Security Link India June 2017

Page 1





CMYK

2

5

SecurityLink India â– 1 April 2017

2 5

CCMMYYKK


CMYK

6

SecurityLink India â– 1 April 2017

6

CMYK


CMYK

SOLAR CAMERA 4G/ LTE/ Wi-Fi/ Hotspot Ready

For remote locations and temporary installations, where it is too complex or expensive to install a dedicated network infrastructure for a traditional surveillance installation. That’s when sparsh deployable solutions make a big difference. They are quick and easy to install, yet offer leading-edge surveillance.

FEATURES Totally self-contained wireless digital IP camera Use cellular network to send video stream to remote location 4G/3G/2G/Wi-Fi/Hotspot ready 2 way communication (optional) High-resolution up to 2MP Battery backup up to 48 hours Integral SD card storage SD Card support up to 128GB

HIGHWAY

For More Information Call:

+91 9555997755

RALLIES

DISASTER MANAGEMENT

BTS TOWER

CONSTRUCTION SITES

sales@sparshsecuritech.com

www.sparshsecuritech.com

SecurityLink India ■ 1 April 2017| Kochi | Bangalore | Chandigarh | Rourkela7| Patna Noida | Delhi | Mumbai | Kolkata | Coimbatore | Lucknow | Kanpur | Nagpur | Raipur

7

CMYK


IW2017_SecurityLink India_210x270mm_v3FA.ai

1

23/5/17

10:21 am

CMYK

C

M

Y

CM

MY

CY

CMY

K

8

SecurityLink India â– 1 April 2017

8

CMYK


CMYK

1 9

SecurityLink India â– 1 April 2017

19

CMYK


CMYK

10

SecurityLink India â– 1 April 2017

10

CMYK


CMYK

11

SecurityLink India â– 1 April 2017

11

CMYK


CMYK

From the Editorial Desk

(102 pages including 6 for cover) Volume I • Issue 11 • 1 June 2017 Editor-in-Chief Santosh Pathak Editor-at-Large Praveer Bagchi

Dear Readers, Greetings from SecurityLink India! Goods and Services Tax (GST), the most anticipated indirect tax regime has finally arrived and is operative from 1 July 2017. Hailed as one of the biggest and most significant tax reforms after Independence, the GST subsumes central excise, service tax, value added tax (VAT) and several other local levies to create a uniform market. The Government is highly upbeat about its implementation as well as ramifications, and so is the overall industry. The Finance Minister said that GST is the product of federal India which not only checks tax evasion but also helps evolving India become a very strong society. The Prime Minister opines the consensus on GST reflects the spirit of ‘one nation, one aspiration, and one determination.’ Notwithstanding the concept is generally receiving wide acceptance; the security, safety and fire industry is displeased and carries a mind of discontentment. The industry provisions the most essential prerequisites of today’s life, hardly ever a luxury one, and therefore they attract at least the lowest GST rate, if not exemption; but they are disheartened by the highest GST slab allocated to them. The Goods and Services Tax (GST) Council has broadly approved GST rates for goods at nil rate, 5%, 12%, 18% and 28% along with the rates of GST Compensation Cess to be levied on certain goods; subject to further vetting and corresponding changes. Hard to believe, the security, safety and fire products are bracketed in the highest 28% tax slab which contradicts and appears deterring to the government’s aspiration to grow a secured India which makes the basis for all developments. Security is indeed the basic right of citizens and equating it with the objects of opulence is not convincing, nor can that be justified. Though the scope of enhancements persists and stakeholders can yet raise queries and make recommendations for the enrichment of GST – a new Twitter Handle @askGST_GoI is also opened with the same purpose – but as on date, the security industry feels misled. The given GST rate will also impact the industry’s Make in India move adversely. Security Protection Group of India (SPGI) has been pivotal in attempting to secure minimum GST slab for security products. They have recently made a strong representation on behalf of and supported by the entire industry including other associations and eminent individuals to the Prime Minister, the Home Minister, the Finance Minister, the Ministry of Commerce; the Chairman, GST Council; the Ministry of Electronics and Information Technology, CII and Elcina. The issue is further elevated by a team of industry members led by RK Sinha, MP, and the founder of SIS Group. It is hoped that the issue will be favorably resolved and the industry will come out victorious. This is the time when the industry needs to show solidarity and stand united. Till next month, stay safe and happy reading! With warm regards,

12

12

Santosh Pathak Mob: +91 9968172237

SecurityLink India ■ 1 April 2017

12

SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Circulation Pulak Halder Design S S Rawat Portal Design & Maintenance Chaudhary Sushil Nayan Bhai Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)

CMYK


CMYK

13

SecurityLink India â– 1 April 2017

13

CMYK


CMYK

JUNE 2017

CONTENTS WHITE PAPERS

The Benefits of Safe Cities

34

Overcoming Challenges of Deployments on the Exterior of Trains

52

FEATURE ARTICLES When Surveillance Meets AI

74

Keeping Data Under Lock & Key

76

IP Camera Settings for Difficult Lighting Conditions

80

Distributed Cybercrime Attacks the World

81

Things to Demand from the Access Control Provider

83

NATIONAL ROUNDUP 18

MHA to Launch Portal

19

Hikvision Awarded

20

APDI Governing Council Meet

21

Infinova’s New Facilities in India

28

Vehant Speed Violation Detection System

22

• CP PLUS Body Worn Cameras • Matrix Awarded

29

Cisco Acquires Saggezza, Chennai

23

• Dahua’s Recent Exhibition Footprints • G4S India Appoints New MD

30

• COM-SUR at CCTV User Group Conference 2017

24

VIVOTEK Secures Cosmos Bank

31

Schneider StruxureOn Digital Service

25

Schneider Electric Awarded

32

Honeywell Outcome Based Service

14

26 27

CP PLUS Secures Kids in Transit • Edimax at Smart Cities India 2017 • Barco’s OpSpace Software Solution

• Edimax GP-101ET PoE Extender

SecurityLink SecurityLink India ■ 1 April June 2017 2017

14

CMYK


CMYK 17.- 20. Oktober 2017 Düsseldorf, Germany

PRODUCT SHOWCASE 57

Software House iSTAR Ultra Video • Dahua Eco-savvy 3.0 & 4K Camera • Pelco Sarix™ Enhanced IP Cameras

58

WD 10TB NAS-optimized Hard Drive

59

Motorola New TETRA Comm. Systems

60

Axis Explosion-Protected Cameras

61 62 63 64 65

• NICE Robotic Process Automation

PEOPLE

• Comnet Port Guardian Lockout QNAP NAS for Disaster Recovery Plan

MATTER.

• FLIR ETS 320 Thermal Camera • SeeTec Cayuga & BVI R10

Honeywell Toxin-Resistant Hood • Senstar FiberPatrol™-PR • Wisenet Integrates with Immix CS®

69

Red Hat Analytics-Driven Automation

70

HENSOLDT Counter-UAV Xpeller

73

17  -  20  OCTOBER  2017  DÜSSELDORF, GERMANY

Axxon Next 4.0.2

67

72

HEALTH AT WORK

• Safran’s New Mastercard

Thales CipherTrust Monitor 2.0

71

SECURITY

• Avigilon Expands H4 SL Platform

66

68

INTERNATIONAL TRADE FAIR  WITH CONGRESS SAFETY

CHALLENGES DO NOT   DISAPPEAR, THEY JUST   CHANGE.

• Suprema Launches BioMini Slim 2 • IndigoVision Control Center v14.2

The world of work is changing. And no one knows this better than the people in the workplace facing digitalisation, new technologies, increasing flexibilisation, and massive work intensification. Get set to meet these new challenges – with the sector’s No. 1 trade fair and its 1,900 exhibitors from all over the world.

• FERMAX’s Approach with VEO-XS • VIAKOO New Password Checker Verint CX Consulting Capabilities

APPLICATION/ CASE STUDIES

www.AplusA-online.com

44-51

INTERNATIONAL UPDATES

84-97

SecurityLink India ■ 1

15

Messe Duesseldorf India Pvt.Ltd. Centre Point 7th. Floor Junction of S.V. Road & Juhu Tara Road, Santacruz West Mumbai 400 054 Tel.2017 (0091 22) 6678 99 33 _ Fax (0091 22) 6678 99 11 April messeduesseldorf@md-india.com

15

CMYK

2017-04-25 A+A 2017_Indien_Allgemein_105 x 270 + 4mm_SecurityLink India_###_6221

56


CMYK

16

SecurityLink India â– 1 April 2017

16

CMYK


CMYK

Technology at its Best

V6202IR-TX720G Series HD Megapixel IP IR Bullet Camera

VP120 Series 8MP 180° HD Panoramic Minidome Camera

VH111 Series 2MP WDR IR IP Bullet Camera

VH221 Series HD 4MP IP IR Minidome Camera

VT231 Series 2MP Starlight WDR Intelligent IR IP Dome Camera

VP130 Series Megapixel Explosion-Proof Dome Camera

T

HD

2M

2M

Infinova India Pvt Ltd. Infino Road, Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, MundawaOffice By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Khara SecurityLink India ■ 1 April 2017 17 Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com Landl 17

CMYK


CMYK

NATIONAL ROUNDUP

MHA to Launch Portal

To Manage Private Security Agencies

T

he Ministry of Home Affairs, GoI, has recently developed a platform to manage licensing, training and compliance verticals of the Private Security Agencies Regulation Act (PSARA). The Act was enacted in 2007 to regulate functioning of the private security agencies. Passed as Federal Legislation, it was sent to all State Governments to follow the model rules, and develop mechanism to constitute state controlling authorities to commence licensing processes on the guidelines enumerated in the PSARA by the Central Government. Most of the State Governments delegated controlling powers to their state police departments and appointed their IGPs as State Controlling Authorities. The private security industry has been facing some functional difficulties due to non-clarity on various aspects of the legislation. Central Association of Private Security Industry (CAPSI), an apex association of the PSI has been representing to MHA to streamline the regulation processes so that the private security agencies could render services to their clients more efficiently, and also comply with the PSARA provisions. The Joint Secretary (Police Modernization), department of MHA was made nodal officer to coordinate with the state controlling authorities for effective implementation of the legislation. Training of the security guards, police verification and functional compliance were a few areas which could not be managed due to the lack of coordination among various state controlling authorities. T.V.N.S. Prasad, Joint Secretary (PM) convened a meeting of all state controlling authorities (SCAs) of PSARA at Jaisalmer House on May 26, 2017 in which a portal was shown to the participants. Through this portal, each SCA will be able to monitor the compliance of the provisions of the PSARA by licensed private security agencies. Application for the PSARA license is provisioned to be received online through this portal and processed by the SCAs. Police verification of the directors/ partners will be conducted by concerned police station though their computerized networks. Details of all security guards and supervisors, their police verification, training and wages shall also be managed through this portal. The renewal of licenses which is a major grey area shall also be addressed by sending prior notices to the PSI so that timely action can be taken. 18

The portal is developed by the Chandigarh Police, and was highly appreciated by all participants during the meeting. It was also decided that security training centers which are duly approved by the National Skill Development Corporation (NSDC) will be the authorized training providers. This decision ends the long standing ambiguity about training providers which was causing major problem to the PSAs. The working group which was constituted to make recommendations for the functioning of the security companies engaged in the Cash-in-Transit business also presented its report at the forum. The report was approved under which specifications for the fabrication of cash carrying vehicles have been defined to endure total security of the cash and valuables. It was also clarified that only companies having valid license under PSARA will be permitted to carry out the business of CIT. The MHA has also decided to launch a public awareness campaign to highlight the PSARA to seek public support to create safe and secure environment in the country. Mamta Singh IPS, IGP Haryana presented her report on the implementation of PSARA. The report was accepted by the committee. Kunwar Vikram Singh, Chairman of the Central Association of Private Security Industry (CAPSI) along with Anil Puri, Vice President, and Mahesh Sharma, Secretary General also participated in the discussions. Maj. Gen. K Majumdar, COO of the Security Sector Skill Development Council, raised the issue of certified security guards being trained by NSDC approved training partners. Rituraj Sinha, Vice President, Security Committee of FICCI, along with Manjari Jaruhar, former DG, CISF assured support to the initiative taken by the MHA.

SecurityLink India â– 1 June 2017

CMYK


CMYK

NATIONAL ROUNDUP

Hikvision Awarded at ‘MUNICIPALIKA & CAPEX 2017’ Hikvision Wins Prestigious Award at ‘MUNICIPALIKA & CAPEX 2017’

H

ikvision has received a prestigious award at the recently held ‘MUNICIPALIKA & CAPEX 2017,’ the 14th International Exhibition on ‘Smart & Sustainable City Solutions’ at CIDCO Conference & Exhibition Centre, Navi Mumbai. Canada was the partner country of the event for the third year, Singapore, the feature country, and the Government of Rajasthan, the partner state. There were 10 sessions of conferences covering important topics related to ‘Smart and Sustainable Cities,’ and over 1000 delegates from all states and union territories across the country attended the event. 170 exhibitors from 300 cities in India and abroad participated and showcased their technologies, equipment, products, software and services during the span of three days. The mega event was inaugurated by Mrs. Maya Singh, Minister for Urban Development & Housing, Government of

Prama Hikvision (India) Pvt. Ltd. team receives award from Dr. Sudhir Krishna, Former Secretary, Ministry of Urban Development, Government of India

“The best always stands out. We are glad that our security products have been selected as the best integrated urban solutions. That gives us a fillip to use our products with confidence in various ongoing smart cities projects that we are in, and ensure that the customers will duly benefit from them. We have in fact offered these solutions at the affordable price range which will enable more similar projects across India to derive maximum mileage.” – Ashish P Dhakan CEO & Managing Director, Prama Hikvision (India) Pvt Ltd Madhya Pradesh. Hikvision’s security products and solutions were adjudged as ‘The Best Integrated Urban Solutions’ by a panel of distinguished judges taken from different industries. The Award Shield and the Certificate were presented to Hikvision by Sudhir Krishna, Former Secretary, Ministry of Urban Development, Govt. of India at an impressive awards function. Hikvision showcased its cuttingSecurityLink India ■ 1 June 2017

CMYK

edge security solutions in mobile, IP, intelligent traffic and access control, and innovative products like PanoVu and Ezviz. Its well-designed elegant booth attracted a large number of visitors that included Mayors, Municipal Commissioners, dignitaries, delegates, dealers, town planners, IAS officers, senior government officials, security & intelligence professionals, corporate heads and prospective clients and customers. 19


CMYK

NATIONAL ROUNDUP

APDI Governing Council Meet Indian private investigators to attend Interpol World Congress at Singapore

T

he Governing Council of the Association of Private Detectives & Investigators of India (APDI) has recently met at PHD House, New Delhi. The Council was attended by eminent former high ranking bureaucrats, intelligence and police officers including N C Padhi, former Secretary Security, Cabinet Secretariat, Government of India; Anil Chaudhary, former Secretary, MHA, Government of India; M L Sharma IPS, former Special Director CBI & DGP, Rajasthan Police; B S Sial, IPS, former DGP, Karnataka Police; and Suresh Dhundia, former Joint Secretary, MHA.

Ashok Prasad, who has recently retired as the Secretary, Internal Security, Ministry of Home Affairs attended the meeting as a Special Guest. Presently he is working as the Advisor to the Ministry of Home Affairs. Subhash Wadhawan, National President, APDI in his opening remarks, admired the feats of APDI and the growing professional excellence and credibility of its investigating professionals, not only in India but around the international sphere. It is a great honour for APDI, and for India that the Chairman, Kunwar Vikram Singh has been elected as the

Announcements during the Meet ●

Indian private investigators to attend Interpol World Congress at Singapore during 4-7 July, 2017.

The Annual WAD Conference to be held at Shangri-La Hotel, New Delhi during 9-14 October 2017.

CAPSI & APDI Annual Conference to be held at NDMC Convention Center, New Delhi on 15 October 2017.

20

SecurityLink India ■ 1 June 2017

CMYK

President of the World Association of Detectives (WAD). WAD is the apex global body of the investigation and security services which was formed in 1925 and is functional in 124 countries. The 92nd Annual WAD Conference will be held at Shangri-La Hotel, New Delhi during 9-14 October 2017 where more than 100 foreign delegates from various countries are expected to participate. The Chairman also unveiled the ‘logo’ for the Conference. The Council decided to participate in the forthcoming Interpol World Congress at Suntec Convention & Exhibition Centre, Singapore during July 0407, 2017. This is the first time that the members of APDI who are also members of World Association of Detectives (WAD) shall be participating in the Interpol conference. The WAD-APDI delegation will be led by Kunwar Vikram Singh, President of WAD.


CMYK

NATIONAL ROUNDUP

V M Pandit, former President, APDI gave a presentation on the upcoming Interpol World Congress and educated the audience about it. He pronounced its theme as ‘Fostering Innovation for Future Security Challenges’ and clarified that WAD is partnering with Interpol in its new project to involve professional associations in community safety and crime prevention. More than 19 members of WAD based in India have consented to attend the event. Kunwar Vikram Singh, Chairman, APDI informed the Council that on an invitation from the Ministry of Home Affairs, an APDI delegation headed by him and constituted of Subhash Wadhawan, National President; Pawan Ahluwalia, MD, Premier Shield, Advisor; C Pal Singh, former IGP, Advisor; Mahesh Sharma, Secretary General; and V M Pandit, met the MHA officials at a meeting which was chaired by the Secretary (BM) MHA, and attended by the Additional Secretary and the Joint Secretary (PM) MHA. A number of IGPs of the state police department and representative from BPR&D were also present there. The meeting was held to discuss the status of the Private Detectives Agencies Regulation Act (PDARA) which is expected to be re-tabled in the Rajya Sabha in upcoming session of the Parliament.

The APDI delegates impressed upon the option of introducing a new legislation in which the regulatory role should be given to APDI, in the similar manner as other professionals like advocates, doctors, charted accountants and engineers are being regulated through their respective associations as per the regulatory processes passed through pertinent Acts of Parliament. The Chairman indicated that the officials of the MHA were inclined to the suggestions given by them. However, the MHA expressed their concerns over the quality of training needs to be imparted to the private investigators, and emphasized that the National Occupational Standards for Private Investigators drawn by SSSDC and approved by NSDC should be examined by a committee of the MHA. The other eminent participants also marked notable words of appreciation, suggestions and updating at the forum of the APDI Governing Council. The Governing Council was attended by chapter presidents from Punjab, Delhi, Gujarat, MP, Karnataka, Tamil Nadu, Rajasthan, Maharashtra, Bihar, West Bengal, Haryana, Goa and Himachal Pradesh respectively. National office bearers of APDI were also present there.

SecurityLink India ■ 1 June 2017

CMYK

New Facilities at Pune & Hyderabad

I

nfinova entered the Indian Market in 2007 and since then, it has been a prominent brand under video surveillance segment. Infinova has always been among the top choices for a video surveillance requirement in critical infrastructure projects such as city surveillance, airports, railways, metros, and industrial and defense sectors. To cater to the growing demands for surveillance products in the critical infrastructure projects in India, Infinova has recently procured a large facility at Pune to assemble all major products for sale in India. This facility is expected to be operational by the end of July, 2017. They have also confirmed a large warehouse at Hyderabad that will also fulfill their service support expansion requirements, and support all the large projects in the south region including Hyderabad city surveillance and community CCTV projects. The company is also to host a local R&D center which would enable quick customizations, firmware development, product improvement etc., to serve customers better. These make major leaps towards ‘Make in India’ movement. Infinova is focused on delivering solutions, and not just products. They work closely with their partners. They help them design and deliver the solution, and also assist and educate them on various aspects to ensure a win-win deal. This makes Infinova an Integrators’ Manufacturer. Infinova Group is an ISO 9001 certified company, headquartered in USA and has more than 10 subsidiaries in over 30 countries around the world. They have dozens of sales branches and offices, and nearly 1,900 employees and operations in more than 100 countries. 21


CMYK

NATIONAL ROUNDUP

Body Worn Cameras Matrix Awarded Keeping our police force a step ahead India SME100 C Award P PLUS has recently unveiled its range of body worn solutions that includes body worn cameras, data management terminals, PC software, and related accessories. Designed to be worn on the body these cameras serve as a great tool in aiding police forces to record and deter civil misconduct. “Body Worn camera solutions not only ensure that the truth in the event of an incident is captured, but also safeguard the safety and conduct of officers. These cameras have been designed keeping in mind the needs of such security professionals,” said Yogesh B. Dutta, COO, CP PLUS. The CP PLUS body worn cameras, with their rugged features and compact design, offer robust and reliable performance across harsh environments. They feature 1080p resolution for distinct images; LED screen for live monitoring; GPS enabled tracking; Wi-Fi support; 8 hrs power backup; built-in storage of up to 128GB; flash light for low light conditions; and wide area coverage of up to 130 degrees. These cameras also support a walkie-talkie and an additional camera. The body worn cameras also offer effortless recording, automatic data backup, live transmission, GPS coordinates, classification, storage, search, playback, and analysis. Coupled with the CMS at backend, CP PLUS body worn solutions enable auto data archiving, authority access control, report analy-

M

atrix has recently been declared one of the India’s top 100 SMEs, after having undergone stringent evaluation criteria laid down by the India SME Forum Jury Board. The winners were chosen out of 41,832 companies which were nominated on the basis of their financial and non-financial parameters. On winning this prestigious award, Ganesh Jivani, CEO of Matrix said, “Matrix is focused on designing, manufacturing, and marketing cutting-edge security and telecom

Ganesh Jivani, CEO of Matrix (3rd from right) receiving the Award

sis, task evaluation, and emergency command and centralized storage; making it a reliable, secure, competitive and factual solution for on-field patrolling. CP PLUS body worn cameras can be beneficial for city police, traffic police, national security guards, forces at the border, customs officers, naval officers, fire fighters, and for private security guards as well. 22

solutions for modern organizations. We export products to more than 50 countries – most of them to technologically advanced ones. R&D is one of the core drivers of Matrix business where we invest heavily. We have 250+ R&D engineers on our rolls. This award is a validation to the Matrix's innovation capabilities. I thank all our customers and channel partners for their trust and congratulate the entire Matrix team for this achievement. We also thank the India SME Forum for recognizing Matrix which would encourage us to work harder towards building world-class, cutting-edge technologies and products.”

SecurityLink India ■ 1 June 2017

CMYK


CMYK

NATIONAL ROUNDUP

Dahua’s Recent Exhibition Footprints D

ahua Technology has showcased its innovative products and solutions across 8 global exhibitions in USA, UK, India, Brazil, Kazakhstan, Algeria, Ireland and Taipei during April 2017. Dahua showed its comprehensive portfolio of products and solutions in these exhibitions including HDCVI 3.0, thermal cameras, IP solution, safe

Secutech – Taipei

city solution, intelligent building solution, intelligent transportation solution, consumer series and industrial drone to exhibition visitors around the world. During Secutech Taiwan held from April 12 to 14, Dahua IPC-HF81235EN received the 4K Camera Outstanding Feature Award out of Secutech Excellence Awards 2017 for its image quality and performance. Secutech awards are a prominent competition for high

Secutech India – Mumbai, India

definition surveillance products around the world. At ISC Brazil from April 18 to 20, Dahua drone flew through the sky and showed high definition real-time aerial views over the city. In the upcoming months, Dahua will continue to participate in global wellknown security exhibitions to reach customers in different geographies.

