. IHS Markit Smart Cities IoT Intelligence Service: This service is the single source of comprehensive intelligence on the Smart Cities IoT market, providing real-time access to a continuous flow of research across geographies, topics and application areas. Among the key intelligence and assets available with this service: the smart city project database which tracks more than 700 smart city projects, city profiles, case studies and market reports analysing pivotal aspects of the market from technology to strategy and business models. 75
CMYK
International Updates
Global Security Intelligence Centre in Australia A CYBER security centre opened in Adelaide, South Australia, as part of a global network to thwart cyber crime
T
he Global Security Intelligence Centre was established by NEC and is the newest hub of its worldwide network, which includes Japan, Brazil, Singapore, the United States and Austria. NEC Director of Solutions and Sales Andy Hurt said that Adelaide centre would allow the company to offer around the clock services to its clients. “This is a hub of an international services model where we have offices in five other countries servicing 24/7,” Hurt said, “The AU$4.38 million cyber security centre had been built to operate within the high security certifications and standards required by government and enterprises for the management and support of their data and applications. Zones are built for various levels of security and the zones and operations undergo rigorous assessment to achieve certifications.” The centre employs 50 security staff recruited from around the world. NEC is also working with South Australia’s three universities to train new staff in the specialised skills. South Australia’s Minister for Investment and Trade Martin Hamilton Smith said that the new security centre was a good fit in a state heavily invested in defence infrastructure such as the AU$50 billion project to build Australia’s future submarines. “Cyber security is important to our defence industry, and it’s also important to business,” Hamilton Smith said. A 2016 Lloyd’s-Cambridge study found that cybercrime was the sev76
enth biggest global economic threat and would cost Australia an estimated AU$16 billion over the next decade, and US$294 billion globally. Australia features prominently as a target for cyberattacks due to its rapid adoption of technology and relative global wealth. NEC Australia also manages the central and local data networks of all South Australian government agencies. The company was recently awarded a contract by the South Australian Police to develop facial recognition software and is working with the University of Adelaide to de-
velop smart city technology. Investment and Trade Minister Hamilton Smith said that the centre was an example of how a state, which has been reliant on more traditional industries such as automotive manufacturing, could transform itself into a service centre. “South Australia’s total services exports were $2.6 billion in 2016, an increase of 11 percent on the previous year and better than the national average of nine per cent,” Hamilton Smith said.
GJD Acquires Radiovisor G
JD, the leading global manufacturers and designers of professional external detector equipment and LED illuminators has acquired the infra-red beam and barrier technology plus all related intellectual property rights of Radiovisor Limited t/a Lazer Systems. Radiovisor’s ‘PREDATOR’ range of dual, quad and tower active IR beam sets plus the ATEX approved GS100 beam for use in hazardous areas will be manufactured at GJD’s factory in Heywood, and will undoubtedly enhance GJD’s perimeter security product range. Radiovisor Parent Limited was established over 90 years ago and was SecurityLink India ■ 1 July 2017
CMYK
one of the innovators of the active infrared beam. The innovative high security PREDATOR system has been accessed by the CPNI panel and has met their requirements to be included within the catalogue of security equipment (CSE), ‘approved for UK Government use.’ The integral MM100 beam sets additionally hold NATO codification. Radiovisor’s IR beam technology will complement GJD’s product range instantly. It will provide installers, specifiers and consultants with a ‘one stop shop’ for IP connected detectors, active infrared beams, alarm devices and CCTV LED illuminators for all
CMYK
International Updates
aspects of external security detection and illumination. Mark Tibbenham, Managing Director of GJD said, “We are extremely proud to make this announcement. A strategic acquisition of this nature will enable the company to substantially develop and grow in terms of security technology innovation. There is a huge demand for high-end and intelligent IR beam sets as well as reliable detectors that can be used in hazardous areas.” He added, “It is our sincere belief that GJD’s perimeter detection equipment is at the forefront of security in terms of detection ability, reliability, and freedom of false alarms. The inclusion of Radiovisor infrared
beam technology will even further enhance our product offering.” Stephen Lasenby, Managing Director of Radiovisor Limited commented, “GJD is a professional and well respected company and is ideally placed to take our IR beam technology forward. We are confident that our customers and suppliers will benefit greatly from the ‘GJD’ brand, their focus on technology innovation and world class service.” He continued, “This change is fan-
tastic news for our customers and partners. Radiovisor will continue to support our customers during the transition process to ensure it is as smooth as possible.”
Vess A NVR Certified with Bosch VMS 7.0 P
romise Technology, a leading developer of open storage platforms for video surveillance, announced that its Vess A-Series network video recorders (NVRs) are certified for use with Bosch video management system software (BVMS). Certifying Vess A-Series NVRs with the BVMS strengthens the companies’ partnership and offers customers an optimized solution that has been tested to deliver the highest levels of performance and reliability. Extensive documentation of the testing results is available and ensures that customers can fully leverage the performance offered by the integrated Vess A-Series and the BVMS solution while also reducing deployment and management costs by having the VMS and surveillance storage on a single device. The BVMS is a unique enterprise
IP video security solution that offers seamless management of digital video, audio and data across any IP network. It provides the best VMS to go with Bosch video devices and integrates seamlessly with Promise’s servers and storage solutions for video surveillance. Vess A-Series NVRs are purpose-built for video surveillance and include a suite of features unique to Promise called SmartBoost Technologies, which optimize system performance. The Bosch and Promise solution is resilient, affordable and scalable for systems of any size. “The last few years have seen the ecosystem surrounding BVMS become very robust,” noted Mario Verhaeg, Product Manager for Bosch Security Systems, “BVMS integrates with third-party cameras, storage deSecurityLink India ■ 1 July 2017
CMYK
vices and software applications to provide end-to-end solutions. We look forward to the collaboration between Promise and Bosch, as it will ensure that customers can benefit from the many advantages provided by our combined solution.” “We place great importance on working closely together with our ecosystem partners to certify our solutions, ensuring that they are compatible and optimized for our shared customers,” said John van den Elzen, General Manager, Surveillance Business Unit, Promise Technology, “Bosch is one of the most innovative companies in the surveillance industry, so it is really exciting to certify our solutions for interoperability. Now, the unique capabilities of our NVRs and storage solutions can be fully leveraged with BVMS.” 77
CMYK
International Updates
NIST Awards $38.5 Million to Accelerate
Public Safety Communications Technologies T he U.S. Commerce Department’s National Institute of Standards and Technology (NIST) has awarded $38.5 million to 33 research and development (R&D) projects aimed at advancing broadband communications technologies for first responders. “Through programs like FirstNet, President Trump and this administration are working hard to keep Americans safe,” said Secretary of Commerce Wilbur Ross, “These grant awards will help fulfill our mission, ensuring that first responders have access to advanced tools that can save lives.” The multiyear grants are intended to help modernize public safety communications and operations by supporting the migration of data, video and voice
communications from mobile radio to a nationwide public safety broadband network, as well as accelerating critical technologies related to indoor location tracking and public safety analytics. The grants are part of the Public Safety Innovation Accelerator Program funded by NIST’s $300 million allocation from the 2015 auction of advanced wireless service licenses. The Middle Class Tax Relief and Job Creation Act of 2012 provided the funding so that NIST could conduct an R&D program to help public safety overcome critical technical barriers, spur innovation as well as investment in public safety broadband, and realize the full potential of wireless broadband capabilities. NIST reviewed 162 proposals from
a diverse pool of national and international applicants across industry, academia and public safety organizations. The 33 selected projects span five key technology areas that have the potential to greatly enhance public safety communications and operations: ● Mission critical voice: Moving from traditional radios to cellular systems. ● Location-based services: conducting indoor positioning, navigation and mapping. ● Public safety analytics: handling and exploiting more data. ● Research and prototyping platforms: enabling low-cost R&D tools. ● Resilient systems: ensuring systems work in poor conditions.