Rajeev Sharma Elevated as Country Managing Director for G4S India G

uted significantly to the 4S India appoints Ragrowth of the given portjeev Sharma as the folio. Earlier he headed the Country Managing Director, cargo division of Kingfisher G4S India. In his new role, Airlines in India and accuRajeev will report directly mulated worthy experience to Claude Allain, President, in the logistics space. He G4S Middle East and Asia. also brings with him knowlRajeev has had a long edge of cross border acquisiand successful journey with Rajeev Sharma tions. G4S. Prior to the new role, In the past, Rajeev had also underhe was the Managing Director of G4S India’s Secure Solutions’ India business taken a successful two-year stint in the where he demonstrated commendable UK, where he integrated acquired assets degree of professionalism and contrib- for G4S and demonstrated his acumen SecurityLink India ■ 1 June 2017

CMYK

by acquiring a manned guarding company for the firm. Commenting on the appointment, Claude Allain, President, G4S Middle East and India remarks, “I would like to invite all members of G4S to join me in congratulating Rajeev for his new role and in ensuring that he gets all the support he needs to take G4S to even greater heights. Rajeev’s appointment reflects the strength of our succession planning through having the right people in place ready to take on new opportunities.” 23


CMYK

NATIONAL ROUNDUP

Cosmos Bank Collaborates with VIVOTEK Also to Safeguard the People of Pune

Secures the premises of the bank for complete security of the institution and its valued patrons

F

acilitating effective monitoring using state-of-the-art security systems, Cosmos Co-operative Bank associates with VIVOTEK. The financial heart of the city of Pune has improved its security with VIVOTEK to safeguard not juts its premises, but its greatest asset as well i.e., Puneites. Established in 1906, Cosmos Bank is one of the oldest and largest banks in

India. Headquartered in Pune, it has a huge network of 140 branches in India, spread across 7 States and 39 major cities. Cosmos Bank is located on the University Road, which is at the very heart of this bustling city. Considering the size of the city, the number of inhabitants and the location of the bank, any security system for such an institution had to be both up to date, and ahead of times. Thus, in its risk mitigation plan, Cosmos bank decided to rope in VIVOTEK as its security solution provider. A total of 132 VIVOTEK network cameras were installed across the headquarters of the bank.

“The bank is headquartered in a building which has an inbuilt data center and a high security safe. As Pune, popularly known as the Oxford of India, is a typically dense and complex city, close to Bombay, a high level risk and threat assessment was done as a part of the overall risk mitigation strategy. The key areas that were identified include threats to people; to property; and to the image of the Bank. Cosmos roped in Bajaj Electricals for the design, engineering and solution implementation. The need was ripe for a smart surveillance system that not only ensures the easy flow of pedestrians and vehicles but also guarantees the comfort of the employees and customers. Post extensive research revolving around compliance, security gaps etc., the bank chose VIVOTEK’s ace solutions as the ideal alternative which can meet all the chief challenges, facing Cosmos Bank.” – Sanjeev Gulati India and SAARC Country Manager, VIVOTEK INC. 24

SecurityLink India ■ 1 June 2017

CMYK

For the interior areas of the bank, including the main floor area, the lifts and the lobby, 103 FD8136 ultra-mini fixeddome network cameras were employed. It features a megapixel sensor enabling viewing resolution of 1280px800p at 30fps. Its tiny size of only 90mm in diameter and an in-built microphone and speaker further enhance the powerful camera. The small profile and wide view of the camera are as good as large unsightly cameras when it comes to protecting Cosmos’s employees, customers and property. Similarly, for the basement parking area, 29 IP8335H bullet-network cameras were deployed. This camera features an HD WDR CMOS sensor for use in challenging lighting conditions. The day and night functionality and the IP67-rated weatherproof housing of the IP8335H allowed the bank a cost effective IP surveillance system. Incorporating an IR-cut filter that can be removed automatically at night and a built-in IR illuminators with coverage for up to 20 meters, the IP8335H secured Cosmos Bank’s parking area all day, every day. Finally, 4 SD8326 speed-dome network cameras secured the periphery of Cosmos Bank’s headquarters. This camera’s varifocal lens, IR and 36x zoom, empowered the Bank’s security team to identify and recognize objects and number plates, even in the dark of night, while its rugged housing ensured that bad weather would never mean a lapse safety for Cosmos Bank’s real treasure, the people of the city of Pune.


CMYK

NATIONAL ROUNDUP

Schneider Electric India Bags

AON Best Employers India 2017 Award S

chneider Electric India has recently been conferred the AON Best Employers Award for the year 2017. Aon Hewitt, is the global leaders in human resource solutions. The award comes as recognition of the futuristic and impactful people practices of the company which have been instrumental in inspiring strong commitment, deeper engagement and superior performance from the workforce. The award was received by Anil Chaudhry, Country President and Managing Director, Schneider Electric India along with Rachna Mukherjee, CHRO, Schneider Electric India, at an award ceremony in Mumbai. On receiving the award Anil Chaudhry stated, “I express my gratitude to all the employees on their engagement, commitment and hard work to make Schneider Electric a great company and a great place to work.” The recognition comes after a robust six-month long evaluation process. It is an outcome of a rigorous analysis to measure the alignment between ‘Intent-Design-Experience,’ assessed through CEO survey and interview, people practices survey and employee opinion survey for all participating organizations. A shortlisted set is taken through an intense on-site audit to validate the details provided. The selection also took into consideration successful people initiatives on talent, succession, well-being, and diversity and inclusion that Schneider Electric has been undertaking over the years. The final analy-

sis of the shortlisted organizations was conducted by an external panel of jury made up of corporates, academicians and industry leaders. Sharing her delight on receiving the award, Rachna Mukherjee said, “It gives us immense pleasure to be honoured at this platform which recognizes our commitment to our most valuable asset which is our employees. An or-

age internal talent. It also attracts the best and diverse external talent with its promising employer value proposition that is structured on the 8 pillars of meaningful purpose, unique company, diverse and inclusive, well-being, high performance culture, strong belief in people, authentic leadership and technology and digital. The organization’s policies are focused towards creating a

Team Schneider with the Award

ganization requires a holistic approach for the employees to feel engaged, motivated and recognized to deliver high performance for the organization, the award acknowledges this. We embrace the responsibility it puts on us to make our people practice stronger year on year. I would like to thank our employees for making this possible.” The underlying tenet at Schneider Electric has been to nurture a culture of authentic and inspiring leadership and practices that empower employees. Schneider Electric India’s talent and career priority helps nurture and encourSecurityLink India ■ 1 June 2017

CMYK

high-performance culture by empowering its employees with the right tools and policies, and addressing the requirements of successful operation in a digitised world. On the occasion, Tarandeep Singh, Partner and Chief of Commercial Excellence, Aon Hewitt said, “Congratulations to Schneider Electric for its people initiatives and its efforts in creating the best in class and engaged work environment. It is a well-deserved recognition for Schneider Electric’s outstanding people priorities journey over the years.” 25


CMYK

NATIONAL ROUNDUP

Securing ZSE Kids in Transit

CP PLUS secures Zydus School buses in Ahmedabad to make travelling to school and back home safer for the school students

Z

ydus School of Excellence (ZSE) is one of the most prominent schools in Godhavi, Ahmadabad, housing over 1000 children. The school runs its own fleet of busses that transits students from home to school and back, and of late the management has been looking for a way to secure and manage its bus services more efficiently.

Mission

T

he Zydus school busses run long haul to pick up and drop children from different corners of the town. Delays in pickups and drops often become a matter of concern for both parents and school authorities.

Confronted by the safety concerns of its students the school management realized its busses needed surveillance and monitoring that would help them keep track of the behavior of the vehicles/ drivers and keep a check on any discrepancies that occur.

Solution

A

total of 33 busses ply every day, and after having surveyed the buses and their corresponding routes, a comprehensive solution was designed. Each bus was fitted with 2 high resolution analog cameras, installed at its entry and exit points, and a CP PLUS state-of-the-art MDVR with HDD for recording. Ideal for mobile surveillance, CP PLUS MDVRs offer tamper proof, shock proof, and anti-vibration features, along with their unique rugged design for worry free recording. These MDVRs are GPS enabled to tag video evidence with the current location. Also included in the solution is enterprise-level data management software to monitor and manage end-toend evidence. The challenge, however, was the short time within which the project needed to be delivered, and also rare availability of the vehicles. Limited access to electricity also posed a significant challenge, requiring the use of special battery operated tools.

Impact

T

he CP PLUS solution completely satisfied the surveillance demands of the school management. The management was able to track the movement of all their busses at all times easily. The solutions not just ensured that the busses were punctual, but also kept a track of the students, driver behavior and anyone other than the designated people within the vehicles. “The project was challenging with a very short TAT, and the dependence on the availability of the vehicles. However, the project was delivered within the stipulated time frame, and the results thereafter satisfied the customer, thereby making the project a success,” said Mehul Goswami, Addon Technology, Partner to the project.

26

SecurityLink India ■ 1 June 2017

CMYK


CMYK

NATIONAL ROUNDUP

AirBox Air Quality Monitoring System Showcased at 3rd Smart Cities India 2017 Expo

Receives great response for its Edimax Pro series range of products in event

E

dimax Technology showcased Edimax Pro solutions in recently held 3rd Smart Cities India 2017 Expo, New Delhi that is focused on smart governance, smart safety, smart environment, smart grid, smart mobility, smart buildings, and so on; all enabled through the use of ICT. They showcased Edimax Pro range of products and Edimax AirBox air quality monitoring system which can measure harmful PM2.5 levels in the air accurately across different smart cities. “It was an amazing opportunity for us to be a part of the Expo which we believe will help building Smart India and allow it to emerge as a global leader. It will create a holistic ecosystem fulfilling vision of advanced and modern urbanization,” said Sanjay Joshi, Country Man-

ager at Edimax, India & Sub-Continent. With over 30 years of experience, Edimax has grown to be among the world’s leading manufacturers of advanced network communication products. Edimax is staunchly working towards the design, development, manufacturing and marketing of a broad range of networking solutions. Edimax has wide range of

consumer and business solutions and received ISO 9001 and ISO 14000 certification in 2003, won Computex Design & Innovation Award and also ranked in the top 35 most valuable international Taiwanese brands by Interbrand in 2014 iF Design Award 2014, Red Dot Design Award 2015 and Taiwan Excellence Award 2016.

OpSpace: Faster is Better

Barco’s Patent-Pending Operator-Focussed Software Solution

Barco demonstrates the capabilities of the state-of-the-art collaborative solution to partners, end-users, and consultants at a premium event in Bengaluru

B

arco has recently conducted a cutting-edge training module for system integrators and end-users in Bangalore. Held at Hotel Taj Vivanta, the premium event was attended by over 30 Barco partners and consultants, as well as more than 50 end-users. Barco also utilised the opportunity to show-

case OpSpace, its patent-pending operator-focussed technology, demonstrating how mission critical control rooms can benefit by optimising operator efficiency and enhancing operational effectiveness. OpSpace is one of the first visual workspace software solutions that creates a single operational canvas by SecurityLink India ■ 1 June 2017

CMYK

combining any number of existing displays on operators’ desks and allows them to view, monitor, and interact with multiple operational systems possibly residing on different secured networks. By allowing all relevant information to be consulted and manipulated within a single pixel space with just one mouse 27


CMYK

NATIONAL ROUNDUP

and keyboard, this state-of-the-art software solution puts the operator at the centre of the information flow with all their subsystems within easy reach. Operators can launch and interact with any application in the work area with just one click, while maintaining an overview of all the other applications in their peripheral vision for total situ-

ational awareness. This provides a more ergonomic, efficient and intuitive way of working, and aids in lowering stress levels while enabling better decisionmaking and time management. Speaking on the announcement, Tanuj Bhatnagar, Director Sales said, “OpSpace is a visionary technology that has completely revolutionised the way

control room operators interact with various legacy system, subsystems, and applications around the world. This is what we wanted to highlight with this demonstration, which received an impressive response from our partners and end-users for enabling unparalleled operator efficiencies. We are confident that the interest generated at the event for this state-of-the-art collaborative solution will translate into significant market traction in India.� OpSpace also allows operators to individually manage different security clearances and liability concerns in a hassle-free manner. In addition to showcasing OpSpace capabilities, Barco also held personalised demo sessions for participants and allowed them to experience how it can boost operational effectiveness and efficiency. The company also conducted demonstrations for its virtual reality (VR) solutions, as well as its flagship collaboration solution, ClickShare, at the event.

Speed Violation Detection System W

ith technological advancements, traffic police across India have developed an urge to employ smart traffic management solutions which are able to provide prompt information to authorities to proactively manage the ongoing traffic situation and allow citizens to make informed travel choices. Smart traffic management solutions reduce the overall burden of traffic on roads reducing the probability of road accidents upto a remarkable extent. Intelligent

28

SecurityLink India â– 1 June 2017

CMYK

traffic enforcement systems like speed violation detection system are part of a centralized approach to modern traffic management. This has arisen from the need for more cost-effective and efficient monitoring of traffic.

Data analysis

A

s per NCRB report on traffic accidents, a rising trend is seen in an absolute number of deaths during last three years 2013-2015. Number of


CMYK

NATIONAL ROUNDUP

hicles such as stolen, wanted, suspected ones, responding quickly to accidents and monitoring the situation effectively, ensuring safe and clear passage for commuters, reducing manpower on the field and so on. Currently the speed violation detection system is being utilized by Police in cities like Bengaluru, Gandhinagar, Jaipur, Ahmedabad, Vishakahapatnam etc.

Cisco Acquires Saggezza, Chennai Cisco acquires the Advanced Analytics Software and team of Saggezza, Chennai

deaths have increased by 4.9% in 2015 over 2014 (from 1,69,107 in 2014 to 1,77,423 in 2015).

Speed violation detection system

T

he objective of speed violation detection system is to track the vehicles that violate traffic regulations and over-speed. It detects the speed of the vehicle on stretches of highways, traffic junctions etc., and reads the number plates, and produce alerts on the userfriendly graphical user interface (GUI) in the case of violations – it highlights ‘over-speeding vehicle’ if the vehicle is detected over-speeding. This system allows the users to define the category of vehicles as they want and generate alerts of the same at the central location. The speed limit is also configurable and can be assigned to the system according to the requirement. The solution is useful in avoiding fatal accidents, identifying hot-listed ve-

S

an Jose based Cisco has recently announced their acquisition of the advanced analytics team, and associated advanced analytics intellectual property developed by Saggezza, a privately-held technology services company based in Chicago for an undisclosed sum. Saggezza has offices in Chennai and Santa Clara. The acquisition is aligned to Cisco’s strategic goals to develop innovative big data analytics and cloud technologies, while also cultivating top talents. This talent acquisition brings unique expertise in analytics, cloud and secure platform development. Given the importance of analytics for optimizing network performance, these capabilities will complement Cisco’s digital network architecture (DNA). By adding a team of analytics experts, Cisco will augment its current analytics capabilities and improve insights into network performance and automation, accelerate Cisco DNA development efforts, and enhance the SecurityLink India ■ 1 June 2017

CMYK

cloud and SaaS analytics offerings. The acquisition is a reflection of Ciscos’s strong belief that analytics will play a critical role in the building of next-generation networks designed for an era of cloud, IoT and pervasive security threats. The advanced analytics team will join the Cisco Enterprise Networking Engineering Group, led by Ravi Chandrasekaran, SVP. The advanced analytics team is a select group of platform analytics experts within Saggezza with unique capabilities in cloud and secure platform development. This team has been responsible for developing innovative technology that powers Saggezza’s internal analytics platform, which enables customers to rapidly acquire and analyze data, creating complex rules and new data visualization applications. With this announcement, Cisco acquires a cohesive and highperforming team of analytics experts to bolster ongoing innovation in this space. 29


CMYK

NATIONAL ROUNDUP

C

COM-SUR at the CCTV USER GROUP Conference 2017

om-Sur shall be going to be present at the prestigious CCTV User Group Conference in June 2017, being held at Kenilworth, United Kingdom. The CCTV User Group was formed in the year 1996 when the use of CCTV video surveillance in public spaces was rising rapidly. There was enough availability of government funding, but not enough experience amongst people to use the systems, hence the birth and rise of the group. The objective of the group is to (i) provide help, assistance, professional advice and opportunities for networking for those involved in the development; (ii) management and operation of public area CCTV systems; (iii) encourage best practices; (iv) encourage the introduction of universal stand-

ards for the implementation and use of CCTV; (v) promote the effective and efficient operation and management of CCTV systems; (vi) formulate nationally recognized standards by which all end users of CCTV shall abide; (vii) promote the need for the professional training of CCTV managers and operators and encourage the development of appropriate courses; (viii) discourage the unnecessary or inappropriate proliferation of CCTV in public places proposed without justification by an ‘operational requirement;’ and (ix) discourage the use of public area CCTV surveillance methods by any groups or organisations which are not publicly accountable. “This is the 7th year of the conference and it is a tremendous platform for

us to reach out to the CCTV community, especially potential partners. The conference will see great minds such as Tony Porter, the UK’s Surveillance Camera Commissioner, DCI Mick Neville, amongst others. We have also been given an opportunity to speak about our philosophy of auditing CCTV cameras. The technology has immense potential and COM-SUR will bring large benefits to the entire world. Whether it is the government, defense, airports, banks, ports, the police or any other law enforcement agencies, an individual, a jeweller, a retailer, a school, a religious institution, a hospital, a hotel, a bank or any other entity of relevance, COM-SUR has a ‘must have’ technology for all,” says Gautam Goradia, CEO & MD, COM-SUR.

Extend PoE Distance upto 300 Meter with

Edimax GP-101ET PoE Extender Helps customers to capitalize Ethernet technology without distance limits

E

signed in order to meet our customer's expectations at affordable prices to provide scalability and effectiveness, and upgrade powered devices for superior performance,” said Sanjay Joshi, Country Manager at Edimax Technology, “It is highly reliable for all environments including enterprises, hospitality, institutions etc., where performance is critical for different business applications and 100 meter PoE distance hurdles. Now a

dimax Technology introduces Edimax GP-101ET Gigabit PoE+ Extender which increases the capacity up to 100 meters (328 ft.). It is a 1-Port Gigabit PoE extender with plug and play installation which require neither configuration nor extra electrical power, making it an innovative and cost-effective PoE repeater. “Edimax GP-101ET is the best in class solution which is specially de30

SecurityLink India ■ 1 June 2017

CMYK


CMYK

NATIONAL ROUNDUP

PD can go upto 300 meter distance from the PoE switch by using PoE extender.” Edimax GP-101ET extender can be connected to any IEEE 802.3at/ af endnodes such as WLAN AP, network cameras, VoIP telephones and IP-based appliances where the IEEE 802.3at/ af inline PoE port is supported. It enables Ethernet cable to carry both data and power beyond the 100 meters limitation for another 100+100 meters. This reduces the need for installation and eliminates the need for electrical outlets on the wall, ceiling or any unreachable place. It renders lower installation costs, simplified deployment

efforts, and no additional power supply or setup required for easy plug & play installation. Edimax GP101ET also

features PoE short circuit protection to safeguard network devices and protect against damage.

Schneider Electric Announces New StruxureOn Digital Service for Data Centers S

chneider Electric has recently introduced StruxureOn™, a digital service that connects data center physical infrastructure assets to the Schneider Electric cloud enabling the delivery of simplified and faster services. With realtime visibility into system performance, maintenance and service requirements via mobile app, StruxureOn data-driven analytics can proactively advise of potential failures, fundamentally improving the ability to service critical equipment prior to failure. As part of the digital service, Schneider Electric’s Service Bureau personnel is readily available to remotely troubleshoot an issue or, in cases that can’t be addressed remotely, dispatch a field service representative armed with the necessary information and equipment to quickly resolve the issue and minimise

downtime. Schneider Electric’s Service Bureau acts as a ‘second set of eyes’ providing around the clock incident monitoring so that data center and facility managers can rest assured that immediate action will be taken to curtail the impact on data center operations.

IoT-powered Data Centers

Today, as data center managers face tightening budgets, growing cus-

● New StruxureOn connects customers’ assets to Schneider Electric’s cloud to deliver faster issue resolution and digital services. ● Harnessing the power of IoT to predict and prevent incidents and downtime in data centers. ● Supported by 24/7 Schneider Electric Service Bureau. SecurityLink India ■ 1 June 2017

CMYK

tomer demands on data center performance, and an increasingly competitive market, optimizing operations while staying within financial confines has become a significant challenge,” said Sudhir Puthran, Vice President Services, Greater India Zone, Schneider Electric, “With StruxureOn, Schneider Electric is harnessing the power of IoT to give data center and facility managers the insights, tools and support they need to proactively predict and prevent incidents and system downtime.” Schneider Electric is bringing IoT to the data center with StruxureOn, optimizing the way that data is analysed, stored and delivered as actionable information to improve decision-making around data center maintenance, uptime and incident management. “Cloud services and IoT are sweep31


CMYK

NATIONAL ROUNDUP

ing through industry, with major digital transformations under way at many of the world’s largest corporations,” said Rhonda Ascierto, Research Director, Datacenter Technologies, 451 Research, “The IoT initiative at Schneider Electric appears to be wide reaching and StruxureOn is a move that could fundamentally change the DCIM software market as well as the data center services engagement model. Schneider Electric seems positioned to be an early

leader with the scale to achieve longterm success.” Talking about it as a key industry differentiator, Venkatraman Swaminathan, Vice-President, IT Division, India Zone said, “StruxureOn represents a fundamental change in the way that we will use automation to improve data center management and operations. By offering a viable alternative to traditional, on premise approaches, Schneider Electric have introduced the first

big disruption to the data center software market. As Gartner noted in their recent magic quadrant for data center infrastructure management (DCIM) tools, one of Schneider’s strengths as a leader is in its ability to offer flexible pricing, making the software offer appropriate for anyone managing even a small data center. StruxureOn continues this theme of flexibility with one major difference, the standard offer is currently free to the user.”

Outcome Based Service For Connected Buildings Management

H

oneywell has recently introduced a new cloud-enabled building management service that prioritizes the most impactful maintenance activities to optimize building performance. Combining advanced automation and data analytics, outcome based service enables Honeywell service engineers to watch building assets around the clock, identifying anomalies faster than traditional maintenance, and saving them time and money. Without close monitoring, energy consumption can drift by up to 7 per-

32

cent annually. The service taps building connectivity and sensors to ensure that building equipment is performing at its best. Early pilots show reduction in energy spends and reactive service calls. “Data provides valuable insights about building health if you have the right combination of technology and expertise to efficiently gather and analyze it,” said Aseem Joshi, Regional General Manager of Honeywell Building Solutions in India, “With outcome based service, Honeywell makes the most of internet connectivity to essentially listen to what a connected building has to say, providing actionable insights to improve performance. Instead of repeatedly reviewing a time-consuming checklist, the Honeywell outcome based service optimizes efficiency and tracks performance real time.” Outcome based service provides the following actionSecurityLink India ■ 1 June 2017

CMYK

able insights: ● Real-time analytics: Honeywell’s analytics evaluates facility data realtime to find issues faster, improve performance and efficiency, decreasing maintenance time. ● Dynamic tasking: Instead of routine scheduled inspections, analytics prioritize maintenance of higher-impact activities, mitigating downtime and improving operational efficiencies. ● Performance dashboards and reports: The easy-to-use, cloud-based interface monitors building performance against an organization’s key performance indicators. ● Lifecycle management: An actionable road-map with predictable costs keeps systems current and IT-compliant, providing efficient virus and patch updates. ● Continuous service improvement: Systematic reviews prevent and eradicate problems, reduce critical incidents and downtime.


CMYK

33

SecurityLink India â– 1 April 2017

33

CMYK


CMYK

WHITE PAPER

The Benefits of Safe Cities Safer Cities Creating a Better Life

Thomas Lynch Director-Safe Cities IHS Markit 34

Niall Jenkins Senior Consultant-Security IHS Markit

SecurityLink India â– 1 June 2017

CMYK


CMYK

white paper

F

or the first time in history, there are more people around the world living in cities than people in rural areas. While the global migration to urban areas is improving their living standards, health, and financial prosperity, it also brings challenges to a city’s infrastructure, resources, security procedures, and emergency response systems. Meeting these challenges will be critical to the success of cities in the decades that follow. The safe city concept has been developed precisely to help government stakeholders, city mayors, and police departments mitigate these challenges. Leveraging the internet of things (IoT) and the connectivity now found in core security and safety technologies, safe city solutions are providing a range of systems including predictive analytics and big data, real-time response procedures and emergency response systems. These solutions are enabling governments and police departments to better protect their citizens from everything from terrorist attacks to natural disasters. They are also supporting wider city organizations such as public health, fire and rescue, border control and social services to better serve their citizens.

Safe cities create a better life

T

he safe city concept is based on a consolidated ICT platform which combines public-safety information of different types and from different sources, obtained through sensors and multi-agency collaboration. Safe cities are an essential pillar supporting the development of smart cities throughout the world. They provide the security and safety required to protect citizens from crime and terrorism as well as mitigate, as much as possible, the impact of natural disasters and other threats. A successful safe city solution should support a city’s security agencies, fire and rescue departments, public health and social service departments before, during and after an event, and integrate the disparate technologies and government departments responsible for citizen safety.

Four major requisites

● Prevention: It provides reliable and comprehensive security measures to predict threats and hazardous situations. City authorities must be able to take measures to prevent threats from occurring in the first place. Simulation and forecasting technology, based on big data mining, can help the relevant authorities to predict public threats and support police and military assets to prevent the event before it begins. ● Detection: It aids to public-safety organizations in collect-

ing, sharing and analyzing data more effectively to provide early warnings and raise situational awareness. Sensor systems in the city will proactively gather information. These sensors may include video surveillance cameras, CBRNE (Chemical, biological, radiological and nuclear) sensors, gunshot-detection sensors, and weather sensors. The type of sensor used is determined by the scope of the safe city project and how much inter-operability is required. Information can be used to provide early detection and alerts when events occur. Increasingly, sensors include ‘listening’ to social media for relevant posting by netizens. ● Response: It enables the key organizations in the city to react to security threats in real time. City authorities must be able to prevent an adverse event from escalating. Safe city projects enable an effective response by using a consolidated ICT platform to provide a common operational picture to all relevant agencies, including law enforcement, public health, fire and rescue services; and to allow the critical communication systems of these agencies to interoperate. This helps to raise the situational awareness for each of the responding agencies, and their command, control and coordination. ● Recovery: It provides post-event examination and analysis, identify victims and provide assistance in rescue actions. After an event, city authorities must be able to quickly examine and analyze all data received from the relevant sensor systems. This supports the subsequent search for suspects as well as the process of building a case based on incriminating evidence. Information can also be used to facilitate rescue actions, and the identification and assistance processes for both victims and survivors.

Integration

T

he safe city concept typically promotes inter-operability across law enforcement, emergency services and other government agencies (public health, border control, social services) to streamline operations and provides ‘situational awareness’ to all stakeholders involved in the management of a city’s security. This approach fosters better cooperation and sharing of intelligence. While much of the emphasis of the ‘safe city’ discussion involves security technology implementation and investment, the operational procedures and ICT backbone are just as important in the solutions’ ultimate success or failure. This real-

SecurityLink India ■ 1 June 2017

CMYK

35


CMYK

white paper

ity means that ICT and security agencies must work together for the greater good of the safe city project. One cannot exist without the other. The size of the city does not impede its ability to be considered a safe city but differing city sizes require different levels of technology investment, stakeholder ‘buy-in’ and planning. Safe city solutions are often layered on top of the legacy infrastructure that is in place. Overall, detailed planning around the use of legacy technology and the need for new infrastructure are key considerations when deploying safe cities.

Market drivers

T

here are a number of market drivers that government agencies need to consider when deciding how to proceed with a safe city project. These can be broadly grouped as safety drivers, social drivers and economic drivers, and the government investment in safe cities has a positive impact on each of them. ● Safety drivers: at its core, a safe city addresses issues related to crime and terrorism. Often, these types of incidents cause regulations surrounding data privacy and national security to shift. For instance, after the September 11th attacks, the United States Congress passed the Patriot Act, which set up fusion centers to surveil and aggregate vast amounts of data including video surveillance streams, social media, arrest records, warrants and even mug shots. These centers, now known as ‘Intelligence Fusion Centers,’ are becoming increasingly important, as agencies emphasize predictive policing. ● Social drivers: Political motives are a key driver of safe city projects. Politicians can use safe city initiatives to generate support in their campaigns with citizens who are concerned about terrorism or high crime rates. A safer city also increases retail spending, means citizens are more likely to visit leisure and sports facilities, and generally improves the happiness of people living in the city. Furthermore, a safer city may see fewer citizens migrating out due to security and safety concerns. ● Economic drivers: it is evident that there are economic benefits to safe city solutions. These include savings from the reduced impact of crime and terrorism; promoting business and commercial opportunity; mitigating costly natural disasters and generally increasing the productivity and wellbeing of citizens. A safer city also attracts foreign investment and tourism. On top of promoting business, safe city initiatives allow a city to save on technology opera36

tional costs. Sharing and re-using optimized infrastructure across agencies helps a city eliminate repeated spend on technologies. There is also a return-on-investment (ROI) opportunity for cities, in particular from traffic violation fines. Automatic number plate recognition can be used to identify and fine cars driving in car-pool or bus lanes and video analytics can be used to recognize when parked cars have exceeded a designated length of stay and issue a penalty notice charge.

The role of governments in safe cities

G

overnment stakeholders typically manage the safe city initiative and make the final decisions with regard to technology investment. Stakeholders include government employees, law enforcement, public health, fire, rescue, border control and social services. It is the government’s job to give the security consultants and technology providers a comprehensive scope of the goals the city would like to achieve. Enough time must be allocated for these steps so that the thought processes of both the city and the technology experts can align. Governments must also determine how the initiative will be funded initially and what revenue streams will be leveraged to support the project. Safe city projects are ‘living,’ and as such require a continuous stream of revenue. One of the best things a government can do with regard to leadership and ‘driving’ the safe city project is to build a steering committee. This committee would include representatives from various agencies across the city who might be stakeholders. Additionally, the committee can include experts from consultants or technology providers, who can provide guidance. For positive reasons Safer Cities intrude on the privacy of citizens. To avoid concerns about privacy negatively impacting on achieving the best safe city result, Governments should be open and honest about the nature of the intrusion. This will include capturing and storing data about citizens as they go about their daily lives. Most citizens will be satisfied to know that first, the data has been collected and securely stored only for legitimate reasons related to making their city safer, and second that there is a clear policy on how long that data will be kept before it is deleted.

The role of technology providers in safe cities

T

echnology providers play a major role in safe city initiatives. Ultimately, their solutions will be brought together to create an advanced security solution. However, there are no

SecurityLink India ■ 1 June 2017

CMYK


CMYK

white paper

comprehensive safe city technology standards. Instead, each technology type has its own set of standards and regulations, and these often change between vertical markets. For this reason, integrators, consultants, and technology suppliers and The Benefits of Safe Cities their concepts and technologies must be vetted heavily to dePart 3:if Quantifying the Benefits of Safesuppliers Cities termine they work together effectively. Technology 3.1 Evaluating the impact of ofwhat safethe city projectsis trymust gain a deep understanding government The benefits of safe city projects can be broad and difficult to ing to accomplish, and how they will achieve key performance quantify. Often, the goals of “safe city” projects range from indicators with their initiative.public safety to driving reducing crime ratessafe andcity improving

success of safe city projects. Allowing citizens to share information means they will be more engaged in the project and will feel a civic duty for reporting crime or providing crowd sourced evidence. Governments who deliver successful, effective safe city projects can also enhance their reputation as leaders who have improved the quality of life of their citizens.

The role of the maintaining service Based on primary discussions with executives from leading providers in safe cities safe city security firms, city officials and other industry

T

• Safety result: measures the level of crime, the risk to individuals and property from riots, protests, terrorism, and kidnapping as well as the public’s perception of crime and the police department’s ability to respond to events quickly and effectively.

Quantifying the benefits of Safe Cities

Evaluating the impact of safe city projects

economic growth and improving general citizen wellbeing.

he benefits of the safe city projects can be broad andability diffi• Social benefit: measures social benefits such as the tocult enjoy entertainment, leisure and sporting events safely, to quantify. Often, the goals of safe city projects range the public’s appreciation of the government and police from reducing crime rates and improving public safety to drivforce based on their response to security and whether ingtalented economic growth and citizen wellbeing. employees areimproving moving togeneral the city.

S

experts, IHSprojects Markitare identified the afe city not just four aboutindexes buildingtoa measure system; runsuccess or failure of a project. These indexes use an aggregation ning the system is also very important. Thereof public data, IHS successfully Markit research data and an IHS Markit fore, maintaining service providers play a the key government role. These commissioned citizen survey, and measure investment, safety result, benefit economic benefit organizations upgrade andsocial maintain theand security equipment of safe city projects in key cities across the world.

Based on primary discussions with executives from lead• Economic benefit: measures economic benefits such as ingpersonal safe citywealth security firms, city officials andonother industry and prosperity, spending tourism and retail,IHS employment rates, city and the risk and experts, Markit identified fourinvestment indexes to measure the sucof aserious economic challenges happening in cessprevention or failure of project. These indexes use an aggregation the short-term. of public data, IHS Markit research data and an IHS Markit Each index has been compiled from a series of 26 primary commissioned citizen survey, measure thetogovernment inindicators. Weightings have and been applied differentiate between indicators and social reflectbenefit their importance on the overall vestment, safety result, and economic benefit of category. A score in ofkey between and has been allocated safe city projects cities one across thefive world. to represent the level of commitment, spending or risk for Each indexAcomprises or seven primary impact indicaeach category. score of 5 either relatessix to the most positive and which a scoreare of used 1 to the least positive Index are data has tors to review how safeimpact. city projects influbeen sourced from IHS Markit research and public resources. enced over a set period of time. The purpose of analyzing multiple indicators in one index is to take into account the wide range of project aims and challenges. The Indexes and their

– important given much of it is installed outdoors – and have Each index ICT is comprised of either or seven primary professional skills to maintain thesix back-end systems. In indicators which are used to review how safe city projects are most cases, the government will outsource the maintenance to influenced over a set period of time. The purpose of analyzing either a system integrator a dedicated maintaining service multiple indicators in oneorindex is to take into account the wide range of project aims and challenges. The Indexes and provider. their constituent indicators are defined in full in the appendix but are summarized below:

The role of citizens in safe cities

• Government investment: measures the level of are critical the safe city project. While citia itizens government or tocity administration’s continued commitment spending on safe city making ICT equipment as zens may nottodirectly affect decision around the well as the level of ICT competence, the police resource technologies or operational processes, their engagement with allocated to public safety and the coverage of physical the security government and emergency servicesequipment. is important for the and critical communications

C

IHS Markit Safe City Indexes 1. Government Investment

2. Safety Result

3. Social Benefit

Country ICT development index

Criminal activity prevention

Government appreciation

Economic prosperity

Safe city ICT spend commitment

Serious crime rate

Police appreciation

Tourism

Police investment Video surveillance coverage Command and control coverage Critical comms coverage

4. Economic Benefit

Individual risk prevention

Leisure activity rate

Property risk prevention

City recommendation

Citizen perception of crime

Talented workforce

Emergency response time

Population growth

Economic risk prevention

Police conviction rate

Citizen happiness

Employment

City investment Retail spend

Source: IHS Markit. Source: IHS, Further definations are available in the appendices

SecurityLink India ■ 1 June 2017

7

CMYK

37


CMYK

white paper The Benefits of Safe Cities

3.2 Summary of key for global constituent indicators arepoints summarized below: safe cities

Government investment versus safety result

Safety Results

The safety result, social benefits and economic benefits ● Government investment: It measures the level of a govgenerated by a safe city project are greatly dependent on the ernment or city administration’s continued commitment to government investment. The figures show that government spendinghas onasafe cityrelationship ICT equipment asbenefits well as of thea level investment direct on the safe ICT competence, theimpact police is resource allocated to pubcityof project; however, the different depending on the lic stage of government investment. There are three distinct safety and the coverage of physical security and critical stages of government investment that impact the safety communications equipment. result and social benefit of a city.

● Safety result: It measures the level of crime, the risk to

Government investment versus individuals and property from riots, safety protests,result terrorism, and

Government Investment

The kidnapping initial government a safe city is as well asinvestment the public’sin perception of project crime and primarily about security and cantodrive a large increase in the police department’s ability respond to events quickly the safety result. As much of the security infrastructure effectively. and and technology is not deployed, the required government ● Social It measures social benefits as the abilinvestmentbenefit: is high. At this stage, only thesuch city’s critical locations are entertainment, covered by leisure video and surveillance cameras, ity to enjoy sporting events safebasic command and control equipment is in place, and ly, the public’s appreciation of the government and police the government begins to build the ICT infrastructure. force basedthese on their responsetechnologies to security and Maximizing security canwhether drive tala 25%ented increase in thearesafety result employees moving to thescore, city. with significant improvements in property and individual risk levels,such police ● Economic benefit: It measures economic benefits as conviction rates and emergency response times.

Source: IHS Markit

Safety Benefit

Government investment versus social benefit

personal wealth and prosperity, spending on tourism and retail, rates, city improvements investment and the riskbeen and Once the employment initial safety result have achieved the projects can often become more challenging. prevention of serious economic challenges happening in Continued does not have the same impact on the the shortinvestment term. safety result as many of the primary risks have been mitigated. indexthe hassecond been compiled a series ofinvestment. 26 primary ThisEach is called stage offrom government indicators. Weightages havebetter been video appliedsurveillance to differentiate beAt this stage, the city has camera coverage of key and secondary locations. The city also has tween indicators and reflect their importance on the over all the advanced security technology in place to start to deploy category. A score of between one and five has been allocated big data and intelligent analysis. Additionally, these cities to represent the level of commitment, spending or risk each often have more stakeholders involved following thefor initial government investment which makes it more difficult to category. A score of 5 relates to the most positive impact and agree on the projects direction. a score of 1 to the least positive impact. Index data has been sourced IHScapital Markit resources research and public resources. If a city from has the to continue investing in

Government Investment Source: IHS Markit

© 2017 IHS

the safety much of to thethe security and result is a result. criticalAs foundation social infrastructure prosperity at this stage of project deployment. technology is not deployed, the required government investment is high. At this stage, only the city’s critical locations are The second stage of government investment typically covered byavideo command and results in lowersurveillance increase in cameras, the socialbasic benefit score. The social benefit does not change dramatically here, and the control equipment, and the government begins to build the ICT limited deployment of leading-edge technology does not infrastructure. Maximizing these security technologies can generate as much appreciation of city leaders or impact the drive a 25% increase in the safety result score, with significant citizens’ lifestyle. improvements in property and individual risk levels, police If the safety result mostresponse from thetimes. initial government conviction rates andbenefits emergency investment, the social benefit score improves most in the Once the initial safety result improvements have been third stage of government investment. A key component of achieved projects oftenfeedback become on more challenging. the social the benefit score can is citizen the government Continued not happiness have the same impact on the and police,investment and the does general of citizens living in the city. The security and safety improvements made safety result as many of the primary risks have been mitigated. during the initial investment take time to make an impact, This calls for the second stage of government investment. At but ultimately drive an increase in the social benefit score. this stage,appreciate the city has surveillance camerathat coverCitizens thebetter valuevideo of innovative solutions are making them safer, which is reflected in their appreciation of age of key and secondary locations. The city also has the adthe government and police force. vanced security technology in place to start to deploy big data and intelligent analysis. Additionally, these cities often have Overall, a 20-25% increase in government investment can more following thebenefit initial score government resultstakeholders in a 35-40% involved increase in the social of the city at thiswhich third makes stage. itThe government and investment more difficult to appreciation agree on the propolice appreciation scores can increase by over 50%; citizens jects direction. in connected cities value the impact safe city projects have on Ifcity a city has the capital resources their environment and way of life. to continue investing in these projects, the third stage of deployment is to leverage

these projects, the third stage of deployment is to leverage opportunities such as points big datafor analytics predictive Summary of key globalandsafe crime centers. At this stage, the city has almost full video cities surveillance camera coverage. The city also emphasizes more he sharing, safety result, socialtechnology benefits and benefits on data predictive andeconomic other intelligent analysis than physical security equipment. Furthermore, generated by a safe city project are greatly dependentthe on city’s resources can be used more effectively through the the government investment. The figures show that government deployment of a safe city. The key benefit is the reduction investment has a direct relationship on the benefitsimpacting of a safe in the operational costs for the city without city security project; however, depending on the the level. At the thisimpact stage is ofdifferent government investment the safety result shows a slight increase and then tends to stage of government investment. There are three distinct stages be stable.

T

of government investment that impact the safety result and social benefit of a investment city. Government versus social benefit

At the initial investment stage in a safe city project, the primary focus is on improving theversus safety result. That being Government investment safety said, the city can generate an increase in the social benefit result score as citizens begin to appreciate the government and initial efforts government investment in safer, a safe and city generally project is policeheforce’s to make their city primarily about security and can drive a large increase in feel happier living and working in the city. In fact, the safety

T 38

© 2017 IHS

SecurityLink India ■ 1 June 2017 8

CMYK


lt sk he le by m

S

CMYK

white paper

opportunities such as big data analytics and predictive crime centers. At this stage, the city has almost full video surveillance camera coverage. The city also emphasizes more on data sharing, predictive technology and other intelligent analysis than physical security equipment. Furthermore, the city’s resources can be used more effectively through the deployment of a safe city. The key benefit is the reduction in the operational costs for the city without impacting the security level. At this stage of government investment the safety result shows a slight increase and then tends to be stable.

Government investment versus social benefit

A

t the initial investment stage in a safe city project, the primary focus is on improving the safety result. That being said, the city can generate an increase in the social benefit score as citizens begin to appreciate the government and police force’s efforts to make their city safer, and generally feel happier living and working in the city. In fact, the safety result is a critical foundation to the social prosperity at this stage of project deployment. The second stage of government investment typically results in a lower increase in the social benefit score. The social benefit does not change dramatically here, and the limited deployment of leading-edge technology does not generate as much appreciaof city leaders or impacts the citizens’ lifestyle. Part 5:tion Key Enabling Technology: If the safety result benefits most Construction from the initial governthe Cornerstone of Safe City ment investment, the social benefit score improves most in the While safe city projects typically integrate a large number thirdand stagecommunications of the government investment. A key component of security technologies, there are ofa the social benefit score is citizen feedback on the government few critical segments and emerging applications that are and police, and the general happiness of citizens living in the extremely relevant to the future success of safe cities. city. The security and safety improvements made during the

SecurityLink Enabling the detection: video surveillance and India video analytics

Video surveillance is a critical element of a safe city. Security

initial investment take time to make an impact, but ultimately drive an increase in the social benefit score. Citizens appreciate the value of innovative solutions that are making them safer, which is reflected in their appreciation of the government and police force. Overall, a 20-25% increase in government investment can result in a 35-40% increase in the social benefit score of the city at this third stage. The government appreciation and police appreciation scores can increase by over 50%; citizens in connected cities value the impact safe city projects have on their city environment and way of life. It is clear that safe city deployments have a positive impact on many of the key indicators of a successful city. That being said, there is no one size fits all solution. Projects need to address the unique threats of a city and focus on the areas of opportunity. This could be crime prevention in cities where government investment has historically been low or tourism and citizen happiness for cities that have already made significant investment. They also need to take into account the ICT environment to maximize the opportunity to improve the safety result, social benefit and economic benefit.

Key enabling technology: The cornerstone of safe city construction

W

hile safe city projects typically integrate a large number of security and communications technologies, there are a few critical segments and emerging applications that are extremely relevant to the future success of safe cities.

Enabling the detection: Video surveillance and video analytics

V

ideo surveillance is a critical element of a safe city. Security cameras provide the ‘eyes’ for all other operations and collect information remotely for live operations and forensic investigations. Each video surveillance scenario and camera site is different. Video surveillance deployments used in safe city projects can be especially challenging due to the size of the geographic area of coverage, the number of cameras integrated into a single system, and the range of conditions and operational purposes for each individual camera. Video surveillance cameras can fulfil various functions in a safe city project including: general security monitoring of public spaces; suspect tracking; forensic investigations and evidence gathering following an incident; traffic monitoring and enforcement; and number plate recognition. The video surveillance industry has undergone a transi■ 1 June 2017

CMYK

39


CMYK

white paper

tion from analog to network products. Picture quality has many components but the higher resolution in network cameras has driven adoption. To cope with the largely outdoor deployments and large variance in environmental conditions the use of wide dynamic range, high color fidelity and advanced low light technologies has increased. Furthermore, high resolution and panoramic cameras have the ability to cover wide-areas from a single vantage point, meaning objects within wide urban areas can be recognized and identified. The video management element of a safe city video surveillance system critically allows operators to collate all live video inputs to build a picture of current scenarios. Underlying ICT platforms and the use of cloud management enable a large system to be managed on a single platform through distributed multiple control rooms (potentially with varying levels of authority). A flexible cloud infrastructure allows for seamless resource (transmission, analytic processing or storage) sharing across the network. Another of the trends in video surveillance technology is the evolution from an ‘information island’ to the ‘cloud,’ which could raise working efficiency, advance data sharing and big data analysis, maximizing the benefits of video surveillance, and reducing the cost caused by repeated construction. Developments in the field of video content analysis (VCA) are most crucial to enabling the next-generation of safe city capabilities. Video analytics technology is now able to characterize the entire environment captured by a video surveillance camera, allowing the system to interpret the relevant information from the video, truly providing ‘eyes’ and a ‘brain’ to an entire safe city system by analyzing live and recorded video streams to detect, classify and track predefined objects or behavioural patterns. These technologies are used as a means to automate the video monitoring process and can be particularly effective in proactively identifying events as they happen and extracting information from recorded video. The latest deep learning analytics are able to more accurately recognize details, objects and behaviours. In a crucial difference to rule based analytics, once ‘trained’ – analytics using deep-learning technologies have the potential to continue learning from their training, gaining accuracy and efficiencies as a human operator would. Increasingly a hybrid approach is being deployed where analytics workloads are more distributed using a powerful mix of smart cameras at the edge combined with centralized server and/ or cloud based analysis. This means some analytics can be run at the camera, for example crowd monitoring and counting, but more powerful centralized analytics could be used to 40

run processor intensive applications such as face recognition against a nationwide-shared suspect database. A significant element of the deep learning analytics revolution is the potential for multiuse and big data applications of video based metadata. The data which can be leveraged from surveillance cameras using analytics is not limited to security purposes. The potential for operational data relating to crowd management, sanitation, public transport and traffic monitoring amongst other examples can be leveraged – meaning potential for the integration of safe city technologies into a smart city.

Enabling the quick responses: internet of Things (IoT) and connected devices

T

he IoT is not a specific device or technology – it is a conceptual framework, driven by the idea of embedding connectivity and intelligence in a wide range of devices. IHS Markit defines an IoT device as a device which has some form of embedded connectivity that allows the device to be directly connected to the internet (i.e., IP addressable), or allows the device to connect (tether) to an IP addressable device. This connectivity can be wired or wireless. These devices can include a range of sensors as well as some type of user interface (UI), but neither sensors nor a user interface is required under this definition. The ability to collect vast amounts of data in near real-time from this broad range of intelligent connected devices is the foundation of the IoT. This data can then be accessed directly, or via the cloud, and unique value propositions can be created through the application of complex analytics and big data techniques. IoT is an important trend, especially within the safe city space. With more connected devices comes more data, which when combined with strong analytics, can provide intelligence that decision makers can use to preemptively alert to attacks, improve responses in real-time and speed up forensic analysis. Connected devices specific to the public safety sector can be connected to a control room or storage platform via a sensor. In the case of law enforcement, one such application could be a fire alarm connected with a sensor. The agency could gather data from this sensor such as drawing of the gun, firing of the gun, and time and locations where the gun is drawn. Analytics can be run on the data collected to identify the city sectors most likely to result in a drawn weapon and officers who are more likely to draw the weapon. These types of sensors are the future of public safety and safe city, but many challenges surround the use of these systems. While this mar-

SecurityLink India ■ 1 June 2017

CMYK


CMYK

white paper

ket is in an ‘early-days’ phase, it is evident that these technologies offer significant benefits to government agencies. In order to leverage these opportunities, governments should build up dedicated IOT for their safe city projects. LPWA (Low Power Wide Area) networks such as NB-IOT technology could be leveraged to realize the full city IOT coverage.