Survey
Automation as No. 1 Budget Priority In CDD/ KYC Management For Financial Services Organizations Increased AML regulatory oversight and enforcement actions anticipated by about 45% of respondents
N
ICE Actimize, a NICE business provider of a single financial crime, risk and compliance software platform for the financial services industry has recently released a global survey outlining the top operational market drivers and spending priorities that are shaping the strategies behind current CDD/ KYC anti-money laundering programs. Titled ‘Accelerating Value of CDD/ KYC Programs with Automation Tech78
nologies in a Complex Global Market,’ the survey showed that an overwhelming 63 percent of respondents from financial services organizations said their number one budget priority was to increase spending on automation through the adoption of new technologies over the next 12-18 months. Additionally, 49 percent indicated that their budgets would increase over the previous year while only 8 percent SecurityLink India ■ 1 July 2017
CMYK
indicated that they were anticipating budget cuts or decreases. Other spending patterns covered in the survey noted the importance of training programs for existing staff (38 percent) and increased staffing requirements (36 percent). “We feel that this survey exposes the dissonance between long-term strategy and short-term reality. While looking to incorporate more automation and technology, respondents are grappling with
CMYK
International Updates
the expense of additional overhead to address regulatory requirements,” said Joe Friscia, President, NICE Actimize, “We are currently focused on developing intelligent automation, machine learning and artificial intelligence-based solutions that function as enablers to enhance the quality and consistency of CDD/ KYC programs while reducing the cost of compliance.” The NICE Actimize survey also focused on the top market trends influencing CDD/ KYC program strategies. According to the findings, some of these trends include the importance of company reputation in the marketplace (indicated by 59 percent as ‘very influential’); new beneficial ownership regulations
(indicated by 51 percent as ‘very influential’); and regulatory focus on model risk management and model validation (indicated by 45 percent as ‘very influential’). In response to anticipated changes within the regulatory landscape following the recent US elections, about 45 percent stated that they expected to see an increase in anti-money laundering regulatory oversight and enforcement actions. The NICE Actimize market surveywas conducted online in March 2017 via a range of digital channels. About 36 percent of the survey respondents came from financial institutions across North America, with respondents from EMEA and APAC comprising about 45 percent of the total.
The majority of the respondents, about 69 percent, indicated that they were responsible for banking segment business units. The remaining mix of respondents consisted of money service bureaus (7 percent), securities firms (5 percent), and insurance (3 percent) segments. Respondents from payment processor/ networks, government, gaming and other segments each contributed 2 percent or less of the total. About 18 percent of the institutions surveyed had assets greater than $100 billion, 2 percent between $60 and $99.9 billion, 5 percent of $40 to $59.9 billion, 13 percent between $10 billion to $39.9 billion, and 45 percent had less than $10 billion.
Barco Joins Logitech Collaboration Program To deliver exceptional wireless collaboration experience with ClickShare
B
arco announced that it has joined the Logitech Collaboration Program (LCP) as an integration partner in the program’s complementary technology provider track. The Logitech Collaboration Program (LCP) provides a unique framework for delivering high-quality video collaboration experiences across customer environments. Through the LCP, Barco augments the Logitech solutions to provide an easy-to-use wireless presentation system that allows up to four meeting participants to simultaneously share their content on the main display using their own laptop, cellphone or tablet, with a single click of a ClickShare button.
“We are excited about the opportunity to integrate ClickShare with Logitech’s collaboration solutions to deliver an effective content-sharing user experience,” comments Wim De Bruyne, Vice President Meeting Experience for Barco, “ClickShare is the leading wireless collaboration solution offering excellent image presentation, proven ease of use, and high reliability. All of our models are compatible, offering the perfect complement to enhance the quality and simplicity of Logitech’s video collaboration solutions.” ClickShare is Barco's wireless presentation and collaboration system that enables any meeting participant to quickly and easily share content on the SecurityLink India ■ 1 July 2017
CMYK
central meeting room screen. Barco provides a variety of ClickShare models to facilitate collaboration across the entire enterprise, from huddle spaces to executive boardrooms. While each offers unique capabilities and deployment scenarios, all offer extreme ease of use and the same high level of security, with the top-of-the-line model providing enhanced security features. “We are pleased that Barco has joined our program” said Scott Wharton, Vice President and General Manager of Logitech Video Collaboration, “By closely collaborating with Barco, we are able to offer an enhanced collaboration experience to our joint customers.” 79
CMYK
International Updates
Joins Linux Foundation’s Core Infrastructure Initiative New gold member partners with CII to improve internet security and fortify open source infrastructure
T
he Core Infrastructure Initiative (CII), a project managed by The Linux Foundation that collaboratively works to improve the security and resilience of critical open source projects, has recently announced that Thales is joining as a new gold member. A leader in critical information systems, cybersecurity and data security, Thales offers advanced data security solutions and services, delivering trust wherever information is created, shared or stored. It is recognized for its deep information and cryptographic security expertise that enables organizations to confidently accelerate their digital transformation. Thales technology is found right across the enterprise, in financial services, retail, healthcare and government and secures more than 80% of debit card transactions around the world. The CII’s mission is to ensure that the open source code that underpins business today is secure and resilient. Many of the world’s largest technology companies already belong to CII, and Thales is the first global security business to join the initiative. “CII is incredibly excited to see our membership base expand and add a security-focused company like Thales, which has a vast understanding of the complex information technology demands we face in today’s digital world,” said Nicko van Someren, CII Executive Director, “Its investment validates the importance of CII and is a great vindication of our work to security harden open source infrastructure to combat today’s complicated threat landscape.” “Thales has implemented open 80
source building blocks and standards both internally and for customers for two decades,” said Jon Geater, Chief Technology Officer at Thales e-Security, “Open Source in general and Linux in particular have become core to delivery of modern products and system, offering distinct utility, cost and performance advantages that we increasingly leverage to solve real-world problems. By joining CII we can bring our expertise and focus on security to bear on strengthening core open source infrastructure and working to eliminate the
security weaknesses that can emerge from less well maintained or directed inclusion of Open Source technology into products and infrastructure in the Cloud and IoT era. This shared vision of Thales and the Linux Foundation is critical to Thales’s strategic development objectives, our ability to serve our customers, and to improving the state of the Connected World more generally.” CII recently celebrated its three-year anniversary and announced a new governance structure to enable it to scale up its operations going forward.
First Cybersecurity Vulnerability Checklist For Contactless Cards & Readers
F
arpointe Data, the access control industry's trusted global partner for RFID solutions, has just posted the first radio frequency identification (RFID) Cybersecurity vulnerability checklist for access control manufacturers, distributors, integrators and end users to use to protect their access control systems from becoming hacker gateways to their facilities and IT systems. Knowing what to do is especially important now that government agencies such as the United States Federal Trade Commission, have begun filing lawsuits against businesses that do not provide good cyber security practices. “Seemingly daily, end users are SecurityLink India ■ 1 July 2017
CMYK
being reminded of how their access control systems are no longer secure,” emphasizes Farpointe Data President Scott Lindley, “They learn how a hotel had to pay a ransom to release guests that got locked into their rooms via a hack of the electronic key system or how easy it is to spoof popular access cards.” Since the start of 2017, end users have been informed of a series of hacks on various credentials states Lindley. ● The Chaos Computer Club stated that they hacked a padlock product and its accompanying mobile app which communicates via Bluetooth Low Energy (BLE) to the padlock.