Enabling the efficient policing: Mobile policing

T

he transition from narrowband communications such as licensed mobile radio to broadband communications such as LTE is expected to be a facilitator to communications used as part of safe city initiatives. These networks will be able to carry high-speed data, location information, images, and video to provide first responders with enhanced ‘situational awareness.’ LTE is well placed to meet all the critical communication demands in various scenarios enabling data sharing and collaboration across agencies and districts to improve the coordinated response to emergencies, which are chief goals of safe city initiatives. The implications of the network for safe city projects are tremendous. Vastly more and ‘heavier’ information can be sent over a broadband network. Additional access to data means more options, which can be analyzed in control rooms and disseminated into the hands of field personnel. Various programs such as the United States’ FirstNet and the United Kingdom’s ESN have made plans to migrate the countries’ emergency communications networks on to broadband. While these transitions will take time, and will work with mobile radio networks concurrently during the transition, it is evident that broadband will be the future of emergency communications.

Enabling the integration: Control room consolidation and resource sharing

A

significant trend impacting public safety and law enforcement control rooms, especially in North America and Europe, is the consolidation of single-agency control rooms to form large multi-agency control rooms. This trend is driven by control rooms attempting to manage increasing budget restrictions, to improve efficiency and to improve inter-operability between different agencies. Consolidation depends heavily on the productivity metrics that a control room uses. The agency must evaluate call taking and dispatching capabilities and processes. A typical consolidation might include rolling up city control rooms into a more regional entity. This task will encounter different local

processes and it is therefore an opportunity to introduce the best practice process across all agencies. Physically combining control rooms into one large unified control room is not necessarily the only way in which this consolidation can happen. With the increasing pressure to budgets and also in an effort to increase data sharing, it is becoming more common for several control rooms in a region to issue a joint tender for a single platform to be shared by each agency. There are several benefits to this shared purchasing process. There is a cost benefit, but it also enables control rooms to design emergency management systems to their own needs as well as expand their cooperation with geographically separate control rooms, leading to considerably improved resource management. There is also a benefit in the integration of voice, video and other data; the integration of video surveillance, video conference and narrowband/ broadband trunk.

Enabling the prevention: Predictive crime centers and big data analytics

A

number of police departments around the world are placing more importance on predictive crime centers. After the September 11th attacks, the Department of Homeland Security provided US states with funding to facilitate collaboration and information sharing among law enforcement agencies. As a result, ‘fusion centers’ were developed as part of counterterrorism analysis. Today, there are 78 fusion centers across the United States, which range in size from staffs of three to 250, including officers, analysts and agents. Fusion centers are slower time analysis units which look at big data sets from both traditional police data and many other sources. These can include video surveillance streams, social media, arrest records, warrants and mug shots. Fusion centers can provide intelligence packages for patrol briefings and operations as well as support real time intelligence cells. These real time intelligence cells are typically attached or embedded into control rooms to provide intelligence supporting either command and control decisions or deployed officers. Furthermore, LTE networks have the potential to support richer data and image packages. These centers will become increasingly important as agencies place an emphasis on predictive policing. Departments, including the Houston Police Department, are hiring specialized analysts to review social media during major criminal incidents to gather and send out data to officers in the field. This allows resources to be dispatched in a more focused manner saving time and cost. Predictive crime

SecurityLink India ■ 1 June 2017

CMYK

41


CMYK

white paper

centers like the one in Austin, Texas, provide information including traffic camera data to the police force to facilitate investigations. The future of analytics will shift from a data sharing approach to a data mining approach, with the purpose of intelligence gathering, and disseminating those results across relevant agencies. Predictive analytics are typically deployed from traditional intelligence units and sometimes from Fusion centers. It is important to note that these systems require a significant amount of data to work effectively, and even advanced city deployments remain in the early stages of what is possible.

Enabling the sustainability of safe cities: Cloud and SaaS solutions

C

loud services can be defined as convenient, on-demand services provided over the internet by a third-party provider. Rather than committing upfront to a fixed cost, platforms, hardware (servers, storage etc.), applications and software are provided as a service. The payment is typically on a periodic basis and based on usage. Consequently, cloud networks are designed to be scalable, rapidly elastic, and require minimal management, allowing increasing demand to be met dynamically. On the flip side, if a user or enterprise starts to downsize, usage and payments for cloud services can be scaled back allowing the consumer to save money. Data stored in the cloud can also be accessed anywhere and shared seamlessly with other qualified users at any time across multiple devices. One of the factors hindering adoption of safe city projects is financing. As these projects are a capital expenditure (CAPEX), a city has to fund this type of project through some form of local, state or federal government funding. For small and medium-sized cities, typically without access to significant funding, this can be a great impediment to initiating these projects. The city can also be stuck with obsolete technology that it cannot afford to upgrade. Cloud based technology has the potential to alter the way safe city projects are funded by changing the projects from a CAPEX model to an operational expenditure (OPEX) model. OPEX typically covers the day to day costs of running a city and includes rent, payroll, utility bills and maintenance. Two benefits of an OPEX model versus CAPEX model are that cities can deploy safe city projects in a more incremental fashion and there is no long-term commitment. A further benefit of OPEX models that cloud-based technology provides is that it shifts responsibility and risk away from the city itself and onto the provider of the technology. 42

One issue cities have faced in the past has been continuing to fund safe city projects after the initial funding had run out. As the project shifted from a depreciating capital expenditure to an ongoing operational expenditure, the city had to find money again to continue the project. Safe cities are living projects, which means that even after extensive video surveillance infrastructure, a centralized command center, advanced analytics platforms and a robust storage system have been installed. The technologies and platforms used as well as the operational procedures employed will continue to evolve. Multiple technologies and trends are shaping what safe cities will look like in the future, but the reality is that each city will have a unique solution based on their needs and the goals they are trying to achieve. Increasingly, cities will rely less on hardware and will instead rely more on software based applications. Infrastructure such as cameras will remain in place, but software will be used to access relevant data from systems across a city. Collaborative software systems will be used to disseminate this data to each agency involved in emergency response or security incident management. The future of safe cities is in the platform and solution rather than the equipment and technology.

Development strategy

T

he safe city represents the intersection of ICT and security technology. However, there is no ‘one size fits all’ when it comes to implementing and deploying a safe city solution. The key success factors can differ dramatically depending on the city’s specific security threats, government investment, existing infrastructure and the roles of the stakeholders involved in the safe city initiative. That being said, a number of strategic recommendations can be made based on the government investment stage of the city which will help to ensure a more successful safe city deployment.

First stage of government investment

I

n the first stage of government investment, the city typically needs to replace outdated security technology and critical communications systems. While this stage involves the largest capital expenditure, it also generates the largest improvement in the overall safety result. Furthermore, the implementation is more straightforward than at other stages, with higher resolution video cameras, LTE networks, IoT sensors, and command centers all likely to be deployed around the city. Given the limited existing infrastructure in place, the city can make

SecurityLink India ■ 1 June 2017

CMYK


CMYK

WHITE PAPER

a dramatic impact by reducing emergency response times for police, fire, and rescue services and lowering the overall crime rate through the safe city deployment.

Second stage of government investment

T

he second stage of government investment is more challenging. The safety result benefits generated in the first stage of investment have already been achieved and many of the social and economic benefits associated with the project will not be achieved until the government investment reaches the third stage. At this stage, the government should set targets and expectations for the third stage of government investment focused on the social and economic benefit improvements required. It should also build and motivate the project team to deliver on these targets. Furthermore, the government should start to build advanced data sharing platforms and continue to invest in ICT to maximize the safety result of the city and work towards the next stage of government investment. In the second stage of investment it is important to manage expectations and ensure that the city exploits the benefits of the project through continued spending to progress through to the next stage of investment.

Third stage of government investment

B

y the third stage of government investment, cities already have a mature physical security and ICT infrastructure. Consequently, much of the additional planning and investment in these cities surrounds the integration of existing systems, setting up collaborative or data sharing platforms and building advanced analytics solutions, which can mine data across the legacy systems. Project leaders need to ensure they work well with technology suppliers, systems integrators and security consultants to leverage the best of breed solutions available.

Key elements of successful safe city projects

I

t is evident that the approach to deploying a safe city is challenging. For this reason, planning and discussion between stakeholders is important regardless of the city size or development stage. The projects which have been successful had one major element in common: the various stakeholders worked together and constructed a consolidated project team and dedicated safe city initiative. Projects fail because the different agencies do not identify unified objectives, are unwilling to collaborate, or do not engage the city’s citizen stakeholders effectively. A few components are critical: ● Steering committee: A group which takes the lead on the

safe city initiative. Their responsibility surrounds securing funding and establishing stakeholder partnerships. There has to be a clearly defined lead agency or person and an agreed definition of what success looks like. ● Identified funding source(s): This may take the form of a wider federal grant, but also from private sources such as a foundation or local businesses. ● Strong partnerships with a range of agencies: Police departments, transit organizations, universities, public health, social services, and business stakeholders need to work together. It is also important that the city’s citizens embrace the safe city concept. ● Project goals: Specific targets with regards to the security needs to be addressed and technologies to be implemented.

Benefits of a dedicated ‘safe city’ initiative

T

here are several benefits to establishing a wide-scale safe city initiative. Firstly, it involves a greater range of stakeholders, which means that there is not only more publicity, but greater potential for ‘buy-in’ amongst city agencies and other organizations. The greater range of stakeholder involvement brings with it a larger pool of financial resources. For example, if only the police are involved in a safe city initiative, it is likely that only their budget could be used to finance the project. However, if transport, police, public health, fire and rescue, border control, social services and private organizations are involved, budget availability becomes larger. Multiple agencies working together do present additional challenges. However, it is for this reason that the steering committee is set up. This organization would ideally have an awareness of the technological needs of each of the different agencies and work to address those needs in the planning stage.

Conclusion

T

he safe city is ultimately a government-driven approach to security. However, multiple stakeholders must be involved. The continuous evolution of technologies, city structure, and security requirements, means a broad range of expertise is needed to make safe city projects a success. Strong government support facilitates these projects, but ultimately a collaborative approach between the government stakeholders, including public health, fire and rescue, and social services, its citizens, and technology firms will provide the best opportunity for successful safe city projects.

SecurityLink India ■ 1 June 2017

CMYK

43


CMYK

APPLICATION/ CASE STUDY

Avigilon to Protect Union Square, San Francisco Historic Union Square sees positive impact to public safety with deployment of district wide Avigilon surveillance system

A

vigilon Corporation has been selected by the Union Square Business Improvement District (USBID) to enhance the safety of Union Square in San Francisco, California. USBID’s goal is to enhance and promote Union Square, which is known as San Francisco’s ‘crown jewel’ of shopping districts, a cultural hub, and a premier destination. To increase safety for residents and visitors, USBID in partnership with Applied Video Solutions, a San Francisco-based engineering firm, installed over 350 Avigilon HD multisensor and HD Pro cameras over its 27

block area. These cameras run on Avigilon network video recorders and Avigilon Control Center (ACC) video management software. Avigilon HD multi-sensor cameras were installed because their flexible design can capture multiple angles of the busy streets of Union Square from a single camera, to maximize scene coverage and minimize blind spots. With resolutions from 4K (8MP) to 7K (30MP), the award-winning HD Pro cameras were installed to cover wide areas of Union Square, while still delivering exceptional image detail to zoom

Avigilon HD multi-sensor and HD Pro cameras

in, allowing operators the ability to identify and quickly respond to potential security events. “Our top priority is to keep Union Square as the vibrant heart of San Francisco and a world class destination,” said Karin Flood, the USBID’s Executive Director, “The ACC system is easy to use and the camera image quality is stunning, allowing our operators to conduct fast video searches and accurate investigations when an incident has occurred. This has helped deter crime and ultimately makes the Union Square district safer and even more enjoyable for our community.” Avigilon’s broad range of cameras, deep learning artificial intelligence driven video analytics technology, and video management software solutions are designed to meet the diverse needs of cities around the globe.

Rare Picasso Exhibit Secured by Milestone Video

Milestone XProtect and Milestone Mobile Client provide around-the-clock video surveillance for 153-piece Picasso exhibit at the Tomie Ohtake Institute, Brazil

M

ilestone XProtect was selected to provide a 24-hour video security solution to protect a unique Pablo Picasso exhibit at the Tomie Ohtake Institute in São Paulo, Brazil. The Tomie Ohtake Institute covers 2,300 square meters, divided into seven 44

gallery areas. For the Picasso exhibit, two large galleries measuring 300 square meters each were used. According to the systems integrator, the security objective for the Picasso exhibit was to make sure that there were no surveillance camera blind spots of the exhibit space. SecurityLink India ■ 1 June 2017

CMYK

“The Tomie Ohtake Institute is very popular among Brazilians. In 2014 alone, the Institute welcomed more than 1.3 million visitors to 210 art exhibits,” said an integrator representative, “In this case, we carefully studied the location to determine the best plan for implement-


CMYK

APPLICATION/ CASE STUDY

ing a video monitoring and security system.” The Milestone XProtect VMS securely managed, displayed, and recorded video data for live, real-time monitoring, and stored video for the forensic review of events. The Milestone Mobile client enabled remote viewing of video images on iOS or Android mobile devices, in addition to the user interfaces using computers with high-speed Internet. The Picasso exhibit’s total video security solution included the Milestone XProtect VMS, Milestone XProtect Smart Client, Milestone Mobile client, and Axis 3007-PV panoramic network cameras. The integrator also installed an Allied Telesis PoE Switch and Speedy fiber optic technology. The

staff in charge of operating the system was provided with detailed user training and a general course on the use of video security. “Thanks to this total surveillance

solution, there were no incidents during the Picasso exhibit,” said the integrator, “The system helped prevent problems and created a safe and secure experience for everyone who attended.”

Gemalto and Veridos Strengthen Citizen Identity Security with eID Cards for Macao SAR Government G

emalto is partnering with Veridos, a German company specializing in Identity Solutions, to supply contactless electronic identity cards (eIDs) to the Macao Special Administrative Region Government (Macao SAR Government). Under the collaboration, Gemalto is the subcontractor responsible for providing the physical cards, enhanced with security features, and seamlessly incorporating Veridos’ operating system software solution. The partnership will ensure a steady and consistent supply of smart

eID cards to the government. The new Macao eID cards are effective at mitigating fraud and counterfeiting activities. They are made from tamperproof polycarbonate material, and incorporate two innovative security ID features from Gemalto: Window Lock and True Vision. They allow the authorities to verify the cards’ authenticity with the naked eye and under a UV light – significantly enhancing regional security for the Identification Services Bureau of the Macao SAR Government, while offering Macao SecurityLink India ■ 1 June 2017

CMYK

45


CMYK

APPLICATION/ CASE STUDY

citizens’ unparalleled convenience when accessing e-government services. Macao is one of the world’s top 20 tourist destinations. In addition to its own population of 600,000, Macao attracts an average of 2.5 million international visitors on a monthly basis. This places a greater emphasis on identity management and enforcement, which has become a major challenge for all governments. With the widespread pro-

liferation of internet connectivity and mobile devices globally, identity fraud and theft have been on the rise and need addressing urgently. “We originally started a strong partnership with Veridos and Trüb back in 2013. Since Gemalto incorporated Trüb, this cooperation has been extended accordingly,” said Elsie U AoIeong, Director of the Identification Services Bureau of the Macao SAR Government, “We are

confident that our concerted expertise and efforts will give Macao the technological edge in identity card security.” “Using the contactless eID cards, Macao citizens can now enjoy a secure and hassle-free ‘tap and go’ experience, thanks to the high security features, tamper-proof ID design, and contactless capability,” said Fernando Dal Zotto, Senior Vice President of Government Programs at Gemalto.

Uniview protects Grolleman Coldstore, advanced freeze and packing company

G

rolleman Coldstore is one of the most advanced freeze and packing companies in Europe which provides a complete service for companies who want to package, cool, freeze and store their products. With 2500 employees among 4 locations in the Netherlands and 1 in Germany and doing transport with their own transport company, Grolleman Coldstore is the number one in the Benelux market. Grolleman Coldstore used analog system with 600 TVL but currently the company has new requirements to have high quality, high resolution video surveillance system which can help monitor the production process, employees and cargos.

Highlights

Storing, activating and working on extreme low temperature

U

niview IP cameras are capable to work, store and cold start under extreme low temperature. The cameras are embedded with high efficiency heater which enables it to work up to -40°C.

Solution

Smart solution applied on production process control

niview provided 2MP 30x IR network PTZ dome camera, 2MP fixed dome, 2MP minifixed bullet and 2 SATA NVR, and

he company had the requirement to have a complete overview of the factory so they could monitor their actions and the damages they cause. Hence it is very important that the camera’s image is very clear in every situation, so they can identify people and process flow and cargos.

U

46

covered all over the company floor, outside of the factory and employee entrances.

T

SecurityLink India ■ 1 June 2017

CMYK

User-friendly

U

niview’s camera and NVR feature long range PoE function which help install products conveniently. In this project, cameras are installed separately inside and outside of the company building. Nearly 1.7km cables are used for this project. In order to easily manage the overall status, Uniview NVR provides statistical form of people counting which is illustrated by time period. It visualizes the smart function which enables users to discover and manage problems easily.


CMYK

APPLICATION/ CASE STUDY

Cloud surveillance

U

niview NVRs support P2P cloud whereby users can watch live view or recording with smart phone conveniently at anytime, anywhere. Customers of Grolleman Coldstore use Uniview

cloud service to watch the process of packaging, cooling, freezing and storing their products with their smart phones. Security manager Harry Grolleman of Grolleman Coldstore said, “With Uniview system, we can give quick response in case

of accidents, emergencies or problems. We are very happy with the perfectly clear images of the chosen cameras. We are also using the mobile app for demonstrating to new customers. We are pleased with the professional and convenient products.”

Amarillo Wireless Uses RADWIN JET Delivers super-fast broadband to businesses, voted #1 Operator

R

ADWIN has recently announced that Amarillo Wireless – a Wireless Internet Service Provider based in Amarillo, Texas and the recipient of the WISPA organization’s 2016 ‘Operator of the Year Award’ – has deployed RADWIN’s JET wireless broadband solutions to offer high-speed broadband packages of up to 150 Mbps to its valued business customers. WLANmall, RADWIN’s certified partner and a leading supplier of IP video, wired and wireless connectivity solutions, was in charge of project distribution. Matt Carpenter, President, Amarillo Wireless said, “We decided to upgrade our legacy wireless equipment because they could not handle the capacity demands of business customers in a noisy environment. Initially we tested several wireless systems; some had major performance issues with noise and others had just 1-2 Mbps upload with no support for VoIP. RADWIN’s JET radios shined over the competition. JET is a stable, fast,

“We tested JET – it’s a stable, fast, reliable system providing rock solid performance as promised.” reliable system providing rock solid performance as promised, allowing us to service business customers even in interference-ridden environments. JET allows us to compete with fiber and cable by offering service packages of 50, 100 and all the way up to 150 Mbps to businesses, and reach locations where fiber is not financially viable.” Tee Wright, Wireless Sales Engineer, WLANmall commented, “We

SecurityLink India ■ 1 June 2017

CMYK

– Matt Carpenter President, Amarillo Wireless

recommended RADWIN for this project based on our extensive experience with the brand. JET carrier-grade radios perform at top speeds in the most challenging environments, including interference and near-line-of-sight scenarios, thanks to their advanced air-interface and bi-directional beam-forming technology. As Amarillo Wireless continues to expand its network throughout towns in the Texas Panhandle, RADWIN and WLAN Mall will continue to support their needs.” Dennis Stipati, RADWIN General Manager, North America said, “We’re proud that Amarillo Wireless chose JET point-to-multipoint to serve its valued business customers. JET provides high capacity and quality ideal for fast Internet, video streaming and other bandwidth-intense applications that are the 47


CMYK

APPLICATION/ CASE STUDY

lifeblood of businesses. It allows operators to serve remote and rural areas underserved by traditional carriers. In JET, service providers have a solution they can rely on for the long-haul that serves

customers’ needs now and in the future.” RADWIN is a leading provider of Point-to-Multipoint and Point-to-Point broadband wireless solutions. Incorporating the most advanced technologies

such as a beam forming antenna and an innovative Air Interface, RADWIN’s systems deliver optimal performance in the toughest conditions including high interference and obstructed line-of-sight.

HENSOLDT to Equip DFS with

State-of-the-Art Radar Technology Upgrading air traffic control radars will increase safety and reliability in air traffic

T

he sensor house HENSOLDT will equip the German civil air navigation service provider DFS with state-ofthe-art radar technology: DFS Deutsche Flugsicherung GmbH has commissioned HENSOLDT to deliver two units of the company’s high-performance ASR-NG® airport surveillance radar and a separate MSSR 2000 I® secondary radar for the purpose of modernising their radar infrastructure. Thanks to its outstanding detection capability, the ASR-NG is able to replace not only the existing approach control radar systems at the airports, but also the medium-range radar units, which have been in service for more than 30 years. “Our ASR-NG offers top performance and an excellent priceperformance ratio at the same time, not only for military, but also for civil air traffic control,” said Thomas Müller, CEO of HENSOLDT, “It guarantees the highest level of reliability in air 48

traffic control, thus ensuring that people can benefit from maximum safety when travelling by air. Its extraordinary long-range and high-altitude detection capabilities allow our system to cover a volume four times as large as can be achieved with other ASR units. We are delighted about the trust DFS has placed in us by again buying highly reliable radar equipment made in Germany. DFS is a strategic partner to support the future success of our company in the field of civil air traffic control.” The ASR-NG consists of a primary and a secondary radar system. The primary radar helps identify non-cooperative objects such as small aircraft that do not identify themselves using their own transponder signals. It is based on a semiconductor transmitter and includes a special signal processing technology for widearea air surveillance and 3D capability. SecurityLink India ■ 1 June 2017

CMYK

The secondary radar, MSSR 2000 I (MSSR = Monopulse Secondary Surveillance Radar), ensures the automatic identification of cooperative aircraft. This secondary radar meets the new ‘Mode S’ and ‘ADS-B’ air traffic control standards, which greatly improve aircraft identification queries and are currently being introduced in the Central European airspace. DFS places particular importance on the option of using the MSSR 2000 I in a network and in a socalled Mode-S cluster, as it has already been the case with other customers. HENSOLDT supplies customers all over the world with air traffic control and identification systems for military and civilian applications. For example, the company has set up the air traffic control network of the German Air Force covering an airspace of 1,700x1,500 kilometres. In addition, HENSOLDT equips the German Armed Forces’ airports with the ASR-S airport surveillance radar. Moreover, the company delivers a complete approach control system for the military airfields in Switzerland. Other HENSOLDT air traffic control radars are under contract for the UK, Australia and Canada.


CMYK

APPLICATION/ CASE STUDY

Integrated Video Surveillance Helps Massachusetts General Hospital Manage Large Case Load BriefCam video review, search and analysis, embedded within Milestone’s video management platform, is making efficient and effective video investigation possible

M

ilestone Systems’ open platform IP video management software (VMS) has BriefCam Syndex Pro video synopsis analytics embedded within the Milestone XProtect Smart Client, in operation at Massachusetts General Hospital in Boston, helping in its mission to protect and safeguard the healthcare community. Charged with creating a safe environment, MGH’s security team is simultaneously challenged by the clinical team’s needs for increased efficiency by reducing length of stay and moving patients through the hospital as quickly as possible. The hospital environment presents unique challenges to security. MGH’s 17-acre urban campus, comprising 29 contiguous and 14 separate buildings (including underground and freestanding garage facilities), is complex. The security team must take into account not only the main location, but also 13 satellite facilities around the Boston area. With 13,000 Axis network cameras recording 24/7 and more than 1,000 investigations to process per year, Massachusetts General Hospital’s security team previously was not able to keep up with the vast amounts of recorded video. “The number of investigations we were doing was taking huge amounts of time in terms of reviewing video, and that was really a waste of resources,” said Bonnie Michelman, MGH Executive Director of Police, Security and

Outside Services, and Consultant for Partners Healthcare, “We can’t cover all of these facilities with security staff. We need to augment heavily with very good, state-of-the-art technology that allows to combine intelligence, labor, policies and procedures, in order to create a better holistic approach to enterprise risk management.” Following the hospital’s digital conversion unified on the Milestone XProtect video management platform, MGH’s security team was easily able to expand camera coverage from 400 to 1,300 devices, standardized with Axis network cameras connected directly to the IP network. To deal with the marked increase in video data, MGH’s team chose BriefCam Syndex Pro, a powerful set of tools that reduce the time and effort needed SecurityLink India ■ 1 June 2017

CMYK

to conduct video reviews, post-event video investigation and real-time video monitoring. The BriefCam solution integrates seamlessly with the Milestone video management solution, providing efficient workflow for investigators. According to Michelman, BriefCam has proven invaluable. A two-year-long examination of video surveillance use at MGH has shown a progressive rise in success rates with the use of video in incident investigations. “In the past, there might have been things that would have been ‘nice to do,’ but we couldn’t do it because we didn’t have resources to watch many hours of video. Now we can manage the content and we can see trends, which in turn can drive redeployment of resources, and by extension, facilitate a better investigative focus and success,” said Michelman. 49


CMYK

APPLICATION/ CASE STUDY

iPhone app Detects Online Predators Predator-catching app is using algorithms to detect children’s emotions so it can alert parents when online threats surface

S

ophie is an iPhone app developed by researchers in South Australia. Sophie uses artificial intelligence (AI) to alert parents when their children demonstrate emotional behaviour such as anxiety or fear. The app is centred around a third-party keyboard, which studies typing patterns to identify when a child is under duress while on the device. It first builds a psychological profile of a child to use as a base to identify abnormal reactions. Co-founder Ben Flink said he came up with Sophie after hearing about a friend’s child who had been contacted by an online predator through a computer game. He said there was a glaring need for better safety features on mobile devices because more children were logging on to the internet at a younger age with minimal protection or awareness of the risks.

Sophie is intended to be a safety net for children who are first-time smartphone users

50

“There are 17 million kids aged 1217 years old on the internet on their mobile devices in the US alone and 10 per cent already admit to physically meeting up with strangers,” Flink said, “Predators like to elicit specific types of emotional and psychological responses from a child to build up a relationship and disenfranchise them from their existing network. “Sophie uses machine learning to pick up on emotional cues and through its algorithms can alert the parent with an indicator that perhaps the child is talking to a predator.” According to the National Center for Missing & Exploited Children there are almost 850,000 registered sex offenders in the United States. Sophie is intended to be a safety net for children who are first-time smartphone users. Similar to the way Fitbit watches track physical health and movement of the user, Sophie tracks language input on a Smartphone and monitors the mental wellbeing of a child. The app does this by studying the intensity, timing, tone and language of the user when they type and uses the information to determine a baseline of normal behavioural activity. Using a number of language and behavioural algorithms, the app searches for any significant variations in those categories. If there are any spikes of activSecurityLink India ■ 1 June 2017

CMYK

ity outside the child’s normal emotional range, an email is sent to the parents notifying them of the abnormal behaviour. It provides them with relevant advice on how to address the situation. The app also can be used to report cyber crimes including child exploitation and cyber bullying to authorities. Flink said although other anti-predator apps focused on locking, blocking and filtering a child’s phone, children and predators could still work out ways to get around these approaches. He said Sophie detected and analysed all language input through any app on the phone, making it a more efficient and less restrictive protection technique. It can also help to protect children from online bullying and mental health issues. “It’s not just looking at key words or phrases but a whole input of behaviour,” Flink said, “As someone with a young family, knowing that the current tools aren’t working means something needs to be done, “We want to use Australia as our test market at the moment before heading into North America because this is a global issue.” Flink is Deputy Director at the New Venture Institute, which is the centre of innovation and entrepreneurship at Flinders University in South Australia’s capital Adelaide. He recently took Sophie to Boston where it was a top 10 finalist at the Bridge to Mass Challenge accelerator program, joining other South Australian startups. It the quit-smoking app and Edufolios, which helps teachers manage their personal development. Sophie was co-founded by Briony Schadegg and digital agency Jamshop. It is set to launch on Apple’s App Store toward the middle of this year.


CMYK

APPLICATION/ CASE STUDY

Rapid Deployment of CCTV Solution For East Kowloon Marathon

A

s reported, there were more than 15,000 runners participating in the annual event of East Kowloon Marathon in Hong Kong which included 10km, semi-marathon, and 32.195km races. To ensure the safety of runners and the crowd, the organizer was aware of the need of enhancing surveillance and monitoring of the event at various locations. However, installing fixed surveillance points was not cost-effective whatsoever for such 1-day event, and literally no power supply or cabling was available at the locations where surveillance was needed. In order to enhance the safety of sudden surge of crowd at the event entranc-

es and adjacent public transport stands, OT Systems sponsored the grand event with their compact All-in-one Rapid Deployment CCTV Cart solution that was quite capable to enable the live monitoring for crowd safety at the event where CCTV is inadequate. Its modular, selfoperating design also eased the concern that no power or cabling was available at the surveillance points. OT Systems Rapid Deployment CCTV Solution is an instant, intelligent and highly mobile security modular system that supports customized integration, and built with PTZ IP cameras, batteries, Wi-Fi/ 4G router, emergency lighting, PA equipment etc., on a (max.)

6-metre aluminium pneumatic mast. The system can also be powered by AC/ solar power, and it features high mobility, quick and easy installation, to ensure uninterrupted operation that is ideal for temporary, urgently deployed and highly mobile surveillance without fixed installation.

Securing Santos FC W

hen Santos FC, Brazil decided their security and safety arrangements needed upgrading to protect its players, its fans, and not least its reputation, it picked IndigoVision. The existing arrangements didn’t have the visibility or flexibility to achieve full security but by upgrading and integrating them with IndigoVision’s, a whole new level of flexible security was achieved, along with significant savings. To improve the visibility, the existing analog PTZ cameras were replaced with high resolution IndigoVision PTZ cameras so license plates are easily read and faces are easily recognized. 22 BX600 HD bullet cameras were added and 123

existing analog cameras were brought to IP standard and integrated within the new system, all via the open system of IndigoVision encoders. All of this was made possible on the existing network as a result of IndigoVision’s H.264 image compression. Due to the flexibility of Control Center, IndigoVision’s security management software, all cameras can be monitored from multiple locations. Map Based Monitoring and Pursuit Mode help operators track events from the access streets. Besides the Operation Controlling Center, the Situation Room that was implemented can be used not only by the Military Police, but also by the entire SecurityLink India ■ 1 June 2017

CMYK

Improved visibility and flexibility achieved for operators, and a safer feeling for Santos FC fans

security area of Santos FC. Playback features such as Smart Search and Thumbnails make Control Center an even more powerful security tool. Built in analytics help save storage by dropping the framerate. When no motion is detected it drops to 1 frame per second. With motion it ramps up instantly to 30fps. “Our home is now safer, providing a great service to the public that attends Vila Belmiro. Security is our focus and this is very good to all the people who come to Vila Belmiro,” said Modesto Roma Jr, President of Santos FC.” 51


CMYK

WHITE PAPER

Overcoming the Three Main Challenges of Deploying Surveillance Cameras on the Exterior of Trains By Kevin Shen – Product Manager, Moxa

T

here are multiple challenges for rail operators to consider and overcome before a reliable surveillance system can be deployed on trains. Many experts within the rail industry agree that the most challenging place to deploy surveillance cameras is on the exterior of trains. As trains regularly travel at up to 200 kph, cameras that are installed on the exterior of the train need to be specially designed to withstand the forces that will be encountered. There are two main advantages to installing cameras on the exterior of trains. The first is that these cameras can assist train operators to ensure that the doorways are clear, which is particularly important as this is the most likely place for accidents to occur. The second is that the cameras can help monitor the pantograph. When there is clear footage of a problem that occurred with the pantograph, it is easy for train operators to determine when and why the pantograph malfunctioned. This white paper will explore the three main challenges that occur when deploying cameras on the exterior of trains including extreme weather, cor52

rosion, and scratches, as well as how to ensure flexible installation and easy maintenance. Finally, some of the technologies that are available to rail operators to overcome these challenges are explored.

Challenge 1 Ensure cameras on the exterior of trains can withstand all weather conditions

S

urveillance cameras installed on the exterior of trains must be able to withstand any type of weather throughout the year. When the train is moving at high speeds and the weather is extreme, the challenge becomes even more convoluted. Before train operators deploy cameras on the exterior of trains they need to make sure that their cameras will work reliably in these challenging conditions.

Operating in high temperatures

I

n some parts of the world, summer temperatures can regularly reach

SecurityLink India â– 1 June 2017

CMYK

and exceed 40°C. When cameras are installed on the exterior of a train, the temperature of the camera can be much higher as there are many electrical components and cables contained within the camera that all conduct and generate heat. As the camera is concealed within a tightly sealed metal housing it is hard for heat to dissipate, which further increases the temperature. It is important that when train operators purchase cameras from device manufacturers, they receive a guarantee that each component within the camera has been tested to withstand high temperatures for prolonged periods of time. The lens, ICR, optical filter, and the image sensor should all be subjected to temperature tests over a period of at least 48 hours with high humidity. The testing should also include high and low temperature cycles to ensure that image quality is not impacted. In addition, all cables must be UL-certified to ensure they can withstand the outside temperature as well as the additional heat that is generated within the camera due to poor dissipation. Rail experts often advise to deploy components with a slightly wider


CMYK

white paper Surveillance Cameras on the Exterior of Trains

WHITE PAPER

temperature range than is expected to be encountered as this will protect against unexpectedly high temperatures. Products and components that can withstand high temperatures will receive the appropriate thermal and reliability certifications that allow train operators to deploy the camera for at least five years with little risk that the camera will malfunction when it experiences very high temperatures.

Temperature

Temperature at

Temperature at the

Temperature at

of the heater

top of the glass

center of the glass

bottom of the glass

VPort 06EC-2V

70°C

19°C

4°C

18°C

Other brands

16°C

-16°C

-14°C

0°C

Camera

For example, the front screen should be completely flat as this will make it difficult for snow to build up. Although the design of the casing can reduce the chances of snow or frost sticking to the screen, sometimes it is unavoidable when operating in extremely low Operating in tow temperatures and the train is moving temperatures hallenges for deploying cameras in at high speeds. One solution that is environments where temperatures available to train operators is to add Testing Chamber can reach -30°C are not just restricted a heater that is capable of heating the Testingsupply Chambermust be guaranteed to ensure to how low temperatures can impact the front screen evenly and quickly in very that the current does not get disrupted, VPort 06EC-2V effective heater that can heat thebeglass causing theevenly screen to the losewhole heat ofand temperatures. Thishasisannormally mechanical operation of cameras. An low Moxa’s come by snow oris -40°C. frost. When ensuring the 10 heater goeseven all when example is when snow or frost covers achieved by screen within minutes the blocked outside temperature the front of the camera, making record- the way around the screen, as opposed the heater fails, the image quality will ing impossible. Further compounding to placing a heater at the bottom of the not meet the high standards that are reis only capable of heating quired by train operators. Finally, the the challenge of deploying cameras in screen, Water which Resistance cold weather is that trains moving at part of the screen. In addition, a highly material for the front screen has to be For many years, the technology has been available to deploy cameras reliably in outdoor high speeds will disperse heat away from reliable heating method is required, carefully selected when being deployed environments. However, in order to guarantee a camera remains waterproof when it is the camera. For the purpose of this white which is usually achieved by using a in freezing temperatures. Tempered deployed on theboard exterior of a train, several additional factors must be considered. though glass has many advantages over Even plastic circuit (PCB) as it allows paper, the focus will be on how to ensure printed IP66 and IP67-rated cameras are aboth designed to normal withstandglass heavyasrain, IP67-rated cameras and it will withstand heater to be activated using digital snow and ice does not build up on the the are also designed to withstand pressure. Therefore, choosing IP67-rated cameras is front of the camera, as opposed to how power switch as opposed to a mechani- weather extremes much better, and will advantageous deploying trains that at high speeds and encounter heavyderain. not become discolored over long switch. A when digital power onswitch is travel to ensure proper mechanical operation cal However, it should noted that IP66 and IP67-rated cameras periods, which is simulate essentialdifferent for significantly more bereliable thanthea tests me- for ployment in low temperatures. train operators whooperators need to who guarantee is particularly scenariosswitch, that can which be experienced on the outside of trains. For train require Some of the problems caused by chanical long product deployments. when operating in very cold cold weather can be averted with a important extra reliability, it is advisable to choose cameras that have both the IP66 and IP67 rating. Moxa’s VPort 06EC-2V has an efcasing that has a weatherproof design. temperatures because a constant power Condensation fective heater that can evenly heat the whole of the glass screen within 10 mindeployed on the exterioron of trains frequently subjected to environmental There are two main advantages Cameras to installing cameras the areutes even when the outside temperature conditions that can cause condensation to form. When exterior of trains. The first is that these cameras can assist is -40°C.the camera is operating, its processor will generate a lot of heat causing the inside of the camera to increase in temperature. When

C

train operators to ensure that the doorways are clear, which is the temperature outside is very cold, the difference in temperature will cause condensation to Water resistance particularly important as this is the form most likely place for accidents on the inside of the camera. Even cameras that IP68 rating are only dustproof or have manyanyears, the technology has to occur. The second is that the cameras can help monitor the and waterproof and do not protect against humid air traveling from one side of the glass to the been available to deploy cameras Therefore, protection is not sufficient to prevent condensation pantograph. When there is clearother. footage ofhigh a ingress problem thatalonereliably in outdoor environments. Howforming on the inside of the camera. The best way to overcome this problem is to use areever, in order to guarantee a camera occurred with the pantograph, it is easy for train operators to waterproof whencondensation it is deployed protective coating on the inside of the front of mains the camera that prevents from determine when and why the pantograph malfunctioned

F

on the exteriorreliably. of a train, several addiforming and ensures that the camera can continue to operate SecurityLink India ■ 1 June 2017

CMYK

53


CMYK

white paper

Rail experts often advise to deploy components with a slightly wider temperature range than is expected to be encountered as this will protect against unexpectedly high temperatures. Products and components that can withstand high temperatures will receive the appropriate thermal and reliability certifications that allow train operators to deploy the camera for at least five years with little risk that the camera will malfunction when it experiences very high temperatures tional factors must be considered. Even though IP66 and IP67-rated cameras are both designed to withstand heavy rain, IP67-rated cameras are also designed to withstand pressure. Therefore, choosing IP67-rated cameras is advantageous when deploying on trains that travel at high speeds and encounter heavy rain. However, it should be noted that the tests for IP66 and IP67-rated cameras simulate different scenarios that can be experienced on the outside of trains. For train operators who require extra reliability, it is advisable to choose cameras that have both the IP66 and IP67 rating.

Condensation

C

ameras deployed on the exterior of trains are frequently subjected to environmental conditions that can cause condensation to form. When the camera is operating, its processor will generate a lot of heat causing the inside of the camera to increase in temperature. When the temperature outside is very cold, the difference in temperature will cause condensation to form on the inside of the camera. Even cameras that have an IP68 rating are only dustproof and waterproof and do not protect against humid air travelling from one side of the glass to the other. Therefore, high ingress protection alone is not sufficient to prevent condensation forming 54

on the inside of the camera. The best way to overcome this problem is to use a protective coating on the inside of the front of the camera that prevents condensation from forming and ensures that the camera can continue to operate reliably.

Challenge 2 Ensure cameras on the exterior of trains can withstand corrosion and scratches

A

scratch-resistant casing should be deployed on any cameras mounted on the exterior of the train to ensure that the front of the camera is not damaged or broken. Avoiding corrosion is particularly important because cameras mounted on the outside of the train are constantly subjected to challenges such as pollution, acid rain, or salt water, and it is

critical that they do not develop weak points because of corrosion.

Corrosion resistance

O

ne of the best ways to prevent a camera from corroding is a smart design. For example, the overall shape of the camera should not have any sharp angles. Cameras with sharp angles produce weak points in the protective coating which is then more likely to peel and leave the camera exposed to the elements. Coating the casing of the camera with powder paint has advantages over other coatings mainly because it offers the hardest finish. When the casing of the camera is being coated with a protective layer there is a balance that needs to be met. If too little coating or treatment is applied, the camera will not be sufficiently protected against corrosion. However, if too much coating is applied, the camera will no longer have a smooth finish. When the coating is no longer flat, the water resistance will be weakened, making the camera more likely to suffer water damage. The last thing that should be considered is the type of screw that should be used. A standard screw that uses SAE 304 (EN 10088-2 1.4301) stainless steel will not be able to withstand the extreme weathers that are often experienced along coasts. For

A camera with adjustable pan and tilt functions. The camera’s angle must be locked before being deployed on trains to ensure it meets the EN 50155 standard

SecurityLink India â– 1 June 2017

CMYK


CMYK

WHITE PAPER

higher levels of reliability, SAE 316 (EN 10088-2 1.4401) stainless steel screws should be used. The best way to determine if cameras are ready for deployment on trains is to subject them to the ASTM B117 (NSS) or ASTM B368 (CASS) test. Taking the previous suggestions into account will help ensure that cameras are well protected against corrosion, and subjecting cameras to these tests will confirm that the cameras are ready for deployment on the exterior of trains.

Scratch resistance

A

scratch-resistant screen is essential for surveillance cameras deployed on the exterior of trains as the slipstream of a train often causes small stones and grit to get sucked in and collide with the front of the camera. Broadly speaking, train operators have two options available. The first option is 5H tempered glass, which is very hard and provides good scratch resistance, but does not effectively protect against deliberate acts of vandalism. The second option is plastic, which is less likely to break when vandalized, but is more susceptible to being scratched. For cameras deployed on the exterior of trains, scratches and abrasions from small stones and other debris pose more of a risk than vandalism, so most train operators prefer to deploy a front casing that is made from tempered glass as opposed to plastic in order to fulfill project requirements.

Challenge 3 Ensure cameras on the exterior of trains can be installed and maintained effortlessly

T

he positions where cameras can be installed on trains are de-

One of the best ways to prevent a camera from corroding is a smart design. For example, the overall shape of the camera should not have any sharp angles. Cameras with sharp angles produce weak points in the protective coating which is then more likely to peel and leave the camera exposed to the elements termined when the train is built and assembled. This varies across train manufacturers, which all use slightly different designs. In order to increase the chances of a camera being suitable for a particular deployment, train operators prefer to have a selection of different lenses to choose from as well as an adjustable pan and tilt function to increase the likelihood of meeting the different requirements for each project deployment. In addition, it is essential that the camera components fit into a very compact unit to comply with the EN 50155 standard. The components of a camera must not move when a train is in motion. As trains experience strong vibrations when travelling at high speeds, any moving parts are weaknesses that are liable to malfunction. This includes features such as pan, tilt, and zoom. In addition, cameras with moving parts will not be able to meet the EN 50155 standard that determines product suitability for deployment on trains. When a camera is attached to a train, an adjustable pan and tilt function allows the train operator to decide the angle they want the camera to be set at, though SecurityLink India â– 1 June 2017

CMYK

this must be locked before the train becomes operational. When train operators have this increased flexibility, it significantly increases the chances that the camera will be able to meet the project requirements. In some situations, an adjustable pan and tilt function may not be sufficient. One typical scenario is when a train operator needs the camera to record the platform and the train door at the same time. Alternatively, they may be deploying multiple cameras on the train that all require different viewing angles. The best way to overcome this problem is to provide the train operator with a variety of different lens options to ensure that their cameras can always fulfill the project requirements. The difficultly here is for the camera manufacturer who must ensure that all of the different lenses can still fit within the compact housing and that the viewing angle is not impacted by the housing design. Only when these requirements are met will the cameras be ready for deployment on the exterior of trains.

Conclusion

W

ith the significant advances in technology over the past few years, it is clear that deploying cameras on the exterior of trains is now an option for train operators. For most deployments, there are several options that train operators can choose from. However, a good understanding of the requirements for their project will allow them to choose the most suitable option. Although there are several challenges that have to be overcome, train operators have noted that it is worth the effort as it can help turn cameras on the exterior of trains into deployments that are beneficial and profitable to train builders as well as train operators. 55


CMYK

PRODUCT SHOWCASE

Tyco Brings Multi-Site, Integrated Security to the Edge

Software House debuts its iSTAR Ultra Video appliance that pairs robust access control features with embedded video surveillance for the ultimate in edge technology

T

yco Security Products, part of Johnson Controls, introduces the iSTAR Ultra Video, a palm-sized solution that delivers integrated, small site security scaled for enterprise management and performance. Using C•CURE 9000 security and event management software from Software House, or American Dynamics’ victor Unified client, iSTAR Ultra Video brings access control and video recording to the edge, allowing users to remotely control up to eight doors and eight IP video cameras using a single appliance, without the need for server software at each site. The cost-effective iSTAR Ultra Video combines access control and video surveillance functionality in a single appliance, reducing installation and infrastructure costs by eliminating the need for separate devices and network connections. With scalability to thousands of sites, it is ideal for enterprise environments with unmanned sites that require a high level of security such as power sub stations, data centers, server farms, fiber huts and other utility and telecommunication sites. AES 256-bit FIPS 140-2 network encryption with custom key management and DoS protection help avert potential network 56

threats. Up to 500,000 cardholders can be managed in the device’s local memory. Using a 1TB on-device storage drive for video surveillance and a separate solid state drive for its local database for access control storage, iSTAR Ultra Video remains operational even when the network is down, capable of making

access decisions and recording video until network connectivity is restored. Each iSTAR Ultra Video device includes American Dynamics’ VideoEdge network video recorder firmware that enables end users to use transcoding, smart search and other VideoEdge features. Up to 6 TB of external storage can be added to the device, providing extensive local recording capacity. SecurityLink India ■ 1 June 2017

CMYK

“With iSTAR Ultra Video, enterprise customers can easily extend the power and functionality of their C•CURE 9000 or victor Unified system to large networks of distributed sites without many of the traditional costs and installation concerns of adding separate access control and video products,” said Rick Focke, Senior Product Manager for Tyco Security Products, Hardware, “This secure, cost effective solution enables single point monitoring and control of a security system that can encompass even remote locations.” End users can monitor video surveillance and access control events, manage personnel, create reports, display dynamic views, and monitor system activity from a PC or by using C•CURE 9000 or victor Unified full clients, a web client or mobile app. iSTAR Ultra Video provides access control through IP-ACM Ethernet door modules, which feature AES-256 encryption, PoE and a configurable offline mode. iSTAR Ultra Video can be used in both LAN and WAN environments, and offers secure connectivity over a public network using fully secured gateway software that also enables cloud connectivity.


CMYK

PRODUCT SHOWCASE

Eco-savvy 3.0 & 4K PTZ Camera Compatible with Genetec

D

ahua’s Eco-savvy 3.0 and 4K PTZ cameras have recently been integrated with Genetec’s Security Center 5.6 GA. Dahua Eco-savvy 3.0 model is capable of delivering real-time 1080p video streams at 60fps, 4MP video streams at 30fps and 4K video streams at 15fps. Its real-time high resolution is especially suited to the applications that require detailed surveillance. Latest H.265 compression cuts bandwidth in half to further lowering storage cost. These series showcases a range of smart detection features including face detection, tripwire detection, and intrusion

detection to equip users with more precise video analysis and thereby greater security efficiency. Featuring powerful optical zoom and accurate pan/ tilt/ zoom performance, the 4K series camera provides large monitoring range with great detail. The camera delivers 4K resolution at 25 to 30fps, with 30x optical zoom. It combines a day/ night mechanical IR cut filter for the highest image quality during variable lighting conditions, day and night. Genetec owns the second largest third-party VMS platform in the world. It

develops open-platform software, hardware, and cloud-based services for the physical security and public safety industry. Its flagship product, Security Center, unifies IP-based video surveillance, access control and automatic license plate recognition (ALPR) into one platform. “Integration with Genetec is a major breakthrough this year for Dahua international market,” says James, Deputy General Manager of Dahua Overseas Business Center, “As it allows Genetec customers to adopt Dahua products in their future projects, expanding their options.”