CMYK
International Updates
This could potentially also affect hotels with mobile room keys as their door locks also communicate with smart phones via BLE technology and exchange confidential information. ● IPVM reported how a $30 copier easily spoofed a popular proximity card. The column stated that the copier used to copy the cards works much the same way as normal card readers, with transceiver coil, power supply, IC chip, buzzer and even LEDs components shared by both. Given the principal operation of contactless card readers, the copier excites the coil and delivers power wirelessly to the card, which then momentarily stores energy and then uses it to broadcast card details back to the copier.
● In an on-site demonstration at the ShmooCon hacker conference, an ESPKey, a small device that costs about $100 to make and has half a dozen wire clamps, a Wi-Fi transmitter and 4MB of memory, showed that it takes two or three minutes to break into an RFID card reader wall plate, attach the ESPKey and reinstall the wall plate to capture the ID codes of everyone in the workplace. To help prevent such attacks, the new Farpointe Cybersecurity Vulnerability Checklist covers a range of topics that can lead to hacks of contactless cards and readers. Sections include default codes, Wiegand issues, reader implementation tips, card protection solutions, leveraging long range read-
ers, assuring anti-hacking compatibility throughout the system and leveraging additional security components. “We are encouraging every access control manufacturer, dealer, distributor, integrator or end user to go to our website to either download or print out this Cybersecurity Vulnerability Checklist and use it,” adds Lindsey, “The link is available right on our home page. With increasing news stories of hacking throughout the world and the fact that government agencies are now reviewing such cybersecurity lapses should make channel partners providing access control products and systems take notice and implement anti-hacking solutions, such as Farpointe provides, to their customers.”
Cyber Range Simulation Training Center in Tokyo The facility, powered by the Cyberbit Range platform, will train cyber defenders in preparation for cyberattacks during the 2020 Olympic Games and beyond
C
yberbit, whose cybersecurity solutions protect the world’s most sensitive networks, and Ni Cybersecurity, the Japanese cybersecurity service provider, have recently inaugurated the new Cyber Range training facility in Toranomon, Tokyo. The training center will provide hands-on simulated training for cybersecurity professionals and help address the growing shortage in cybersecurity experts, especially in preparation for the 2020 Tokyo Olympic and Paralympic games, which are expected to bring with them a sharp rise in the intensity of cyber-attacks. Ni Cybersecurity has conducted preliminary training courses, after which 100% of surveyed trainees responded they would recommend the
facility to their colleagues. The Cyber Range training and simulation center in Toranomon, Tokyo, is the first fruit of the recent Cybersecurity cooperation agreement signed by the JapaSecurityLink India ■ 1 July 2017
CMYK
nese and Israeli governments on May 3rd, 2017. “We invite Japanese enterprises and government agencies to experience a new way to train cyber security profes81
CMYK
International Updates
sionals and improve their skills,” said, Takeshi Mitsuishi, President and CEO of Ni Cybersecurity, “This is another milestone in establishing Ni Cybersecurity as an innovative provider of cybersecurity services in our region, bringing the most relevant and up to date technologies to organizations in Japan.” The training facility will be powered by the Cyberbit Range, the most widely deployed cybersecurity training and simulation platform. Cyber-
bit Range enables trainees to practice responding to attacks in real-life settings including security tools, network architecture and traffic that reflect their actual work environment. The Cyberbit Range provides a rich and up-to-date catalog of simulated attack scenarios, including ransomware, enabling cybersecurity experts trainees to improve their skills and accelerating the on-boarding process for new team members. The Cyberbit Range powers
cybersecurity training centers in North America, Asia and Europe. “Japan is expected to train tens of thousands of new cybersecurity experts while improving the skills of existing ones, all within a very short timeframe,” remarked Cyberbit CEO, Adi Dar, “I am confident the initiative led by Ni Cybersecurity and powered by our Range platform, will contribute to Japan’s cyber readiness for the 2020 Olympic Games, and for years to come.”
Venture Fund to Radically Change Future of Security Innovation Will fuel new model for security application development and consumption; Entrepreneurs and developers to benefit from accelerated go-to-market opportunities
P
alo Alto Networks® the next-generation security company, has recently announced that it is forming a $20 million security venture fund. The fund will provide early stage capital investments to fuel development of innovative security applications for the Palo Alto Networks next-generation security platform. The fund will be aimed at seed-, early- and growth-stage security companies with a cloud-based application approach.
These companies can accelerate their routes to market for their respective technology by developing cloud-based applications built upon the Palo Alto Networks platform and the new Palo Alto Networks Application Framework, easily engaging the tens of thousands of Palo Alto Networks customer deployments. The fund expects to collaborate with Greylock Partners and Sequoia Capital to identify and evaluate innovative secu-
“This new fund will build upon our reputation for developing innovative,
next-generation security technologies and demonstrate the excellent momentum that we have achieved with our ecosystem of security partners. It represents an essential part of our mission to help organizations prevent cyber breaches by inspiring and accelerating a groundswell of security innovation in a model that can be easily accessed and deployed by customer organizations.” – Chad Kinzelberg Senior VP, Business and Corporate Development, Palo Alto Networks 82
SecurityLink India ■ 1 July 2017
CMYK
rity applications for potential co-investment. By providing capital, the fund will enable entrepreneurs and security vendors to focus on developing high-value functionality for customers, instead of developing the infrastructure and data stores necessary to effectively deliver their applications and establish a foothold in the market. The investments in entrepreneurial security companies are designed to accelerate the development of new security applications for the Palo Alto Networks platform. Such applications will help customer organizations more easily access, evaluate, and adopt new advanced security capabilities and activate clouddelivered security applications from different providers as their security needs change.
CMYK
International Updates
Gemalto and Caliber Public Safety Collaborated Assisting Law Enforcement Agencies in Securing Remote Access to Criminal Justice Information Services
G
emalto has collaborated with Caliber Public Safety (Caliber), a leading provider of public safety software in the United States, to provide law enforcement and other government agencies an efficient way to comply with criminal justice information services (CJIS) policies, ultimately heightening security. By combining Caliber’s public safety expertise in records management and Gemalto’s SafeNet authentication service, the two companies have created a strong portfolio of cloud-based identity and data protection solutions. Gemalto and Caliber’s solutions allow law enforcement to rapidly deploy strong authentication technology to meet CJIS requirements and pass state audits. When it comes to law enforcement, timely information is critical to stop crime. Criminal justice information (CJI) is shared at all levels – including state, federal, and local municipal agencies – meaning that any leakage of sensitive data, ranging from fingerprints to criminal backgrounds, can jeopardize efforts. The CJIS security policy defines requirements for sharing and protecting information such as two-factor authentication, when accessing CJI data. Gemalto and Caliber provide law enforcement agencies with comprehensive, easy-to-deploy CJIS advanced authentication solutions for both mobile soft tokens and physical ones. The authentication as a service approach means public safety organizations have little to no installation overhead and can deploy it almost immediately. The selfservice platform allows law enforcement
officers to take care of ongoing token management, saving time for IT administrators, while extensive pre-configured reports provide immediate visibility and tracking of all authentication events. “By leveraging our public safety cloud infrastructure, we are able to offer powerful security and risk mitigation, while ensuring the highest levels of compliance possible,” Gregg Merlihan, Senior Executive Vice President at Caliber Public Safety stated, “The technology is simple to use and its design accommodates growth and scale, along with a budget and approach to
make quick and effective deployments a reality.” “We have a long history at Gemalto of working in the government space, which helps us understand the unique security needs of these agencies,” said Francois Lasnier, Senior Vice President of Authentication Products at Gemalto, “Since the deadline for meeting the CJIS regulation has passed, law enforcement agencies have now started to undergo formal audits to ensure they are compliant. Gemalto’s authentication solutions provide them with a rapid path to making sure they pass these audits.”