Pelco Sarix™ Enhanced IP Cameras Delivering outstanding performance in any lighting environment

P

elco by Schneider Electric presents Sarix™ Enhanced IP Cameras in fixed bullet, box and dome configurations. Designed for demanding mainstream applications, Sarix Enhanced IP Cameras feature Pelco’s exclusive SureVision™ 3.0 technology that delivers exceptional wide dynamic range (WDR) performance for the most challenging lighting environments. “Our line of Sarix Enhanced IP Cameras is the ideal IP imaging solution for mainstream applications where nothing but the best will do,” said Diane Feliciano, VP, Global Marketing, Pelco by Schneider Electric, “Available in a broad selection of form factors, they are right for virtually any application and lighting environment at competitive price

points.” Sarix Enhanced IP Cameras feature Pelco’s exclusive SureVision 3.0 technology to capture superior images in difficult lighting conditions where highly contrasted lighting sources exist within the same scene. An enhanced WDR of 130 dB, advanced low light performance with full color down to 0.05 lux, antibloom technology, 3D noise filtering, enhanced tone mapping for color accuracy, and more ensure excellent performance for myriad mainstream applications. Sarix Enhanced IP Cameras also feature preloaded analytics on every model, including abandoned object, intrusion detection, camera sabotage, wrong direction, loitering detection, object counting, object removal, and stopped SecurityLink India ■ 1 June 2017

CMYK

vehicle. The analytics can be remotely enabled and configured, and are compatible with Pelco VMS as well as third party VMS partners that support Pelco’s open API. Additional key features include high frame rate operation of up to 60fps (or 30fps with WDR enabled) to capture fast-moving events at full resolution; and optional IR illumination which enables operation in complete darkness (0.0 lux) at distances up to 30 meters (approximately 100ft.). 57


CMYK

PRODUCT SHOWCASE

WD Expands NAS-optimized Hard Drive Offerings to 10TB

With Advanced Storage Helium-Based WD Red and WD Red Pro Hard Drives Award-winning line offers optimal performance, high capacity and reliability for always-on NAS systems

W

estern Digital Corp. has recently announced the expansion of its award-winning WD Red® and WD Red Pro NAS hard drives lineup with the introduction of 10TB capacity models optimized for use in personal, home; and small to medium business NAS systems. WD has shipped more than 15 million Helium-based high capacity drives into multiple applications, including for NAS systems, to date and is continuing to support customers with higher capacities and outstanding reliability. The WD Red line of NAS hard drives allows customers to scale up or down to meet their changing NAS storage needs. “In July 2012, we introduced the

58

WD Red line to address the unique performance, compatibility and scalability challenges facing home and small business NAS customers,” said Brendan Collins, Vice President, Devices Business Unit at Western Digital, “Five years and over 16 million WD Red family hard drives later, we continue to advance the platform by bringing in our innovative HelioSeal platform and other advanced technologies that allow customers to meet their evolving private cloud needs.”

WD Red 10TB NAS hard drive

W

D Red hard drives address the unique environment of NAS and the growing demand for affordable, reliable and compatible storage that reduces customer total cost of ownership. Designed with Western Digital’s HelioSeal® Heliumtechnology, the WD Red 10TB hard drive provides higher capacity and performance to meet the increasing storage needs of always-on, single to 8 bay NAS systems. The Helium-based design enables a 25 percent capacity increase from the WD Red 8TB NAS storage drive.

SecurityLink India ■ 1 June 2017

CMYK

With support for up to 16 bays in towerand rack-based systems, the WD Red Pro 10TB hard drive delivers the same high performance, reliability and capacity to systems operating in up to 16 bay NAS systems.

WD Red/ WD Red Pro 10TB

● HelioSeal: Bringing Western Digital’s fourth generation, exclusive HelioSeal technology in 10TB capacity to the NAS storage market. ● 3D Active Balance Plus, an enhanced balance control technology that improves overall drive performance and reliability. ● Seamless integration with Western Digital’s My Cloud® Pro Series NAS and My Cloud Expert Series NAS systems designed specifically for the creative community to enable seamless transfer of content between devices in any location, whether users are shooting remotely or editing at home. ● NASware® 3.0, an enhanced version of WD’s original NASware technology, designed to improve reliability and system performance, reduce customer downtime and to simplify the integration process. ● Optimized performance class: 5400 RPM class for SOHO environments, 7200 RPM class for up to 16 bay NAS systems.


CMYK

PRODUCT SHOWCASE

New TETRA Critical Communications Systems W

hen crowds descend for major events including rugby events in Hong Kong or motor-sport in Singapore; emergency services, government agencies and businesses of all sizes need seamless communications to deliver the best experience. From the busy airport gate to the noisy concert and the bustling local shopping centre – reliable team communication gives workers the tools they need to get the job done. The latest radio systems from Motorola Solutions DIMETRA TETRA portfolio deliver highly-scalable and efficient communications to meet the critical communications needs of all organizations in any circumstance.

DIMETRA X Core

D

IMETRA X Core is a new, fullyscalable TETRA system to support mission-critical communications for public safety, as well as enterprise organizations including utilities, public transport and oil and gas companies. DIMETRA X Core enables TETRA users to get the most out of their existing DIMETRA TETRA network today while preparing for mobile broadband capabilities tomorrow. The system features an efficient software-defined core to reduce system operating costs as well as enhanced cyber security features to protect from ever increasing threats. DIMETRA X Core is built for long-term, mission-critical communications performance for the next 15 years or more. The system is an ideal replacement for existing DIME-

TRA TETRA systems that will enhance and prolong the life of existing radio access networks. As technology evolves, so will DIMETRA X Core systems with their advanced, flexible and fully scalable architecture enabling system design and expansion from one site to 5000 or more. As needs change, the system can easily accommodate new users and capabilities simply by enabling software licenses. Regular software updates also help to keep TETRA networks operating at their peak while opening up new, broadband-enabled capabilities. This includes smart interfaces to WAVE Work Group Communications providing push-to-talk solutions and Intelligent Middleware to extend voice communication and applications between radio and broadband networks to users of radios, computers, smart phones and other devices. DIMETRA X Core also lowers the long-term total cost of ownership for organizations by minimising the amount of hardware and physical space needed to operate the system. This results in less energy consumption and lower costs for maintenance and operation. With scalable and flexible pricing based on network coverage, capacity and capabilities, customers pay only for what they need. “DIMETRA X Core enables emergency services and enterprise organizations to extend the life of their DIMETRA networks while preparing for additional capabilities offered by the broadband technologies of tomorrow,” said Bruce Brda, Executive Vice PresiSecurityLink India ■ 1 June 2017

CMYK

dent, Products and Services at Motorola Solutions. Of the 1,000 DIMETRA TETRA digital radio systems that Motorola Solutions has delivered globally from its Centre of Excellence in Berlin, 400 are within the Asia Pacific region.

DIMETRA 9.0

D

IMETRA 9.0 is the latest system software release for DIMETRA X Core as well as for existing DIMETRA system customers. It provides new features including the Inter System Interface to connect voice communication over multiple TETRA networks across regions and borders. The update also ensures organizations are better protected from ever increasing cyber security threats.

DIMETRA Express ‘OneBox’ TETRA Solution

M

otorola Solutions’ DIMETRA Express is a single-site TETRA digital radio system, all in one-box, that can be deployed within 15 minutes, which save time, and help increase performance, reliability and responsiveness. It was developed to meet demand from customers and partners for a product that is easy to deploy and cost efficient enough to be used for smaller projects. It also enables smaller organizations in sectors including manufacturing, public transport, hospitality or oil and gas, to benefit from high-quality audio, short data services (SDS) and telephony services. 59


CMYK

PRODUCT SHOWCASE

Additional Explosion-Protected Cameras For Agile Incident Management and Business Efficiency

Three new explosion-protected temperature alarm and thermal network cameras allow operators to monitor remote, inaccessible, and sensitive areas, allowing for rapid incident response. Based on industry standards and open protocols the new cameras can seamlessly integrate with existing supervisory control and data acquisition (SCADA) architectures

A

xis Communications has recently announced three new explosion-protected cameras for use in sensitive industrial areas: XF40-Q2901 Explosion-Protected Temperature Alarm Camera, XF60-Q2901 Explosion-Protected Temperature Alarm Camera, and XP40-Q1942 Explosion-Protected PT Thermal Network Camera. “Industrial plant operators have a difficult task as they need to ensure efficiency and continuity in large-scale critical industrial processes, while meeting all health, safety and environmental regulations, across multiple locations and, often times, across large areas,” says Anthony Incorvati, Business Development Manager, Critical Infrastructure & Transportation, Axis Communications, Inc., “Axis’ new explosionprotected cameras can deliver critical real-time information that allows for immediate incident response which can be lifesaving.”

60

Typical industrial applications for the fixed XF40Q2901/ XF60-Q2901 explosion-protected temperature alarm cameras include control and detection of temperatures of equipment and leaks in pipes, fire detection, monitoring of equipment and perimeter protection. They also help visually inspect and verify that functions and processes are running correctly, and even providing remote assistance with planned maintenance. Typical applications for the pan/ tilt XP40-Q1942 explosion-protected PT thermal network camera include detection of people in restricted areas and safety of personnel in hazardous areas. In addition, XP40-Q1942 also supports Axis’ Electronic Image Stabilization (EIS) and Zipstream technologies. EIS improves video quality in situations where a camera is subject to vibrations, providing smooth and comfortable live viewing while Axis’ Zipstream lowers the bandwidth and storage requirements. Axis explosion-protected thermal cameras and temperature alarm cameras offer worldwide certifications, meaning that the cameras are compliant with specific country regulations across the globe. The new explosion-protected cameras will be available through Axis’ standard distribution channels in May 2017 at a suggested retail price.

SecurityLink India ■ 1 June 2017

CMYK


CMYK

PRODUCT SHOWCASE

Expanding H4 SL Platform with 3MP and Indoor Models With exceptional image quality, H4 SL camera line combines value and performance

A

vigilon has recently announced the expansion of its H4 SL camera line with the addition of a 3MP camera and indoor dome models. Built on the Avigilon H4 platform, the H4 SL camera line combines exceptional image quality with an innovative and modular design which is easy to install. The new H4 SL 3MP camera provides customers with increased image details and is designed for a broad range of lighting environments through its use of wide dynamic range, content adaptive infrared and patented Avigilon LightCatcher technologies. The new indoor dome models incorporate the same

performance and installation features of the H4 SL outdoor domes, while offering customers an even more attractive price point for indoor applications. “The H4 SL is our easiest-to-install camera line, decreasing installation time up to 50 percent,” said James Henderson, Avigilon’s Chief Sales and Marketing Officer, “Combined with exceptional reliability, image quality and greater bandwidth efficiency it provides great value and a low total cost of ownership for our customers.” The new H4 SL models are immediately available to order, and feature the recently launched Avigilon HDSM

The new H4 SL indoor dome and 3 MP camera models

SmartCodec technology for bandwidth management.

Safran Identity & Security Reveals its Contribution to the New Mastercard Biometric Card S

afran Identity & Security (ex Morpho) has recently announced that it is contributing with biometric card software and manufacturing capacities for the recently announced Mastercard next “We are proud to leverage our unique biometric expertise and facilitate the future of payments together with Mastercard. Biometrics enables seamless payment transactions without compromising security.” – Anne Bouverot President and Chair Safran Identity & Security

generation biometric card. This new generation payment card combines chip technology and biometrics to a strong and convenient means of authentication at the Point of Sale (POS). Instead of entering a PIN, cardholders simply place their finger onto the card. Their fingerprint is then matched against the biometric template on the card. Its ability to link an individual’s biometric identity to a payment card opens up a wide range of new ways to use the card beyond authenticating payment transactions. Furthermore, the card helps issuers to reduce fraud and SecurityLink India ■ 1 June 2017

CMYK

increase customer loyalty by ensuring that their card stays on top of their customer’s wallets. 61


CMYK

PRODUCT SHOWCASE

Axxon Next 4.0.2 Released A

new version of the Axxon Next video management system has been released. This version includes more than 50 new features and enhancements that are particularly useful at large sites.

Improved video search capabilities:

● Added identification of ‘friend or foe’ for face search. This is a quick way to find out how often a person of interest has appeared in the cameras’ field of view. ● You can now sort search results by time. ● Improved quality of face recognition and license plate recognition. ● Keywords are now highlighted in results when searching by captions. Intel quick sync video hardware decompression technology can now be used when viewing recorded video and in Time Compressor. IQSV for live video was implemented in Axxon Next 4.0.1. This technology significantly reduces CPU load of a client computer.

The new version has enhanced the automated responses to events (Macros), and added new conditions for triggering response scenarios, new types of responses and new operation modes. For example, when setting up actions, one can select groups of cameras and users, and in the open layout action the monitor can now be selected. The updated access rights system allows to assign rights by time ranges, hide captions from users and view alerts without being able to manage them. System configuration is now easier and faster. It implemented filters for searching by camera model and manufacturer when adding a device manually. In addition, Axxon Next now allows to use presets that are already on the camera. The new version also has the availability of batch creation of detection tools

Filter

62

SecurityLink India ■ 1 June 2017

CMYK

for a group of cameras. New video quality control tools have also been added such as: ● Image noise detection. ● Blurred image detection. ● Compression artifacts detection. The updated web interface in the system allows to play audio and export recorded video, and to choose the video stream to display. When you add new cameras to the server configuration, they appear dynamically in the web client without a page refresh. Added features of archive export: 1. Perform multiple export operations with the same settings. 2. Define a template for naming exported files. 3. Assign a password when exporting to .exe format. 4. Export frames and videos to a password-protected ZIP archive. Additional enhancements made to the user interface are the operator audit system, the HTTP API and other components. The Axxon Next 4.0.2 installation file, documentation, and release notes with a complete list of changes are available on the website.


CMYK

PRODUCT SHOWCASE

NICE Actimize Introduces

Robotic Process Automation

To Improve Financial Crime and Compliance Efficiency NICE Actimize RPA, integrated with Actimize Case Management, lowers the cost of compliance and increases investigator productivity

N

ICE Actimize has launched NICE Actimize Robotic Process Automation (RPA), a sophisticated technology that frees up investigators from low value, high volume manual tasks so that they may better focus on more important and strategic tasks. To further add value, NICE Actimize is integrating RPA within its existing NICE Actimize Enterprise Risk Case Manager Solution to lower the cost of compliance and potentially increase investigator productivity up to 50 percent. Robotic Process Automation has been an integral part of the NICE product portfolio for nearly seven years. NICE Actimize is leveraging this heritage by applying RPA technology to its

financial crime solutions suite. Unique to the NICE Actimize RPA solution, the technology offers both attended robotic automation, which works side by side with an analyst to support their daily tasks as needed, and unattended robotic process automation in which a digital workforce is deployed to complete tasks. “The data challenge isn’t going away and investigations aren’t getting simpler,” said Joe Friscia, President, NICEActimize, “Robotic Process Automation is the key to better resource utilization, increased accuracy and productivity, and improved return on investment. As we continue to invest in automation and artificial intelligence, we will further integrate our analytics

and machine learning competencies into our solutions to ensure greater efficiency and cost savings for our clients. This is the present and future of financial crime compliance.” NICE Actimize RPA automates investigation tasks where it may not be necessary to have human involvement such as acquiring data from internal and external systems, copying and pasting client or account information across different screens, or preparing a case, thereby allowing teams to focus on high value activities rather than specific routine tasks. NICE has already deployed more than 500,000 robots serving more than 400 customers at some of the world’s most demanding organizations.

Enhances Cyber Security at the Edge Introduces Port Guardian Physical Port Lockout

C

omNet Europe Ltd of Leeds in the United Kingdom, part of ComNet Communication Networks, a USA-based manufacturer of transmission and communication networking equipment, has introduced a new Cybersecurity feature in its latest generation of self-managed switches. The ComNet Port Guardian feature has the capability to physically

disconnect a port if unauthorized access is detected. The value in Port Guardian comes in situations where network access is attempted by disconnecting an IP addressable device on the edge to connect to the network. When Port Guardian senses disconnect, a SNMP notification is sent to the head end and the effected port is SecurityLink India ■ 1 June 2017

CMYK

physically locked out, preventing access. The network administrator can reopen the port when the threat is eliminated. This feature also thwarts access through ‘Spoofing’ by disconnecting the port as soon as an interruption is sensed. This new feature is being added to the newest generation of ComNet SMS products including the CNGE2+2SMS and 63


CMYK

PRODUCT SHOWCASE

CNGE4+2SMS. The feature will also be available on the new ComNet USAmade Managed Switch line.

According to Steve Clarke, ComNet Europe Managing Director, “Unauthorized access issues or Cybersecurity is a critical challenge facing every network manager today. Your security network with its accessible outside connection, is an easy way to bring down your network. Cybersecurity is not something confined to just a security IP network, any network can be infiltrated. By introducing this valuable feature on these cutting-edge products, we can provide another unmatched advantage to our partners.”

“ComNet’s goal from day one has been to be a smart and secure choice for transmission products. Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” said Skip Haight, ComNet VP of Marketing, “Port Guardian is another reason ComNet continues to move ahead of our competitors,” Haight continued. ComNet offers an extensive line of fiber optic, copper and wireless video and data transmission equipment that is uniquely designed to meet the needs of the security, intelligent transportation system, utility and industrial markets.

QNAP NAS to Develop Disaster Recovery Plan Protect against WannaCry Ransomware

Q

NAP® Systems, Inc. urges all users to keep their Windows® operating systems up to date, as the recent outbreak of the WannaCry ransomware attack that targets Windows PCs has caused tremendous disturbances in nearly 150 countries. QNAP also urges users to mitigate the threat of ransomware by developing adequate disaster recovery plans by utilizing the backup and snapshot features in QNAP NAS.

64

The first line of defense against being affected by malicious software is being careful and practicing sensible usage habits including regularly updating your software, not opening untrustworthy emails, and not visiting unknown websites. Most antivirus experts agree that regular backing up data is the most fundamental and important way to defend yourself. Windows users can utilize the free QNAP NetBak Replicator backup utility to periodically back up PC files to QNAP NAS, while all users should enable snapshots to protect NAS data. It is easy to choose from multiple versions of snapshots to restore data whenever needed. Snapshots can also record the metadata of files outside the file system and allow users SecurityLink India ■ 1 June 2017

CMYK

to preserve and restore multiple versions of the same file, folder or even the entire volume. If ransomware attacks or an unexpected situation arises on the system, users can quickly and easily revert back to the previous state that the snapshot has recorded. Snapshot replica facilitates double protection that replicates snapshots to a remote QNAP NAS or server. QNAP Labs have simulated ransomware attacks, and confirms that QNAP snapshots can protect and restore data. As ransomware continues to grow as a threat against companies and individuals, no operating systems should be considered safe from attack, and making regular backups should be considered the primary method of protecting data from attack. QNAP again urges our users to enable backup and snapshot features to help protect their precious data.


CMYK

PRODUCT SHOWCASE

FLIR ETS320 Thermal Imaging Camera for Electronics Development and Testing

Purpose-built solution designed for more efficient benchtop testing and diagnosis

F

LIR Systems, Inc., has recently announced the launch of the FLIR ETS320 thermal imaging solution for electronics testing in engineering benchtop environments. As the first FLIR camera designed specifically for benchtop work in testing and analyzing the thermal characteristics of electronic components and printed circuit boards (PCBs), the FLIR ETS320 aims to advance testing and diagnosis accuracy in the electronics industry. The FLIR ETS320 combines a highsensitivity thermal camera, engineered for imaging PCBs and other electronics, with an adjustable, hands-free table stand to provide consistent, non-contact thermal testing through the entire electronics design, development and production process. By offering more than

76,000 points of temperature measurement, the FLIR ETS320 offers the ability to monitor power consumption, detect hot spots, and identify potential points of failure during product development. The camera’s high measurement accuracy and its ability to visualize small temperature differences helps evaluate thermal performance, ensure environmental compatibility, and troubleshoot problems for a wide range of electronic products. “The FLIR ETS320 provides a critical thermal perspective in the design, development, and testing of electronics components and devices,” said Andy Teich, President and CEO of FLIR Systems, “As electronics become increasingly smaller and more powerful, it is imperative to be able to

view and understand the thermal performance of these systems. Now there is a purpose-built system for this community.” FLIR designed the rechargeable, battery-powered unit for quick and easy setup, so product developers can have an immediate, real-time view into the thermal performance of their designs. The unit comes fully assembled and ready to connect to a PC running FLIR Tools software for detailed data analysis, recording, and reporting. The integrated test stand and sliding mount design allow for optimal flexibility when imaging both large and small electronic components. The FLIR ETS320 is now available for purchase through established FLIR distribution partners.

Keeping an Eye on the Essentials

SeeTec Cayuga & SeeTec BVI R10 SeeTec has recently announced R10 of their video management software (VMS) solutions SeeTec Cayuga and SeeTec BVI. While SeeTec Cayuga now includes the support of the new H.265 streaming standard as well as bi-directional audio, SeeTec BVI provides a new dashboard to visualise transaction and process data in real-time

V

oIP-based communication has already been possible with SeeTec Cayuga using a SIP server. With the release of R10, bi-directional audio connections directly to the camera are now implemented as well. Many IP

cameras already have built-in audio functionalities such as an integrated microphone or a line output. On this basis, SeeTec Cayuga now offers direct voice communication in both directions – without the need for additional SecurityLink India ■ 1 June 2017

CMYK

software components. For example, an employee in the control room can now remotely evaluate a critical situation much better, especially as he can directly communicate with a person on site. Therefore, the functionality is 65


CMYK

PRODUCT SHOWCASE

Visualisation of process data and key performance indicators in the SeeTec BVI dashboard

particularly suitable for use in combination with access control solutions, entrance doors or gates. As a first step, voice communication is supported with Axis devices, the support of further manufacturers is in preparation.

In terms of camera and hardware integration SeeTec Cayuga R10 offers innovations, too. For many manufacturers, the transfer of image streams based on H.265/ HEVC is now supported. Compared to MPEG-4, this new streaming standard reduces the required bandwidth while keeping the same image quality by up to 50%, thus saving network resources and disk space. While SeeTec Cayuga is primarily designed as a classic security application, SeeTec Business Video Intelligence (BVI) can be used to combine video and transaction data e.g., from PoS systems or scanners, enabling the gapless visual monitoring and documentation of business processes. Here the new release R10 creates visible added value for the user: With the recently

developed visualisation component, transaction data and process data can be displayed graphically on dashboards in real-time. Predefined key performance indicators (KPIs) can be visualised quickly and easily using several diagram types, so deviations or recurring patterns become immediately apparent. For example, the head of a distribution center can recognize irregularities regarding cases of loss or damage in his facility at an early stage – even remote via smartphone or tablet. Customers holding a software maintenance agreement (SMA) can retrieve and install the update to SeeTec Cayuga R10 and SeeTec BVI R10 via the auto updater or manually. SeeTec also offers a free demo version of SeeTec Cayuga on the company website.

Next Generation CipherTrust Monitor 2.0 Delivering convenience and operational savings for monitoring Hardware Security Modules The new tool gives customers instantaneous visibility of their entire Thales Hardware Security Module (HSM) estate

T

hales announces a new version of CipherTrust Monitor, the company’s flagship monitoring tool that allows network operations teams to monitor their complete estate of Thales hardware security modules (HSMs), both payShield and nShield, 24x7 and from one centralized location; giving them instantaneous visibility into alerts, tamper attempts, real-time status and capacity. CipherTrust Monitor can monitor both payShield and nShield HSMs through a 66

single pane of glass. Additional capabilities include enhanced monitoring and displays, as well as a new auditor role improving separation of duties. HSMs are used to ensure the trust of critical business applications by managing the encryption keys that protect these applications and data. Typically HSMs are housed in unattended, lights-out data centers or private clouds in remote locations. This environment creates a challenge for customers who need to access SecurityLink India ■ 1 June 2017

CMYK

their HSMs to ensure they are operating smoothly, without error and at optimum loading. The need to visit distant data centers can make data collection haphazard, complex and time-consuming, as well as costly. With these challenges top-of-mind, Thales has created CipherTrust Monitor, a solution that allows IT personnel to proactively respond to potential issues and optimize operations – both important requirements with increasing inter-


CMYK

PRODUCT SHOWCASE

nal and external IT security threats. With its around-the-clock visibility, CipherTrust Monitor 2.0’s benefits include: ● Identifying performance bottlenecks to improve capacity planning. ● Enabling immediate response to potential issues through comprehensive alerts. ● Eliminating the need to physically access HSMs to retrieve important data. ● Integrating seamlessly with existing HSM hardware and software configurations.

● Offering granular control over access to configuration and data through administrator, group manager, and auditor roles. Peter Galvin, Vice President strategy at Thales e-Security says, “Encryption is the well-accepted best practice for securing sensitive data, with HSMs providing the root of trust for critical business applications by protecting and managing the encryption keys. CipherTrust Monitor 2.0 provides customers with the ability to monitor their HSMs from the convenience of their own office, dramatically

reducing their ongoing key management costs. The ability to remotely and centrally track HSM operational health, capacity, and loading, reduces the need to travel to manually retrieve important data. This together with audit logs that can be used as proof of regulatory compliance brings convenience, cost reduction, and reduced downtime.” The latest version of CipherTrust Monitor will be available in Q2 2017 and is priced according to the number of hosting workstations and number of HSMs being monitored.

New Toxin-Resistant Hood Protects firefighters against hazardous substances

H

oneywell has developed a new hood to better protect firefighters from the long-term health threats of hazardous substances produced when today’s building materials burn. Honeywell’s new Life Guard Hood features an innovative design and fabrics that provide better blocking protection against hazardous particulates and toxins compared with traditional firefighter hoods. It also features a lighter, roomier fit that integrates with a firefighter’s selfcontained breathing apparatus (SCBA) and other turnout gear. The hood was developed by Honeywell First Responder, whose products, ranging from helmets to boots to respiratory gear, is used by 80 percent of the 20 largest municipal fire departments in North America. “Fighting fires is dangerous enough, but the added risk posed by hazardous substances in smoke means we need to do more to protect the men and women

who put their lives on the line every day,” said Ken Schmidt, Vice President and General Manager of Honeywell First Responder, which provides headto-toe protective gear for fire fighters and first responders, “Today, the most permeable piece of gear firefighters wear is their hood. We worked with fire chiefs and firefighters to develop our new Life Guard Hood, which blocks the particulates and toxins firefighters encounter in both air and water to help safeguard their long-term health.” There were more than 500,000 structure fires in the United States in 2015, and new building materials make those fires even more dangerous to firefighters’ long-term health. Modern synthetic products can release hazardous particulates, lethal gases and toxins when burn, and studies show that the skin and glands of the neck and face are especially prone to absorbing toxins. In addition, studies show that SecurityLink India ■ 1 June 2017

CMYK

several types of cancer are occurring at higher rates among firefighters than the general population, according to the Firefighters Cancer Support Network, which provides education and support to first responders. “When training first responders around the country, we receive many questions about how firefighters can protect themselves better from the toxins that are present in fire smoke,” said Jason Krusen, President of the Fire Smoke Coalition, which provides training to firefighters and first responders on the long-term health consequences of fire smoke, “Hoods such as Life Guard go a long way toward protecting responders better from airborne toxicants and particulates, and reducing the long-term health risks.” The particulate-blocking protection of the Honeywell Life Guard Hood is laboratory-proven and certified by the National Fire Protection Association. 67


CMYK

PRODUCT SHOWCASE

Extended Range Detection for FiberPatrol™-PR

Enhanced system more than doubles previous detection range capabilities and allows for more accurate intrusion locating

S

enstar has recently announced that FiberPatrol-PR, its fiber optic fencemounted sensor for perimeter applications, now provides up to 50km (31mi) of protection per processor, more than double of the system’s previous detection range capability of 24km (14.9mi). The intrusion locating accuracy of the system has also improved to within 4m

(13ft) from the previous 8m (26 ft). “This is the second time in just over a year we have implemented extended range capabilities for FiberPatrol-PR,” said Product Manager Stewart Dewar, “By enhancing the system, we are able to provide customers greater protection and more accurate locating with less infrastructure. This results in more eco-

Wisenet Range Integrates with Immix CS®

Hanwha Techwin’s entire range of cameras and recording devices have been successfully integrated with SureView’s Immix® CS central station software platform

T

he integration allows the latest Wisenet IP camera series and NVRs, as well as analogue DVRs to interact with Immix CS which is designed to improve the efficiency of central alarm monitoring stations offering video monitoring services. The same level of integration has also been achieved with Immix Command Centre (CC), a PSIM (physical security information management) software platform used by businesses, institutions and agencies to monitor alarms, access control, audio and situational awareness systems. “Our engineers have worked closely with the SureView technical team to ensure a high level of integration which allows operators to control key features and configuration of our cameras and recording devices,” said Tim Biddulph, Head of Product & Solutions at Hanwha Techwin, “Remote video response centres (RVRC) are now able to view the superb quality images captured by our cameras and domes. They can also utilise edge-based analytics on board our Wisenet IP network cameras as an effective event reporting tool and to reduce false alarms.”

68

SecurityLink India ■ 1 June 2017

CMYK

nomical deployments for long perimeter sites, including borders.” FiberPatrol-PR uses proven fiber optic technology to detect and locate intrusions. The system has a reduced nuisance alarm rate because it can differentiate between disturbances caused by real intrusions and environmental disturbances such as wind and rain. FiberPatrol-PR can detect and accurately locate intrusions even when there are multiple simultaneous intrusions, or in the presence of spatially-distributed environmental noise that would mask the detection capability of other longrange fiber optic sensors. As well, the system’s resilient design allows detection to continue right up to the point of a cut in the sensor cable. The system can also be deployed in a cut-immune configuration. FiberPatrol-PR requires no powered or conductive items in the field, making the sensor completely immune to EMI and lightning and intrinsically safe in the presence of explosive atmospheres. Senstar has been manufacturing, selling and supporting the world’s largest portfolio of perimeter intrusion detection sensor technologies for 35 years. Senstar is also a leading provider of personal duress solutions. Senstar products can be found around the world in more than 80 countries, in tens of thousands of sites including borders, ports, military and government, oil and gas, correctional, and other critical sites.


CMYK

PRODUCT SHOWCASE

Analytics-Driven Automation in Latest Version of Insights with Ansible Integration

With Ansible automation inside, Red Hat enables faster, automated resolution of critical security risks

R

ed Hat, Inc. has announced the latest version of Red Hat Insights, bringing the power of Ansible automation to its actionable intelligence platform. Aligned with Red Hat’s vision to dramatically simplify IT management with Ansible’s powerful automation capabilities, Red Hat Insights now offers users the ability to automate IT remediation of critical issues through Ansible playbooks. Now, any company will be able to create a selfoptimizing infrastructure with Red Hat Insights, enabling them to save valuable manual labor and associated costs. Red Hat Insights is a Software-asa-Service (SaaS) offering that provides continuous, in-depth analysis of an organization’s Red Hat-based infrastructure to help proactively identify threats to security, performance, and stability across physical, virtual and cloud environments, as well as container deployments. Powered by predictive analytics, Red Hat Insights learns and gets smarter with every additional piece of intelligence and data. It can automatically discover relevant insights, proactively recommend tailored next actions and even automate tasks. Using Red Hat Insights, customers can benefit from the experience and technical knowledge of Red Hat certified engineers, making it easier to identify, prioritize and resolve issues before business operations are affected. The latest Red Hat Insights release includes: ● Automated remediation reduces the mean time to resolution for critical security risks. Featuring Ansible Playbook creation, the Red Hat Insights

console now can translate predictive intelligence into actions, enabling users to automatically remediate Insights findings – helping to more quickly and cost-effectively close infrastructure risks. ● Integration of Ansible Tower by Red Hat enables dynamically-generated Ansible Playbooks to be more rapidly

to produce a more meaningful total risk assessment, helping organizations to focus on the issues which can most impact risk reduction. ● Enhanced user interface includes additional filtering based on the type of issue, for a more simplified and streamlined look across the infrastructure.

Modern enterprise IT environments employ a complex and highly dynamic mix of services and technologies, making continuous identification and remediation of security and stability issues key for mission-critical operations. Manual identification and resolution of these issues can be expensive, time-consuming and more error-prone, which is why we have added the automation capabilities of Ansible Playbooks to the latest version of Red Hat Insights. Through the proactive detection and automated remediation offered by Insights, enterprises can better manage security and stability threats to their Red Hat infrastructure, helping to avoid downtime and giving IT teams back time to focus on tasks that align with business goals Joe Fitzgerald Vice President, Management, Red Hat

deployed in a highly-scalable, more secure manner. This helps provide faster Insights remediation and allows for the extension of Insights into automation and self-service use cases. ● Ansible-based configuration playbook is designed to streamline large and small deployments of the Red Hat Insights client to reduce installation time and effort and helps provide Insights scalability as infrastructure needs grow. ● Expanded reporting displays historical trends in addition to a snapshot of the current infrastructure health so enterprises can more easily see their current risk assessment and what trends will most likely impact their IT estate. ● Predictive risk assessments are displayed as per rule and then combined SecurityLink India ■ 1 June 2017

CMYK

● Topic categorization designed for improved identification and remediation of issues. The enhanced user interface includes additional categorization and specialized views for a more simplified and streamlined look across the infrastructure. Insights findings can now be viewed by types such as SAP or Oracle, in addition to the level of risk. As a SaaS offering, Red Hat Insights is regularly updating and expanding its knowledge base in real-time to reflect new IT challenges that can impact the stability of mission-critical systems. Red Hat Insights is available for an added cost via the Red Hat Customer Portal, Red Hat Satellite, Red Hat Cloud Forms, Ansible Tower, as well as the public Red Hat Insights API. 69


CMYK

PRODUCT SHOWCASE

Xpeller Counter-UAV Product Family Expanded Acoustic sensor from Squarehead gives additional detection capabilities

H

ENSOLDT, the new sensor house, has entered into a collaboration in the area of counter-UAV with sensor provider Squarehead Technology AS, Oslo. At Xponential, Dallas/ Texas, HENSOLDT signed a collaboration agreement with Squarehead which adds its acoustic sensor ‘Discovair’ to HEN-

integrated system will benefit greatly from the use of it. The collaboration is a major sensor-fusion combined effort, proving that acoustics will remain a cornerstone of the drone detection industry – with our unique sensor array at the heart of it,” says Stig Nyvold (CEO) of Squarehead Technology AS.

SOLDT’s ‘Xpeller’ counter-UAV portfolio. “Together with our partners, we have created a modular counter-UAV system which is extremely effective”, said Thomas Müller, CEO of HENSOLDT, “Xpeller demonstrates HENSOLDT’s innovative capabilities, answering our customer’s needs to detect and protect from new threats. Due to its versatility, Xpeller is able to offer maximum protection under a variety of conditions and ranges.” “We are excited to see how well our sensor is received by the integrator industry, and are very sure HENSOLDT’s

The modular ‘Xpeller’ product family consists of HENSOLDT’s own products – radars, infrared cameras and long-range jammers – and close-in RF detectors from Danish partner company myDefence. With Discovair, the acoustic signature of drones can be used to detect and track such threats with a high grade of certainty up to a distance of several hundred meters. Thus, Squarehead’s product complements the existing set of Xpeller sensors in the near-field and line-of-sight area. Xpeller offers very high effectiveness by combining sensor data from different sources with latest data fu-

70

SecurityLink India ■ 1 June 2017

CMYK

sion, signal analysis and jamming technologies. It uses radars, optical and other sensors to detect and identify the drone and assess its threat potential at ranges from a few hundred metres up to several kilometers depending on the type of drone. Based on an extensive threat library and real-time analysis of control signals a jammer then interrupts the link between drone and pilot and/ or its navigation. The modular Xpeller system concept relies on the selection of individual devices from the product family depending on customer requirements and local conditions. Xpeller has been tested extensively at HENSOLDT’s own premises and during customer presentations in Germany, France and Switzerland. An operational system is available on the market with delivery time depending on the required configuration. HENSOLDT is a globally leading supplier of premium sensors for security and surveillance missions. The company is the world market leader in such areas as missile warning systems and submarine periscopes. Moreover, HENSOLDT is very active in the market for radar systems, optronics and electronic protection systems. The company comprises the security and defence electronics activities of the Airbus Group, which were spun off from the group in 2017 and have now entered the market as a new sensor house under the brand name of HENSOLDT, together with the former Airbus DS Optronics.


CMYK

PRODUCT SHOWCASE

Suprema Launches BioMini Slim 2 World’s slimmest FAP20 fingerprint authentication scanner

S

uprema, Inc., has launched BioMini Slim 2, the world’s slimmest fingerprint authentication scanner. Along with its world’s slimmest (16mm), high definition optical sensor, the new BioMini Slim 2 features Suprema’s proprietary multi-dynamic range (MDR) technology, FBI PIV/ FIPS 201/ mobile ID FAP20 compliance and Android device support.

size-reduction, image quality and connectivity. The new scanner now provides all those improvements plus nitty-gritty from Suprema’s core advantages such as MDR and LFD technologies. In addition, with its newly improved assembly and structural engineering, BioMini Slim 2 now offers best-in-class cost

I

The all new BioMini Slim 2 has been engineered from Suprema’s 2nd generation optical structure and device platform. BioMini Slim 2 provides developers more physical flexibility with its reduced form factor and the ultraslim optical sensor ensures robust operation over time along with its IP65-rated waterproof structure. Continued from its predecessors, BioMini Slim 2 also features Suprema’s patented anti-spoofing LFD (Live Fingerprint Detection) technology and MDR technology that enable to capture high quality fingerprints even under direct sunlight of up to 100,000 lx. “The new BioMini Slim 2 is at the spearhead of our 2nd generation BioMini line-up. In designing BioMini Slim 2, we have re-engineered whole existing optical structure and platform to improve

advantage and durability in operation,” said Bogun Park, CEO at Suprema ID, “The new BioMini Slim 2 clearly shows our commitment on mobile-oriented identification and we will expand our 2nd generation BioMini scanner line-up with more focus on this fast growing mobile identification market.”

Control Center v14.2

ndigoVision has launched version 14.2 of their security management solution, Control Center. Control Center v14.2 has exciting new features which improve the user's experience by simplifying setup and day to day operation of sites. New features include: • PTZ priority for ONVIF cameras – PTZ Priority and PTZ Hold are now available for ONVIF cameras. These features, previously only available for IndigoVision SMART.core cameras, manage simultaneous access to a PTZ camera by different users. • Bulk configuration of ONVIF cameras – Previously only available for IndigoVision’s SMART. core cameras, now any camera can be easily set up with IndigoVision’s simple bulk-configuration process, saving time and money. • Restricted playback duration – Administrators can choose to limit the oldest recordings a user can review. Previously a user could either review all recordings for a camera or none at all. The new limit is more flexible, allowing users to playback recent recordings but not older ones. • Camera reporting functionality – To easily find the camera on a map or work out which NVR it is recording to. Users can now export information from Control Center to build their own custom reports. These new features, combined with IndigoVision’s commitment to open standards, integration, and their unique distributed network architecture, make Control Center the industry leading security solution. Control Center is also available in three cost-value tiered propositions; IndigoLite®, IndigoPro®, and IndigoUltra®. IndigoVision provides a complete video security solution where performance and stability go hand-in-hand. All products are single-mindedly designed towards enhancing your security. The purpose of a security system is to make one safe and feel safe. That includes the person, business, property and budget. They design the system end-to-end, with no single point of failure, so it’s reliable; and with distributed network architecture so it’s flexible. They make it smart, so old analogue cameras can migrate to IP and work with their HD cameras. Other HD cameras can also be integrated where and when needed, or other manufacturers’ security systems using the Software Development Kit such as access control, communication systems and perimeter detection. SecurityLink India ■ 1 June 2017

CMYK

71


CMYK

PRODUCT SHOWCASE

A New Approach with VEO-XS The extra small door entry monitor with maximum performance

T

he latest product from Fermax is a trend-setting new design: a small, slim and aesthetically impeccable monitor with a perfect finish which can be placed anywhere in a home or office. It is a hands-free device able to be controlled with just one finger, offering all the features required for a modern video door entry system, and it all works with DUOX technology.

sential or fundamental for this kind of equipment – from the image and volume control down to the selection of ringtones or silent mode. A device that is also able to open a second door, switch on additional lights or call the concierge. It even includes ‘doormatic’ mode, a function which, when activated, opens the door automatically upon receiving a call, as is required in many offices and businesses. In terms of installation, VEO-XS has

the advantage of having been particularly designed for DUOX technology, meaning that the programming and wiring is very simple. These benefits are useful in new constructions. The advantages are even more valuable when replacing old systems, as DUOX can be installed with the previous wiring. Fermax also offers a decorative frame, so that the monitor can fit in any space where there was a telephone, without having to do any touch ups.

New Password Checker

V

This ‘extra-small’ product is designed to take up a large space in the video door market as, either for aesthetic or spacesaving reasons, many developers and users prefer a smaller format. To attend this demand, trend-setting company Fermax has just introduced its new VEO-XS monitor, a small and extraordinarily slim video door entry system with top-quality design and finish, and provides the best performance. As it is a product that uses DUOX, Fermax full digital technology which operates on two non-polarised wires, it is as easy to use as to install and programme. It is all about a video door entry system that includes as standard all the features that we now consider to be es72

IP Camera Vulnerability Solution

iakoo has recently debuted its innovative new Password Checker that is an automated solution that verifies network cameras are not using default or commonly used passwords, which are a proven network vulnerability for cyberattacks. Additionally, Password Checker helps ensure compliance to many standards including PCI, NERC, NIST etc., which require that surveillance networks can’t be compromised. “Viakoo’s new Password Checker complements our portfolio of proactive automated data verification solutions by easily verifying the integrity of network cameras’ password protection,” said Viakoo, CEO, Bud Broomhead, “It is a highly efficient and cost-effective solution to harden physical security systems from cyberattacks.” Viakoo Password Checker (as part of the Viakoo Predictive solution) examines HTML authentication points to test a variety of common URL entry points and frequently used passwords. Test results are reported for each camera on the network to alert system operators if they need to change some or all easily compromised passwords. Viakoo Password Checker can be run on-demand or on a scheduled basis. Viakoo automatically verifies performance of physical security systems and delivers automated proof of networked physical security system compliance. Leveraging purpose-built technology, Viakoo quickly and automatically detects physical security system failures, diagnoses problems, alerts users with repair information, and maintains historical records on operations. With Viakoo, users improve physical surveillance and security reliability and performance, gain critical insight into physical security systems, capture valuable operational performance information, eliminate lapses in security coverage and automate reporting for compliance and auditing. SecurityLink India ■ 1 June 2017

CMYK


CMYK

PRODUCT SHOWCASE

New CX Consulting Capabilities Helping organizations enhance their customers’ experiences across assisted and self-service channels

V

erint® Systems Inc. has recently announced the availability of new Customer Experience (CX) consulting and packaged services offerings specifically designed to help companies enhance their own customer experiences across interaction channels and touch points. Organizations today are increasingly focused on CX as a competitive differentiator to gain a complete view across all channels and touch-points on the customer journey, enhance the overall customer experience, and increase performance and desired business outcomes. To address these growing requirements, Verint is helping them align their product and service delivery experiences with the expectations of their customers and deliver on their brand promises.

Consulting and packaged services offerings to advance the customer experience

V

erint’s industry-leading voice of the customer (VoC) solutions, comprised of enterprise feedback management (EFM), digital feedback management (via its acquisition of Opinion Lab), and interaction analytics that include speech, text and social, enable organizations to capture customer feedback, sentiment and journeys across channels. By analyzing and interpreting these journeys in the context of business objectives, they

can respond more effectively to customer, company and market demands. With access to best practices, strategy and expertise through new CX consulting and packaged services offerings including CX strategy consulting, contact optimization, omni-channel and digital experience, and strategic program implementation; Verint customers can now take acting on the VoC, enhancing experiences and heightening loyalty to the next level, and establish broader, deeper and longer-lasting customer relationships.

Addition of CX consulting and packaged services offerings

N

ew consulting and services capabilities being offered by Verint include the following: ● CX strategy consulting: It helps customers develop clear, insightdriven CX strategies and roadmaps; prioritize investments in CX strategy, CX research, journey mapping, experience design, service and marketing related to CX, contact center or digital transformation; and guide them in effectively prioritizing investments and change management. ● Contact optimization: Applying cross-channel analytics and managed services for Voice of the Customer feedback and contact analysis to provide customers with specific, actionable intelligence for SecurityLink India ■ 1 June 2017

CMYK

improving the CX, capitalizing on their most important customer interactions and reducing costs. ● Omni-channel and digital experience: Performing best-practice capability assessments and customer research to develop roadmaps that prioritize project investments across retail, digital and other channels, and provide tactical strategies for creating simple, consistent experiences across channels. ● Strategic program implementation: Providing customers with program and project management, while bridging the gap from strategy development to implementation to help ensure strategic objectives and program benefits are realized from inception through implementation. “In addition to offering even more extensive, holistic customer experience consulting and strategy support, we’re focused on helping our customers define and implement their CX strategies, and their ability to effectively listen, analyze and act on the voice of the customer across digital, voice, text and social interactions,” says Ben Smith, global VP and General Manager of CX Solutions at Verint, “By expanding our portfolio to include an important set of CX consulting and packaged services offerings, we can help our customers, and as a result, their customers achieve desired outcomes across assisted and self-service channels, while cultivating deeper, long-term relationships.” 73


CMYK

FEATURE

When Surveillance Meets AI

By Balasubramanian Jayam – Head of Marketing (India & SAARC) Dahua Technology Co., Ltd.

S

ecurity camera shipment continues to grow at 14.1% CAGR to reach 190 million units in 2020 (according to IHS report, September 2016) however, revenue growth slowed to 8.1% CAGR. There are too many cameras and video footage to be consumed by human operators. Most security video footages are erased or over-written without being watched. Video analytics technology was once perceived as a solution to automate the utilization of the abundant video footage resources. By means of identifying and tagging the appearance of certain patterns in a video, the system could perform search and run statistics on it. Such output could further be accumulated and analyzed to find trends and correlations. However, the potential has not been translated into business

momentum. Complexity in analytics algorithm made it difficult to develop new software to detect a desirable pattern, and the tremendous demand for CPU processing power made it difficult to get timely analytics output. Artificial Intelligence may be the key to unlocking this potential. Video analytics technology has been evolving over the past 10 years. It is getting on the headlines more often lately due to the use of Artificial Intelligence. Machine learning greatly simplifies the software development process and the processing power of GPU made it possible to perform near real-time video analysis. For example, in the 2016 G20 summit, China deployed security solution developed by Dahua Technology using AI – Deep Learning to automatically

Schema for Dahua facial recognition technology 74

SecurityLink India ■ 1 June 2017

CMYK

screen pedestrians in airport and train stations for criminal suspects.