Celebrating 15-Year 20% Annual Growth Rate in
Thermal Image Sensors Company will double R&D spending to target growth opportunities in consumer markets and outpace new entrants in thermal detection
U
LIS, a manufacturer of innovative thermal sensors, announces that the company will again significantly increase its R&D spending for 2017 to reach €15M ($16.8M). This investment marks the company’s strong growth and market leadership progression over the last 15 years. ULIS generated €61.5M ($69.3M) in sales in 2016, a rise of nearly 30% compared to 2015. Buoyed by the spurt in additional growth and market changes, ULIS’ SecurityLink India ■ 1 July 2017
CMYK
new level of R&D investment will represent 20% of its annual sales. Previously, the company pledged 10% of its annual revenue to R&D. It aims to further simplify access to thermal imaging within growing smart building, automotive and consumer electronics markets by making the key component – the thermal sensor – more compact, more affordable, easier to integrate and available in mass volumes. As applications of thermal imaging become increasingly diversified, 83
CMYK
International Updates
attracting new players worldwide, ULIS deems this investment necessary to sustain the pace of market developments and further advance its market lead. ULIS exports 97% of its products. ULIS will accelerate the design of models and features better adapted to system maker and end-user needs in new markets (leisure equipment, smart buildings, driving assistance for cars with or without drivers etc). It will pursue development of disruptive technologies that reach new heights in performance of thermal image sensors for clients in traditional markets, for example defense and security. The company will also commence 24/7 non-stop production to meet new demands for mass volume. “ULIS is happy to mark its 15th an-
niversary with an even stronger commitment to democratizing thermal image sensors, making them available and affordable for all,” said Jean-François Delepau, Managing Director of ULIS, “It has taken an enormous investment in capital, human resources, skills and technological expertise and much dedication from ULIS staff to gain the market confidence in our products and innovations that we enjoy today. We are very grateful to our customers and the ULIS team. Today, the diversity of market applications for thermal imaging is creating a new dynamics; changing the rules of the game. The barrier to entry has been raised. Success requires a greater intensification of resources and state-ofthe-art know-how across all domains,
plus the experience to transform these assets into value-added products. We look forward to fulfilling our promise to provide thermal sensors that are the best suited to meeting market demands for the right performance and quality at the right cost.” Since its founding in 2002 as a spinoff from CEA-Leti, ULIS has become the second largest producer of thermal image sensors (micro-bolometers) for defense, surveillance, thermography, firefighting, outdoor leisure and automotive markets. It offers a targeted range of high-quality, compact, low-cost microbolometers that are the key component of many top brand cameras and thermal imaging equipment sold across Europe, Asia and North America.
Artificial Intelligence
Next Key Growth Area for Smartphones Differentiation through hardware will become even more difficult
A
rtificial Intelligence (AI) is one of the next big growth areas for the mobile industry according to a white paper released by IHS Markit ahead of Mobile World Congress. “We see AI making smart devices even smarter with improved user experiences,” said Ian Fogg, Director of Mobile and Telecom Analysis at IHS Markit, “Existing AI agents like Apple’s Siri and Google Assistant will expand across the industry, complemented by embedded AI in all parts of mobile devices from cameras, to audio, to machine.” “Smartphones will both be the inter84
face for consumer AI and deliver the vast amount of data technology companies need to train AI systems,” Fogg said. Software investments and partnerships are critical for hardware companies to create smarter AI-enabled experiences, said the IHS Markit white paper. Vendors such as Google, Apple, Sony, Microsoft and Samsung have heavily invested in the development of their own AI and voice-assistant capabilities. In order to compete, smaller players with less in-house software expertise and resources will be looking to partner-up. “As Amazon’s Alexa makes its way SecurityLink India ■ 1 July 2017
CMYK
onto other devices, Google must and will increase the reach of its own Assistant to all Android smartphones – reducing the differentiation for Google’s Pixel smartphone,” Fogg said, “Over five years since Apple’s Siri first launched, Apple must offer new AI-powered capabilities to remain competitive.”
By 2020, over six billion smartphones and $74 billion in app spend
T
he AI opportunity comes at a time when the global smartphone installed base is still growing, the white
CMYK
International Updates
paper said. By 2020, the smartphoneinstalled base will exceed six billion units, up from four billion in 2016, with revenues totaling $355 billion. “Spending on mobile apps shows no sign of slowing down,” said Jack Kent, Research Director at IHS Markit, “Consumer spending on mobile apps
will reach $74 billion in 2020, up from $54 billion in 2016. Major companies are increasingly trying to use the fastmaturing mobile apps and services market as part of a wider platform strategy to tie consumers into ecosystems. The combination of consumer apps, communications, advertising, commerce
and payments will drive new growth opportunities.” The number of addressable smartphones for device-based payment services, such as Apple Pay and Android Pay, will rise to more than five billion units by 2020, up from 2.7 billion in 2016.
Microsoft Azure Virtual Network Integration Boosting Cloud Security Visibility
New integration improves network visualization and the assessment of security controls in the public and private cloud
S
kybox™ Security has recently announced new inter-operability with Microsoft Azure Virtual Network (VNet), enabling customers to gain security visibility into virtualized networks created in the Azure Cloud. The Skybox™ Security Suite easily integrates with Azure VNet, incorporating the virtual environment in its network model to provide normalized visibility and access simulation capabilities across public, private and hybrid IT networks. This capability improves configuration security and enables security teams to quickly understand Azure’s role in the integrity of an entire network. “We’ve reached the tipping point for cloud with more than 60 percent of organizations now pursuing a hybrid IT approach. Cloud security, however, remains a challenge for most,” said Skybox VP of Products Ravid Circus. According to the Cloud Security Alliance (CSA), one of the top threats to companies in cloud environments is the risk of exploited system vulnerabilities. “The only way to effectively prioritize
those vulnerabilities is by having visibility of the organization’s entire attack surface, regardless of the environment,” Circus explained, “And, you need context. We not only show how the virtualized network contributes to an organization’s attack surface, we give the context needed to understand where potentially exploitable vulnerabilities exist.” Skybox automatically integrates Azure VNet data into the network model, including gateway routing, VPN connections, subnets, hosts and security groups. Through one normalized view, security teams can analyze network access paths, both north-south (into and out of the data center) and east-west (within it). This improves access troubleshooting and understanding of potential attack paths. Skybox previously announced integrations with Amazon Web Services and VMware NSX. The addition of support for the Microsoft Azure Virtual Network provides even more visibility into virtualized networks strengthening the hybrid network security management capabilities of the Skybox Security Suite. SecurityLink India ■ 1 July 2017
CMYK
Skybox Security™ arms security professionals with the broadest platform of solutions for security operations, analytics and reporting. The Skybox™ Security Suite merges data silos into a dynamic network model of the organization’s attack surface, giving comprehensive visibility of public, private and hybrid IT environments. Skybox provides the context needed for informed action, combining attack vector analytics and threat-centric vulnerability intelligence to continuously assess vulnerabilities in your environment and correlate them with exploits in the wild. This makes the accurate prioritization and mitigation of imminent threats a systematic process, decreasing the attack surface and enabling swift response to exposures that truly put your organization at risk. The award-winning solutions in vulnerability and threat management, automated firewall and security policy management and attack surface visibility increase operational efficiency by as much as 90 percent and are used by the world’s most security-conscious enterprises and government agencies, including Forbes Global 2000 companies. 85
CMYK
International Updates
Highly Secure Encryption-Technology Platform for Device Security Platform enables easy and economical FIPS 140-2 Level 3-compliant solutions that satisfy ever-increasing security requirements in healthcare, home automation, secure-access control systems, and portable data storage
S
TMicroelectronics and ClevX, an intellectual-property innovator and technology developer for portable storage and mobile device manufacturers, have announced the availability of a FIPS 140-2 Level 3 compliant Encryption Technology Platform reference design for security applications using commercial/ industrial-, rather than military-grade chips. The STM32 microcontroller-based platform will aid designers and manufacturers to design and build highly secure FIPS-compliant solutions suited for applications that require certified cryptographic functions. These application domains include consumer, corporate, and industrial applications in healthcare, home automation and security, secure-access control systems, and portable data storage. “Using the STM32’s advanced security features helped ClevX fortify their secure portable-storage reference platform,” said Tony Keirouz, VP IoT Strategy, Security, and Microcontrollers, STMicroelectronics’ Americas Region. “With the reference platform’s quality independently proven through its FIPS 140-2 Level 3 certification, and the benefit of using high-quality commercialgrade products instead of military-grade ones, designers and manufacturers can meet their application’s security needs on time and on budget.” The new ST/ ClevX reference design is based on the ClevX-patented DataLock/ DataLock BT technology platform for 86
secure portable-storage media. The design uses ST’s ultra-low-power STM32 MCUs and Bluetooth® Low Energy chips (BlueNRG), along with both ST/ ClevXbased hardware, firmware and the related smartphone/ wearables app is immediately available for licensing and partnerships. “With ever-increasing public and corporate requirements for privacy and security,” said Lev Bolotin, Founder/
CEO, ClevX, LLC, “The DataLock and DataLock® BT Security solutions use ST and ClevX technologies to allow designers and manufacturers to create and build cost-effective FIPS 140-2-compliant solutions that are simple to use while allowing legitimate operators to authenticate themselves to the devices and systems they need to use with FIPScompliant solutions.”
Gemalto Finalizes the Acquisition of 3M’s Identity Management Business The company in-sources biometric technology for government and commercial applications
G
emalto has recently announced the closing of the acquisition of 3M’s identity management business after approval by the relevant regulatory and antitrust authorities. This strategic acquisition rounds out Gemalto’s government programs offering by adding biometric technologies and more secure document features, and it ideally positions the company to provide solutions for the promising commercial biometrics market. The identity management business will be integrated into Gemalto government programs business. In 2016, the acquired business generated $202 million in revenue and an estimated $53 million in profit from operations. “With the acquisition of 3M’s identity management business, Gemalto makes a strategic move by in-sourcing biometric technology. Combining our market access, technologies and expertise will enable Gemalto to further accelerate the deployment of trusted national identities and to offer strong endto-end biometric authentication solutions throughout the digital economy,” said Philippe Vallée, Gemalto CEO, “I warmly welcome the new teams joining Gemalto and we look forward to working closely together towards success.”
SecurityLink India ■ 1 July 2017
CMYK
CMYK
National Roundup
Program tools & benefits
ONVIF Sponsors IFSEC International 2017
O
NVIF®, the leading global standardization initiative for IP-based physical security products, was a sponsor of IFSEC International 2017 in London, 20-22 June, 2017, at ExCel London. IFSEC International is Europe’s largest security exhibition and more than 27,000 security professionals are expected to attend this year’s event. “Trade shows like IFSEC International give the security community the opportunity to see how our members leverage the ONVIF interface to enable the deployment of exciting and innovative solutions to a broad swath of markets, from easily attaching video to point of sale data for retail to linking traffic cameras with municipal video management systems for more comprehensive security,” said Jonathan Lewit, ONVIF Communications Committee Chair, “These developments highlight just how quickly the Internet of Things is growing and the vital role that standards can continue to play in its evolution going forward.” ONVIF sponsored the IFSEC Cafe on stand B550, where attendees found seating and educational materials about ONVIF. In addition to its sponsorship, ONVIF was represented by 79 member companies exhibiting at IFSEC International this year.
P
artners joining the Integration Partner Program will benefit from a wealth of technical and commercial resources, including access to in-depth sales & marketing, technical support and business development. Items such as an integration checker tool, integration/ application certification, SDK training, integration support, and co-marketing and event opportunities, all aim to tailor partner expertise, skills, technological understanding and industry focus – to yield the best solutions, and drive success and profitability.
A vital part of the program’s benefits, streamlined online communication with Hikvision’s technical teams as well as vital tools to plan successful ‘go-to-market’ activities are also offered.
Partner website portal
T
Integration Partner Program
o extend its network of partners in the field of collaboration, integration and business development, Hikvision launches a new Integration Partner Program at IFSEC 2017. Designed to enable partners to capitalise on access to a wealth of technical and commercial resources, the Integration Partner Program features two partner levels of Integrated Partner and Premium Partner, and ensures that compatible 3rd party solutions will enjoy strategic marketing and sales reach, through Hikvision’s global communication channels.
T
o support the program, Hikvision is going to launch its easy-to-use partner website portal in the third quarter of this year. It provides a platform for distributors, systems integrators and end users to find compatible solutions, as well as featuring an overview of partner integrations and status update. The new portal enables a seamless, online communication between partner and relevant stakeholders within Hikvision, for both technical and commercial matters. “The Integration Partner Program opens the door to our partners to enhance their expertise, solutions performance and sales reach to a whole new level,” says Adler Wu, Prod-
SecurityLink India ■ 1 July 2017
CMYK
87
CMYK
National Roundup
uct Director for vertical solutions and 3rd party integrations, “The integrated partner and premium partner programs will support our partners to develop, promote and sell their compatible solutions to boost their business and support a wider range of applications with certified smart turn-key solutions, for the benefit of end users.” Hikvision are looking to welcome technology integration companies who specialise in physical security information management, video management software, video analytics, building management, identification systems, access control or systems requiring video streams, to connect to their exciting new partner program initiative.
V
Smart Surveillance Solutions
IVOTEK showcased the latest vertical surveillance solutions at IFSEC 2017, London, under their latest strategy ‘See More in Smarter Ways,’ with complete smart IP surveillance solutions with partnerships forged through comprehensive integration with leading global partners Genetec™, SeeTec, and Wavestore. Three highlights include: See more through panoramic solutions: VIVOTEK introduced a lineup of 180° and 360° solutions. The compact MA8391-ETV, the newest 360° multiple sensors camera with four adjustable remote focus sensors, makes it easy to install and maintain. Moreover, with supreme night visibility (SNV) feature the camera can deliver high quality images around the clock. The new 3-megapixel 180° panoramic network 88
camera, the CC8371-HV features IR illuminators effective up to 15 meters. The latest four 3-megapixel CMOS sensor vandal dome with brand new aesthetic design, the MS8392-EV was also showcased. This flexible camera utilizes a video alignment feature that allows adjustment of the positioning and image quality of each sensor. Despite this flexibility, the multi-sensor camera is built to withstand rain and dust and is protected against vandalism or tampering with a robust IP66 and IK10-rated housing. Smarter ways for IP surveillance: VIVOTEK demonstrates the ideal solution by debuting the upcoming 12-megapixel fisheye camera, FE9391-EV, featuring the ImmerVision 360° panomorph lens technology. This breakthrough lens technology delivers unparalleled peripheral visibility for optimal 360° image quality. Besides, it is also equipped with Smart IR II which can deliver supreme surround view image for night mode. With built-in smart technology including crowd-detection, loitering-time analysis, and trigger alarms for events such as overcrowding, the camera expands horizons for intelligent surveillance solutions. It also features advances in human detection, which can accurately detect human and non-human objects and continuously track the movements of any objects of interest. The smart technology powered by VIVOTEK’s 12-megapixel fisheye cameras help business owners to enhance security and control, as well as lower total cost of ownership. Global strategic alliance: In order to provide customers with the most advanced surveillance products and solutions as well as to meet the technical demands of different projects and applications, VIVOTEK launched its solution integration alliance (SIA) program that builds cooperation and alliances with global partners offering diverse expertise across various fields. VIVOTEK worked closely with Genetec™, SeeTec and Wavestore during IFSEC 2017. Visitors experienced the seamless integration of VIVOTEK H.265 network cameras with Genetec™ as well as the powerful vertical solutions in transportation and retail applications borne from alliances with SeeTec and Wavestore that reinforce and expand the focus across vertical markets.
SecurityLink India ■ 1 July 2017
CMYK
CMYK
National Roundup
Deep Learning Powered Video Monitoring
B
ritish tech start-up, Calipsa has launched its next generation video surveillance technology built on state-of- theart deep learning models. Founded by machine learning and artificial intelligence experts, Mohammad Rashid Khan and Boris Ploix, the company has developed algorithms that can process and analyse hours of video feeds to provide alerts and detailed reports for applications where real-time video monitoring is key, including traffic enforcement, public spaces, transport hubs, road accidents and public disorder. The Calipsa engine uses a feedback loop to continuously evolve and improve over time. Human operators can ‘teach’ the artificial intelligence using a simple point and click interface, which automates repetitive parts of their jobs. Designed to work with any existing camera or video source, the technology can be deployed quickly via the cloud or on-premise, with no retrofit required. Calipsa is highly adaptable to all weather and lighting conditions, with 95 per cent accuracy. “There are around 250 million video surveillance cameras in operation worldwide today, capturing 1.6 trillion hours of video annually. Yet despite the fact that we live in the 21st century, the majority of video surveillance carried out by the police, military, transport operators and security companies, is still done by humans,” explains Mohammad Rashid Khan, Co-founder and CEO at Calipsa, “This doesn’t make sense, as it’s very time consuming, expensive and inefficient. You can imagine that manually viewing huge quantities of video data for hours and hours can lead to fatigue, loss of attention, and most important, errors – at a time when video surveillance has never been more critical in our society.” Calipsa demonstrated its technology at IFSEC to show how it works in a number of typical scenarios, including municipal cases such as monitoring traffic flows and congestion, traffic surveys and incident detection, as well as mass tran-
sit (airports, bus and train stations). The company is actively looking to recruit partners offering hardware, security and integration solutions. The Calipsa team has raised a seven figure seed funding round from a number of well-respected venture capitalists including Localglobe, Horizons Ventures and Entrepreneur First – which have backed some of the biggest companies in the world. Calipsa is already working with customers in the UK, France and India and is now seeking strategic partners to take its technology to the market.
SSL & 802.1X Encryption Protected Cameras
S
upporting the security industry’s leading technical solutions and software control providers, CCTV design and manufacturing company 360 Vision Technology, fielded their range of high-performance surveillance cameras at IFSEC 2017. 360 Vision displayed a variety of camera model/ control combinations including analogue, HD, thermal and stainless steel, and with integrated Sirius IR & white light LED illuminators – illustrating 360 Vision’s breadth of video surveillance imaging technology. 360 Vision’s high-performance Predator and Centurion ‘all-in-one’ PTZ cameras featuring advanced SSL & 802.1 encryption protection, were also shown. “Designed to protect against hacking and ransomware attacks, we’ll be showcasing 360 Vision camera technology in-
SecurityLink India ■ 1 July 2017
CMYK
89
CMYK
National Roundup
cluding advanced SSL & 802.1 encryption protection,” says Mark Rees, Business Development Director at 360 Vision, “We’re delighted to support our technical solutions partners at IFSEC 2017 with a wide range of high-performance camera technology – designed and built in the UK to deliver secure 24/7 video imaging, reliability and performance for any application.”
Essence Cloud Services Platform
Activation technology that uses voice to make duress calls such as ‘intruder in the house,’ and alarm commands based on biometric identification to control the security system itself. “IFSEC offers us a world-class opportunity to present the newest versions of our end-to-end, cutting-edge, cloud-based solutions to the security market,” said Ronnie Nir, Essence VP of Sales and Marketing, “Cloud-based architecture allows our partners to gain a better understanding of their customers through analytics and tailor their services with the flexibility afforded by the many hardware and software option available directly impacting their ability to aggressively expand market share.”
E
ssence has focused on its cloud-based platform for security service providers at IFSEC International in London. The cloud service suite features hosting, data analytics, 24/7 multi-level support, and full customization for professional and DIY security systems. The scalable and flexible platform accelerates time to market, allows complete management of accounts and systems, and delivers seamless, rapid integration into existing systems. With the new holistic cloud, service providers get a complete end-to-end system that manages both services and hardware. The cloud supports Essence’s two flagship IoT and interactive security systems: WeR@Home™, a complete home management solution offering security and safety with user friendly, seamless mobile apps and simple, do-it-yourself installation and setup; and EverGuard™, a field-proven, end-toend interactive professional security solution that includes a wide range of hardware, software, operations, and services. “Essence continues to drive innovation in home and professional security focused on directly impacting the success of our partners,” said Dr. Haim Amir, Essence CEO and Founder, “Our cloud services platform directly enhances their customers’ satisfaction by giving them a flexible range of products and services to meet their needs and budgets.” In addition to its cloud services and interactive security options, Essence also presented a new concept that brings the capabilities of voice interactivity to traditional security. This innovationis based on the Essence’s patented Intelligent Voice 90
I
New BX Panoramic Dome Camera
ndigoVision showcased the new BX Panoramic Dome Camera during IFSEC International 2017, London. With four ultra-low light HD sensors, built-in IR and WDR the BX Panoramic Dome Camera displays outstanding 180 degree panoramic video in all scenarios. Sensor locations are pre-set so only to adjust the tilt and be ready to go. Installed with a single PoE+ cable, the BX Panoramic camera is IK10 which is suitable for both internal and external installations. Powerful analytics including motion detection, hooded, tripwire, intrusion, abandoned and missing are available across the entire 180 degree panoramic scene which is seamlessly stitched together. Integrated with Control Center, IndigoVision’s powerful and open Software Management Solution, footage is viewed and exported in a single seamlessly stitched together image direct from the camera. “The new BX panoramic dome camera is a fantastic addition to our extensive camera port-
SecurityLink India ■ 1 July 2017
CMYK
CMYK
National Roundup
folio. With built-in IR and 45 degree lens coverage from each camera lens this camera provides no blind spots,” said Paul Theasby, IndigoVision’s Chief Operations Officer, “That coupled with the seamless stitching of all images direct from the camera into Control Center and a wide range of analytics make it the perfect for outstanding video quality in all scenarios.”
C
people at the right time.” IPSecurityCenter is deployed in some of the largest public security programs today, supporting the safety and security of citizens, visitors, commerce and infrastructure. IPSecurityCenter allows the intelligent integration of a vast range of security and homeland defense technologies such as video surveillance, content analytics, intruder detection, access control, facial and license plate recognition, crowd monitoring, chemical, biological, radiological/ nuclear and explosives detection, geospatial mapping and asset tracking etc.
Latest IPSecurityCenter™ PSIM
NL Software demonstrates the latest IPSecurityCenter PSIM capabilities at IFSEC International, including the use of drones to help increase situational awareness, integration and management of vast estates of sensors, systems and devices as well as a wide range of enhancements to enable large-scale federated systems to support critical national infrastructure. The need for large scale CCTV coverage, both public and private has never been greater. At a time when almost all police and mass transit operations are facing reduced budgets for security operations, there has been an increased focus on the use of technology, using digital ‘eyes’ as a force multiplier for officers and guards. These eyes on the street, work 24/7/365 with a low cost of maintenance and little intervention required, and although they may not prevent attacks, they can assist greatly with investigations and the apprehension of offenders. “We have seen growing numbers of law enforcement agencies around the world working towards solutions comprising public/ private co-operation as well as the use of body worn cameras, smart phones, drones and other technologies that give them fast access to relevant video,” explains Simon Jones, Sales Manager UK & Europe at CNL Software, “This increased requirement for CCTV brings with it the need to rapidly retrieve footage. At IFSEC we are be demonstrating how IPSecurityCenter enables the connection of vast numbers of new video technologies as well as legacy DVR/ NVR/ CCTV systems, from multiple different vendors, to retrieve video for distribution to the right
Vehicle Identification, Mobile Access & More
T
his year Nedap demonstrated the portfolio of security products that they have significantly invested in for enhancement. They have greatly improved the possibilities of the cloud based MACE Admin Portal. MACE is the platform for mobile access control. Virtual cards can now be easily distributed and revoked by partners or end users, and can also be customized to reflect the corporate style of customers. Even the identity of the virtual cardholder is also authenticated by using the fingerprint if that is stored in the phone operating system. The uPASS product line of Rain RFID/ UHF readers is expanded with uPASS Target, the long-range UHF reader for vehicle identification to date. The uPASS Target can now also be equipped with a second antenna to expand the reading area or to support an entry and exit lane with one reader. They have also added new UHF tags to our portfolio – a UHF rearview mirror tag that motorists can easily hang on their rear-view mirror. Additionally, EPC GEN2 V2 cards and windshield tags are available that support security enhancements based on AES encryption. The TRANSIT Ultimate readers for high end vehicle and driver identification have been redesigned last year. This year they are focusing on improvements to optimize the overall performance and configurability of this market leading RFID reader.
SecurityLink India ■ 1 July 2017
CMYK
91
CMYK
National Roundup
“We feel that many people are not aware of the benefits that our products can bring. Making security systems a little more convenient for people to use will greatly increase the support of people in organizations for the security systems that are implemented. Access control systems that slow down people or their vehicles often end up not being used in the best way possible, which decrease the security level of your organisation. Security should not be in the way of people. Our solutions make security and convenience go hand in hand. In the building and outside the building, for the people and for vehicles,” said Maarten Mijwaart, General Manager of Nedap Identification Systems.
VOLANT™ Rugged PTZ Camera
brushless DC motors for fast, accurate and silent operation and highly flexible, continuous rotation in both its pan and tilt axis. It will silently pan at 420°/second to a pre-set, or move extremely slowly to track a target or person at 300m. The Infinity™ motors deliver minimal latency and military-level, positional accuracy, repeatable to 0.01°. If the VOLANT™ is knocked or moved out of position, its positional intelligence will recover it to its correct position. The VOLANT™ includes integrated, Dual-Adaptive™ IR and white light LED illuminators, set in a ring surrounding the camera window. These provide optimal lighting in any field of view and are effective up to 150m in complete darkness. IP and analogue models of the VOLANT™ cameras are available, including ONVIF compliant, Full HD, IP with 30x optical zoom and SD analogue with 20x or 30x optical zoom.
R
edvision launches the VOLANT™ rugged PTZ camera at IFSEC 2017. The VOLANT™ is the fastest, quietest and most accurate PTZ camera in the industry and has been exhibited alongside the new VEGA™ rugged camera enclosure. Redvision also showcased the company’s well-established, XSERIES™ rugged PTZ dome cameras. Redvision’s VOLANT™ incorporates many of the design features of its successful X-SERIES™. It has a durable, diecast aluminium body for rugged, outdoor operation; a flat, optically-correct, toughened glass camera window with wiper to remove dirt and water; and a camera design allowing viewing vertically downwards when mounted on a pole or column. It is IP68 weatherproof rated; IK10 shock and vandal resistance rated; and passes IEC vibration, shock and salt spray compliance requirements. The VOL™ ANT uses Infinity™ direct drive, 92
H
Spynel-M
GH Infrared Systems presented their latest and smallest sensor in their Spynel panoramic infrared surveillance systems line, Spynel-M at IFSEC International 2017. One of the largest security events in Europe, IFSEC International showcases the most cutting-edge technology and solutions from providers across the world. Spynel systems first made their debut into the security marketplace fifteen years ago, and since then, improvements to the system’s hardware and accompanying software, Cyclope, have consistently improved on the capabilities including longer detection ranges, more customization options within the software for ease of use and scaling down the sensors for more mobile and temporary applications. The Spynel M weighs 1.8kg, making it the ideal and costeffective solution for wide area surveillance of critical infrastructures such as power stations, event security, prisons, dam, nuclear facilities and data centers.
SecurityLink India ■ 1 July 2017
CMYK
CMYK
National Roundup
Five Key Security Scenarios for OPTEX’s Sensors at IFSEC
OPTEX exhibited a range of different products and solutions centred around five key security scenarios from perimeter protection and tailgating detection to Internet of Things (IOT) based alarm systems
W
ithin its high security perimeter protection zone, OPTEX showcased its CPNI approved fibre optic fence detection system, Fiber Sensys FD-322 series that detects intruders climbing above or cutting through a fence. OPTEX’s REDSCAN RLS-3060 can create another layer of security around the perimeter fence to warn if anyone or any vehicle is approaching the fence. The perimeter intrusion detection systems have been fully integrated with the GEMOS PSIM platform and can trigger video surveillance drones to fly to the point of intrusion and send a live video stream to the control centre. In a second zone, OPTEX displayed its time of flight technology, to allow visitors to gain a better understanding of its capabilities. The technology allows a scene to be mapped in 3D and give an accurate representation of the objects present. It is used in Accurance 3D, OPTEX’s tailgating detection system for interlocks and could also be used for other applications such as object protection. The award-winning laser scan detector, REDSCAN RLS2020 showed its ability to protect assets and detect people jumping over turnstiles or climbing through skylights. It is already proven in identifying small objects or thrown objects being smuggled into restricted areas. For commercial and residential security, OPTEX demonstrated its new wireless infrared beam, the SL-TNR that works with universal batteries (CR123) and can be partly hardwired; as well as its new range of pre-built beam towers.
The last zone included live demonstrations of how OPTEX’s wireless outdoor sensors, including its new VX Shield series, are ideally suited to IOT applications, sending alarms and other data via the cloud to a smartphone, or to a remote monitoring station.
Pelco Surveillance Cameras ExSite™ explosion-proof and Optera™ panoramic cameras take center stage
A
ttendees at this year’s IFSEC International had the opportunity to experience a number of new and innovative cameras from Pelco by Schneider Electric. Headlining these advanced solutions are the company’s ExSite™ enhanced explosion-proof cameras which are engineered to survive in the most demanding environments, and Optera panoramic multisensor cameras that are integrated with the industry’s leading VMS providers to deliver panomersive HD imaging that puts you in the middle of a scene. “Where Pelco imaging technology was perhaps a step behind the competition, we are clearly taking the lead once again with new solutions like our ExSite and Optera,” said Kevin Saldanha, Director Product Management, Pelco by Schneider Electric, “ExSite enhanced cameras are engineered to survive like no other with a virtually indestructible housing built to eliminate the possibility of electrical discharge which can cause explosions in some environments. And our Optera panoramic cameras make multisensor panoramic cameras ideal for mainstream use with the right combination of performance, reliability, cost-efficiency and now VMS compatibility. We’ve got it all covered.” ExSite cameras robotically welded water and corrosion resistant stainless steel housing meets the tough NEMA Type 4X standard for use in extreme environments such as oil and gas facilities, chemical plants, manufacturing and more. Its unique patent-pending direct drive pan-tilt system is devoid of belts, gears or pulleys to eliminate stray electri-
SecurityLink India ■ 1 July 2017
CMYK
93
CMYK
National Roundup
cal discharge while providing the highest levels of physical integrity. They also feature Pelco’s exclusive SureVision™ technology to capture superior images in difficult lighting conditions where highly contrasted lighting sources exist within the same scene. Some other features include an enhanced WDR of 130 dB, advanced low light performance with full color down to 0.05 lux, anti-bloom technology, 3D noise filtering, enhanced tone mapping for color accuracy, and more. Optera™ Panoramic Multi-Sensor Cameras provide completely stitched, seamless and blended 360°, 270° and 180° panoramic views with electronic PTZ capability across the entire panoramic image for superior wide area surveillance and forensic scene analysis. Featuring Pelco’s exclusive SureVision technology, Optera panoramic multisensor cameras capture superior images in difficult lighting conditions where highly contrasted lighting sources exist within the same scene. They also feature smart compression technology, which reduces bitrate usage, resulting in up to 70% savings on storage. Additionally, they are integrated with over 20 VMS solutions, including exacqVision, Genetec, Milestone, OnSSI, Vista, Verint and Qognify, to ensure seamless implementation and ease of use. Additional imaging solutions from Pelco highlighted at IFSEC, include: Esprit Enhanced ™ HD PTZ Cameras, which now include SureVision™ with 130dB of True WDR and low-light performance up to 20 times better than previous Esprit HD PTZ camera models. Built with Pelco’s iconic Esprit Series positioning system, these cameras deliver best-inclass image quality and pan/ tilt performance, and full HD 1080p 30x optical zoom. Esprit enhanced cameras are available with either standard or pressurized optical zoom modules that deliver exceptional image quality and highspeed positioning capabilities in the toughest outdoor environments. Sarix™ enhanced IP cameras offer the best in low-light performance and bandwidth utilization via exclusive SureVision™ and smart compression technologies. SureVision technology delivers exceptional WDR performance for the 94
most challenging lighting environments. Sarix enhanced IP cameras also feature preloaded analytics on every model, and are compatible with Pelco VMS as well as third-party VMS partners that support Pelco’s open API.
New IoT Radar Sensor with Avigilon Presence Detector
Discreet sensor combines self-learning analytics with impulse radar technology for up to 99% accurate detection of a person
T
he Avigilon Presence Detector (APD) is a sensor that combines self-learning analytics with impulse radar technology to accurately detect the presence of a person even if they have stopped moving or are hidden. This sensor is designed for indoor locations such as ATM rooms and other closed indoor vestibules within banks, pharmacies, health care facilities and retail stores, and can accurately detect a person’s presence through blankets, cardboard, wood and drywall. “Customers such as financial institutions face challenges in maintaining a safe and welcoming environment for their patrons,” said James Henderson, Avigilon’s Chief Operating Officer, “By accurately detecting and alerting security operators of events such as a person hiding or sleeping in an unwanted location, the APD provides an exceptional solution for maintaining safe and secure operations.” With a small and discreet design the APD can be hidden above ceiling panels or behind interior walls. Available in surface, corner or wall mount options it uses standard
The APD is a discreet sensor that combines self-learning analytics with impulse radar technology for up to 99% accurate detection of a person
SecurityLink India ■ 1 July 2017
CMYK
CMYK
National Roundup
IP security camera infrastructure and cabling, making installation fast and easy. The indoor impulse radar sensor, combined with self-learning analytics, scans and learns the environment, continuously adapting to reduce false positive events, providing extremely high accuracy in detecting the presence of a person at distances up to 9 meters from the sensor. “The launch of the APD marks an important milestone in Avigilon’s development of new IoT driven security solutions,” said Mahesh Saptharishi, Avigilon’s Chief Technology Officer, “The combination of sophisticated radar and analytics technology helps to solve the challenge of accurate human presence detection in constrained indoor areas where traditional devices may be limited.” The APD is expected to be available for order in the third quarter of this year. Avigilon Corporation provides trusted security solutions to the global market. Avigilon designs, develops, and manufactures video analytics, network video management software and hardware, surveillance cameras, and access control solutions.
Cloud-Based Solutions for Remote Monitoring
The internet helped revolutionize the security industry and technology continues to evolve at a speed and depth that is changing the way people protect their premises
C
loud technology has resulted in a society that is always connected. For the security industry, this means it is now possible to remotely monitor many locations from hundreds of miles away. This is an area where Vanderbilt solutions carry particular depth. A browser and an internet connection are all that’s required to access Vanderbilt’s flagship cloud products, ACT365 and SPC Connect. ACT365 is an integrated access
control and video management solution while SPC Connect is one of the strongest intrusion detection solutions on the market. Remote monitoring is the backbone feature of these solutions. This ability allows for the elimination of once laborious tasks that are now capable of instant execution through the quick click of a button on mobile or desktop devices. For example, Travix, an online travel company, that use ACT365 at their London offices wanted remote connectivity with their site through smart devices. ACT365 is delivering this by giving users control of access points via any major web browser or ACT365’s app. When not at the premises, Travix managers also have visibility of access requests to their external doors and diagnostics for door status throughout their offices. Remote monitoring also means that both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go, delivering ultimate control to site security. This enables site issues to be dealt with efficiently, minimizing disruption as these can be addressed immediately and around the clock. SPC Connect provides the ability for a caretaker that oversees maintenance for multiple buildings to manage alarms remotely. If an alarm is triggered at one of the sites while the caretaker is working at a different location, getting to the incident is logistically difficult. They simply take out their smartphone, access the SPC Connect app, view the event, manage the response and turn off the alarm. Essentially what remote monitoring boils down to is providing ease of use and convenience. Remote monitoring through cloud solutions saves time and money and brings peace of mind. With technology continuing to embed itself into our everyday life, it’s important the security industry proves its agility, adaptability, and dependability in keeping up with consumer needs and remote and instant access to security solutions are an obvious list topper here. In that sense, the remote monitoring provided by SPC Connect and ACT365 are proof that Vanderbilt’s ear is to the ground in 2017.
SecurityLink India ■ 1 July 2017
CMYK
95
CMYK
96
SecurityLink India â– 1 April 2017
96
CMYK
CMYK
97
SecurityLink India â– 1 April 2017
97
CMYK
CMYK
Annual Subscription: 1500/- for 12 Issues
“Security Link India” payable at New Delhi dated__________
* Please subscribe through admin@securitylinkindia.com
WE ARE UPDATING OUR DATABASE For free listing in Database:
For
Advertisement Contact:
editor@securitylinkindia.com
* Send your detail to admin@securitylinkindia.com
Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 98
SecurityLink India India ■■ 11 April July 2017
98
CMYK
0x270mm_v1.ai
CMYK
LIST OF ADVERTISERS
july 2017
S. No.
15
02.
05, 09 Gate Fold
04.
21/2/17
Page #
01.
03.
1
Company
S. No.
Company
Page #
08.
96-97
09.
13
10.
16
11.
07
12.
100
13.
16
10
06, 11 Back Cover
05.
33
06.
Inner Front Cover & 17
07.
08
6:17 pm
99
SecurityLink India India ■■ 11 April July 2017
99
CMYK
CMYK
100
SecurityLink India â– 1 April 2017
100
CMYK