Deep Learning has been accelerating the pace of intelligent surveillance

D

eep learning refers to artificial neural networks that comprise many layers. It aims to emulate human’s ability to analyze and study. It imitates the mechanism of the brain in order to interpret data such as image, voice and text. Deep learning has been successfully applied in image and voice recognition and is set to be a future development direction. In 2013, deep learning was listed by MIT as one of the top ten breakthrough technologies. In the security industry, the application of deep learning is important for two reasons. On the one hand, it improves the accuracy of some algorithms; on the other it realizes functions which cannot be done without using deep learning. For instance, facial recognition includes three key parts: face detection, facial features alignment and feature extraction comparison. If deep learn-


CMYK

feature

ing technology was adopted, the performance of each part would be improved dramatically. Using deep learning, the facial expression, gender, age, hair color, accessories, emotion etc., all can be better recognized. Moreover, GPU can be used to accelerate the computation of deep learning algorithm. Traditional intelligent analysis is unable to cover a large-scale scene with more than 300 people, not to mention group analysis of moving scenes. Now based on the deep learning technology and GPU, it can easily deal with 300 targets simultaneously and further estimate the crowd density and identify the movement of the crowd, to provide more useful information to security staff. Obviously, deep leaning accelerates the development of intelligent surveillance. On 7 March, 2017, Dahua worked together with NVIDIA, a world-leading Artificial Intelligence (AI) computing company, to launch the ‘Deep Sense’ server for smart video structure analysis. Meanwhile, Dahua also cooperated with many renowned universities in and out of China to advance research on deep learning. As a result, Dahua’s face recognition algorithm ranked number one on the public authoritative testing platform LFW, beating Tencent, Google

color, make, model and type on the top of vehicle license plate.

Vehicle identification and statistical analysis

T

and other top academic and commercial groups around the world.

Dahua made an early start on AI technology

D

ahua Technology made an early start in AI application amongst players in the global security industry. In 2009, Dahua established a department to research on intelligent algorithms, exploring potential applications in security solutions. The department was later merged with other research groups to form the Institute of Advanced Technology, which focuses on advanced technologies on AI, optics, Codec and ISP etc. ANPR (automatic number plate recognition) by Dahua has greatly improved traffic and parking management for better environments, promoting sustainable urban development. Deep learning is also being applied to the recognition of vehicles and people. Human objects can be classified according to clothing, hair color, wearing eye glasses, backpack, gender, age range and even facial expression. Vehicles can be Dahua vehicle identification classified by SecurityLink India ■ 1 June 2017

CMYK

he ability to utilize AI to identify and analyze vehicles is going to be very valuable. A witness may remember the color and make but not the plate of a vehicle. After applying deep learning, there has been an obvious improvement in AIpowered security applications. On the one hand, the rate of plate number recognition has increased significantly, on the other it is now able to identify car features like type, make, model and color in a more systematic way. Combining various elements in one search, it becomes possible to identify a target vehicle even if the license plate is not captured.

Human recognition and statistical analysis

T

raditional intelligent video analysis technology was previously not able to perform recognition of body shape, gender, age, hair color or hair length, but Dahua’s deep learning technology made it all possible. Deep learning video analytics server handles recognition of up to 80 people within 40ms. Human recognition also suits to be applied in crowded places with continuous flows of people such as on escalators, crossroads, business centers and gates of exhibition centers, and its accuracy rate reaches up to 95%. As long as there is enough training done, the recognition rate is only constrained by how much of the target is exposed to the camera and its moving speed, just as if a human operator is watching the video full time.

Application of AI to campus safety

I

n recent years, the American TV series called Person of Interest has been very 75


CMYK

FEATURE

popular. This TV series described details of predicting crimes by AI. A software genius called Finch invented a program for advance recognition of a potential violent criminal based on observing a pattern. Sounded like a science fiction but it is close to becoming reality with AI deep learning. A GPU powered ‘Deep Sense’ server can cover 192-channels of HD video. Unlike previous intelligent video analytics (IVA) which can only monitor the key entrances due to cost and capacity limitation, it becomes technically and economically viable to fully monitor the surveillance system of a typical building campus. With a rich set of search criteria, it is much more likely to get a match even without getting

a clear face shot of the target. The system can trace the trail of a target to screen for ‘behavior of interest.’ This helps police improve their speed of solving crimes and deter criminals thereby improving security. For example, if the police want to find a suspect who is a middle-aged man with red umbrella, they can search the key words like ‘red umbrella,’ ‘male,’ 30 to 50 years old and so on in the system. The AI system can perform a quick search and therefore saves a lot of manual work.

Developing trends for AI technology and application in security

T

he development of AI applications will likely to face many ob-

stacles and difficulties but the trends are optimistic. The advance in human object and vehicle recognition has made significant impact to security applications. Voice recognition is likely to be the next driver. Acoustic pattern can be combined with human behavior pattern or vehicle characteristics to narrow down a search faster and reduce false alarm. Voice can also be a form of data entry or interaction. Hand gesture and body gesture or a combination of these could help the ‘machine’ to understand the context of what is happening. So, what will the world be like if surveillance meets AI?

Keeping Data Under Lock and Key

BCDVideo looks at how you can protect yourself against cyber attacks with its latest SMARTtechnology

I

Internet for routers, cameras, DVRs, and IoT devices only protected by default passwords, used its army of infected devices to disrupt dozens of major websites including Dyn, one of the largest DNS service providers, by flooding the target servers with millions of discrete IP addresses sending junk traffic to block the flow of legitimate users. While DDoS attacks like Mirai, designed to cripple websites by consuming all of their bandwidth, target vulnerable devices across the

n recent months, there has been a multitude of cyberattacks targeting video surveillance systems and the Internet of Things (IoT). In the aftermath of the Mirai botnet attack, an incredibly powerful distributed denial-of-service (DDoS) attack, some of the largest surveillance manufacturers scrambled to address the extreme vulnerabilities built into their devices. During the October 2016 attack, Mirai, an open-source malware strain that scans the 76

SecurityLink India ■ 1 June 2017

CMYK


CMYK

FEATURE

world indiscriminately, several highly sensitive markets experienced the largest percentage of cyber attacks each year such as healthcare, manufacturing, financial services, government, and transportation. The expansion of the IoT has only compounded the problem by providing hackers with almost unlimited resources for carrying out their attacks. As more devices connect to a single network, the total system security is only as strong as the most vulnerable connected device. So, how can security professionals protect their system against these attacks?

Gaining access to your security system

S

imilar to any sensitive data, video surveillance represents an untapped pool of information. Consider the key users of surveillance and the data being stored – defense departments, embassies, hospitals, police departments etc., Beyond capturing metadata, by hacking into a video network, hackers will be able to view the camera footage, connect the infected device to a botnet, or even convert the device into a bitcoin mine undetected. A single data breach costed businesses $4 million on average in 2016, according to the Ponemon Institute. With the costliest attacks coming from malicious code and denial of service. The role surveillance networks play in these attacks comes from the relatively low-security, commonly factory default passwords, many IP cameras, DVRs, and NVRs have to combat the malicious code needed to connect the device to a botnet. Once a surveillance device has been infected, it becomes a tool

used to take down target servers. After the latest wave of high-profile cyber attacks, updating default passwords on connected devices has taken first priority when securing a system. Security integrators and manufacturers are quickly adapting to the ever-changing cyber landscape, though. Proactive protection against cyber attacks is being implemented on many new, high-performance video servers.

BCDVideo SMARTtechnology

B

CDVideo SMARTtechnology offers a single pane, simple monitoring solution. System administrators receive alerts for 32 system parameters for proactive troubleshooting on your video recorder or access control server all from within the performance panel. The exclusive SMARTtechnology includes: ● SMARTvault: It remotely restores the video software and camera settings to the last backup. ● SMARTrestoration: It restores a system to BCDVideo’s project optimized factory image. ● SMARTconnect: A trusted private and secure connection to a BCDVideo support technician. It provides technical access (when user approved) for remote diagnostics and troubleshooting. ● Intelligent hard drives within each system come with a predictive failure alert system and fault indicators to monitor and store data about the drive’s operational state. This allows for preventative onsite service calls and zero downtime before a drive fails. To protect video surveillance systems from hackers, BCDVideo develSecurityLink India ■ 1 June 2017

CMYK

oped SMARTdeflect, an innovative two-factor authentication application designed specifically for BCDVideo access control and video recording servers. The two-factor login process includes a self-generating PIN randomly reassigned every 30 seconds. System administrators will be able to monitor all logins with optional email notifications for every successful or unsuccessful login attempt. Because SMARTdeflect can be accessed on any smartphone, administrators also have the ability to temporarily disable all outside access to a server under attack. Additionally, the easy set-up and customizable system settings give administrators complete control over their servers. With cybercrime on the rise, providing simple, reliable security with BCDVideo SMARTtechnology on all BCDVideo access control and video recording servers gives security integrators and end users another measure of proactive defense against cyber-attacks. 77


CMYK

78

SecurityLink India â– 1 April 2017

78

CMYK


CMYK

79

SecurityLink India â– 1 April 2017

79

CMYK


CMYK

FEATURE

IP Camera Settings for Difficult Lighting Conditions I

f you’re a technician installing IP cameras for a bank or credit union, you know how challenging it can be to capture clear video surveillance images in dynamic lighting conditions. While some banks have controlled indoor lighting, others have bright sunlight pouring in through floor-to-ceiling windows in ATM vestibules. Other businesses, including quick service restaurants (QSRs), face similar challenges. To help you get the best video quality possible, some tips on which IP camera settings to use in different lighting scenarios will be pertinent. It’s important to note that surveillance cameras are shipped with default settings that are not always optimized to give you the best image quality for the scene you are trying to capture. In some circumstances, you can

simply plug in your camera and walk away, but to get the best quality video in complex lighting conditions, a little finetuning is highly recommended.

Controlled lighting

L

et’s first tackle an environment with controlled indoor lighting and assume you’re using our ME4 IR MicDome camera with high dynamic range (HDR). If the lighting is sufficient and consistent across the field of view (FOV) and there are no shadows in the image, I recommend turning off HDR altogether. If the lighting is insufficient and there are shadows in the image, you’ll want to leave it on. This will help brighten the low light areas and reduce noise appearing as pixilation. Not only does the noise detract from the image quality, it also increases your data rates and takes

Increasing the compression value can improve overall image quality.

80

SecurityLink India ■ 1 June 2017

CMYK

up more storage. You can also adjust the Gain setting on your camera, which boosts the light intensity being captured. If your environment’s lighting is bright and relatively even, you can try turning the Gain setting off altogether, which can reduce the amount of visible noise in the image. Conversely, if there isn’t enough consistency, you can turn the Gain up to 1, 2 or 3. Remember that at night, when the lights are off, you should check how Gain impacts night mode. The ME4 IR MicDome automatically goes into night mode with its smart IR technology providing its own light source.

Bright sunlight and shade

N

ow, let’s have a look at the adjustments you would make when you have bright sunlight as well as shaded areas in the same scene, which is typical in an ATM vestibule or a QSR dining area. If there is a small to medium amount of sunlight, the HDR Normal setting will suffice to illuminate the scene without overexposing the brightly lit parts of the FOV or underexposing the shaded areas. If, on the other hand, you have a full-size, two-story window bathing the scene in direct sunlight, you will most likely need to select the HDR Strong setting. The image won’t be as sharp, but you’ll be able to clearly identify an ATM user or fraudster who


CMYK

FEATURE

might otherwise be underexposed and difficult to recognize. You can also schedule a combination of settings, including HDR, by time of day. For example, you may want to set HDR to Strong during the day, but turn it off completely at night. To further optimize image quality at night, you can adjust the camera’s exposure and slow down the shutter speed, allowing in more light. Fast moving objects in the FOV – cars, for example – will appear blurry, but if you’re interested in capturing clear bright images in the dark, slowing the shutter is likely your best option. The training video gives a more detailed explanation of how you can use exposure adjustments to optimize image quality at night. You can make all of these changes using your March Networks client software, where you can see real-time camera views and get instant feedback on the modifications you make.

Compression

O

nce you’ve optimized the camera for your specific environment, you can now make a decision on what level of compression to apply. The March Networks ME4 cameras are, by default, set to a variable bit rate capped at 4 Mbps. You can instantly improve the overall image quality by setting the maximum bit rate to 6 or 8 Mbps. It’s important to note that the bit rate is variable and the camera will only use the allocated bandwidth as needed. As seen in the image given on previous page, the compression level is set to 8 Mbps (or 8096 Kbps) but the camera’s video bitrate is only 4.7 Mbps, so don’t be afraid to increase the compression value as it will have a great benefit on the overall quality of the image.

Distributed Cybercrime Attack the World How business model innovation has changed the game of cybercrime and turned it into a multi-million-dollar dark industry

R

ansomware and banking Trojans dominate the cybercrime mainstream today, and their technical operations are heavily analyzed. But little attention has been given to the business model which plays a large role in dictating their behavior, targets and tactics. A revolutionary concept in cyber crime is what I call ‘distributed cybercrime,’ a business model in which cybercriminals attack many victims in the same campaign. Like many other inventions now common in modern life, distributed cybercrime may seem trivial today. But this concept emerged little more than a decade ago and has already dominated the threat landscape. Improved ROI and the support of a newly erected ‘dark industry’ has made distributed cybercrime the hottest trend in cybercrime. Most of the professional cybercriminal groups today develop SecurityLink India ■ 1 June 2017

CMYK

malware with a distributed business model, then use professional platforms, distribution services and infection experts to attack the world. They don’t know who their victims are nor do they care. They’re not looking to get points on style. They’re just businessmen who built the perfect, automated moneymaking machine.

6 Reasons why cybercriminals love the new business model

B

eginning in 2006, innovations in malware, banking Trojans and ransomware created a new type of business model for cybercriminals: rather than concentrating all their efforts on penetrating high-quality targets, they can steal small amounts of money from numerous victims. The business model of distributed cybercrime has made some attackers 81


CMYK

FEATURE

multi-millionaires in a short amount of time due to its many business benefits: 1. Attacks require less effort as they target ‘low-hanging fruit’ (i.e., individuals or organizations with sub-par security). 2. Attack skill level is low compared to techniques such as spear-phishing – regular ol’ phishing is good enough for weak targets. 3. Highly coveted zero-day vulnerabilities are no longer required for profitable attacks – mainstream CVE vulnerabilities with known exploits and existing patches will do, as many victims don’t patch regularly. 4. Any standard endpoint is a potential source of revenue, making lateral movement toward the crown jewels irrelevant. 5. When you attack the world, the sky is the limit – the amount of potential revenues is endless. 6. Less effort and more profit means better ROI.

somware’s language should match the victims’ language to ensure instructions on purchasing bitcoin and paying the ransom are understood. Mass distribution experts and traffic dealers offer their shady customers this very type of targeted services. In addition to victim-specific traffic, infection services are also up for sale (or more commonly, for rent). Rather than coming up with new or unique exploits, pre-packaged exploit kits are readily available to launch the attack of your choosing. These kits supply the distribution and traffic services mentioned above, to use the best exploits available to infect victims’ machines and, if successful, run the customer’s malware. The exploit kit method essentially outsources distribution and infection to reliable, high-quality service providers at an affordable price.

Mass distribution, victim profiling and outsourcing

Y

T

he new business model presented new challenges for cybercriminals. If you want to become filthy rich through distributed cybercrime, you can’t just attack 100 victims – you need to attack hundreds of thousands of victims. This drove professional cybercriminals to build mass-distribution platforms to spread their malware and automatedinfection systems to exploit victims’ machines and run the malware. But quantity of traffic is not enough. Victims must fit a desirable profile. Cybercriminals want to avoid targeting low-income victims with ransomware as they’re probably less able to pay the ransom, and the ran82

Where have all the targeted attackers gone? ou may ask yourself: what happened to targeted attacks? The answer: absolutely nothing (and thank you for asking). In fact, targeted attacks today are easier than ever, as demonstrated by cyber attackers who do care about the identity of their victims (like nation-states). Targeted attacks did not disappear – they’ve only been eclipsed by the attractiveness of the ROI of distributed attacks. Only when the profitability of targeted attacks can compete with the distributed cybercrime business model will we see their rise to prevalence again. There are initial signs that cybercriminals are testing targeted attacks with malware more commonly used for distributed attacks, as evidenced by recent ransomware attacks on highSecurityLink India ■ 1 June 2017

CMYK

quality targets such as hospitals and hotels. The problem comes back to ROI: while cybercriminals demanded up to $5M ransom from one victim, the highest ransom paid by a single victim (as far as we know) was a meagre $28K.

The next big thing What’s next for the innovative cybercriminal? My Prediction: A hybrid business model with tailored ransom pricing. Imagine a mass-distribution platform doling out ransomware on a global scale that, when executed, will assess the victim’s environment. If that environment is a consumer’s machine, the calculated ransom will be relatively low; if it’s an enterprise network, considerably higher; if it’s critical infrastructure, astronomical. Whatever the next big thing is in cybercrime, you can be sure it will be driven by ROI – nothing dictates the dark industry more than these three simple letters.

Tal Sheffer CTO, Skybox Security


CMYK

FEATURE

Two Things to Demand from the Access Control Provider I

n today’s highly competitive environment, it is extremely important that providers have both the experience to deliver the right solution and the ability to deliver strong customer service. In the security industry, one solution in high demand is the use of mobile apps for critical functions such as credentialing, remote operations and alerts. Mobile credentialing frees the user from having to carry physical credentials such as tokens or ID badges. Further, mobile access control solutions are well-suited to applications that experience numerous spontaneous events such as lockdowns or weather related emergencies, or with a frequent need to activate/ de-activate access card holders. Key points include: Security: Security has always been a fundamental part of mobile operating systems, and the encrypted security of smart credentials and/ or door management apps makes them more secure and difficult to counterfeit. Mobile devices often require multifactor authentication while traditional access control devices do not. Convenience: Mobile users can control their facilities and access timely information from wherever they are. This is important for emergency situations, and convenient for other scenarios such as activating or deactivating credentials. Mobile credentialing provides even

more convenience, with new readers that can accept both proximity cards and mobile credentials speeding the transition to mobile technology. Increased integration: With mobile technology, one credential allows access to doors, data and cloud applications, with security and tracking incorporated into every user action. This high-level integration can also be used to trigger automated tasks like time and attendance recording. Cost: Maintaining a physical and logical access control system with disparate applications can be costly, particularly when updates are implemented and integration must be performed across all systems. A physical access control system with mobile credentialing can be easily upgraded to add logical access control for network log-on. For cardbased credentialing, material costs must be considered as well; digital credentials have no material cost. Still, users may not get the most out of their system if the provider does not have a customer-focused culture. At a minimum, providers should offer flexibility, post-sales support, availability, expertise and training. Flexibility: Recognizing that offthe-shelf solutions are hardly sufficient for addressing the specific requirements of every installation, customer-focused providers are willing and able to accomSecurityLink India ■ 1 June 2017

CMYK

Robert Laughlin

President Galaxy Control Systems modate customization. Post-sales support/ training: The reality of access control systems is that – like any solution – they require ongoing service, support and training to provide customers with the continuous, reliable operation they need. One true measure of a vendor is what they can – and will – do to address and accurately fix any issues in a timely manner. Post sales training is also key to assuring the customer knows how to best manage their system. Availability: In today’s connected world, customers have a wide variety of ways to contact a provider, all of which are irrelevant if they can’t actually connect with the vendor. Delays compromise security, so customers deserve a specific person they can rely on when they need help the most, often when something goes wrong and requires immediate attention. Expertise: The expertise and experience of customer-focused organizations can help end users make better and more confident decisions about an access control installation. When combined, customer service and mobile technology offer tremendous potential for maintaining the safety and security of people, places and assets. Your chosen provider should be able to deliver to you the latest in mobile technology plus a commitment to the best possible customer service. 83


CMYK

INTERNATIONAL UPDATES

BSIA Saddened by Manchester Terror Attack, Praised Private Security Personnel T

he British Security Industry Association has issued a statement in reaction to the terrorist attack that took

place in Manchester, on 22 May 2017. “We at the BSIA were saddened to hear of the recent horrific terrorist attack in Manchester, and would like to praise the quick actions of the private security personnel, who would have been among the first to respond to this incident, placing themselves at considerable risk in doing so. “In times of emergency and in dayto-day operations, private security personnel provide essential support to local police forces, and are often the ‘unsung heroes’ helping to ensure the continued

safety and security of the British public. “Their ability to provide this vital service is thanks to the mandatory training they receive as part of our industry’s important licensing and regulatory regime, which plays a crucial role in making sure that private security personnel have the necessary skills and knowledge to support police and emergency services through even the most challenging situations. “Of course, our thoughts go out to the victims, their families and the city of Manchester at this difficult time.”

Hikvision & SGS Sign Memorandum for Joint Lab Collaboration H

ikvision, the world’s leading supplier of video surveillance products and solutions, and SGS, the world’s leading inspection, verification, testing, and certification company, have recently announced that they have signed an agreement for joint laboratory collaboration. The memorandum will pave the way for joint efforts in testing, inspection, verification and certification of Hikvision products. It will also see the two companies cooperating strategically in various areas including mutual technology exchange, training, information sharing and platform establishment. As a true manufacturer, product quality is of the utmost importance for 84

Hikvision. Over the past few years, the company has stringently conducted testing processes on every product series and closely collaborated with SGS to optimize procedures. The joint laboratory marks the deepened collaboration between the both parties. With the expertise and knowledge of SGS, Hikvision aims to improve its product testing efficiency and capability to a new height, further responding to industry demands and satisfying customer needs. “SGS actively participates in the formulation of global standards and regulations. It has deep understanding and insight in these fields and the global market trend. We rely on our profesSecurityLink India ■ 1 June 2017

CMYK

sional technical team and their rich experience who will assist Hikvision in the improvement of their product quality and competitiveness in the security market,” said Laurence Kwan, Director for Electrical and Electronic Business at SGS Asia-Pacific. SGS is the world’s leading inspection, verification, testing, and certification company. With more than 90,000 employees, SGS operates a network of over 2,000 offices and laboratories around the world. SGS-CSTC Standards Technical Services Co. Ltd. was founded in 1991 as a joint venture between SGS Group and China Standard Science and Technology Group.


CMYK

INTERNATIONAL UPDATES

Axis Awarded Gold Govies Government Security Award The AXIS Q8631-E PT thermal network camera took home a gold win in the video surveillance cameras IP category of the 2017 Security Today Govies Government Security Awards

A

xis Communications has recently been honored by Security Today magazine as a gold winner of The Govies Government Security Award for 2017 for its AXIS Q8631-E PT thermal network camera in the video surveillance cameras IP category. The awards honor outstanding government security products in a variety of categories. Platinum and gold designations were announced during the ISC West Expo, Las Vegas. Designed specifically for the most challenging conditions, the AXIS Q8631-E PT thermal network camera is equipped with pan/ tilt mobility reducing the number of fixed thermal cameras needed to cover a single area. The AXIS Q8631-E also offers shock detection, which sends an alarm if it detects vandalism. The thermal imaging allows users to see people and objects more clearly in a variety of light conditions, from pitch dark areas to a sunlit parking lot making it perfect for outdoor installation. Additionally, its Arctic Temperature Control allows the camera to safely start up and operate in temperatures as low as -40°C/ °F and up to 55°C/ 131°F. “At Axis Communications we understand the unique needs and challenges associated with securing government facilities and strive to create products that adhere to those needs,” says Fredrik Nilsson, Vice President, Americas, Axis Communications, Inc, “Receiving a Gold Govies Award is wonderful recognition for the hard work we put into creating quality products and solutions for our many government customers.” “The Govies is an amazing product

recognition program whereby companies in the security industry can highlight their technology and solutions that work flawlessly within the government vertical,” said Ralph C. Jensen, Editor in chief of Security Today magazine and securitytoday.com, “We received 28% more entries this year, which also corresponds to the need to provide better security options not only at the federal level but also at the state and municipal level of government. I believe these

products and solutions only prove that the government relies heavily on the technology advances in the private sector.” An independent panel of judges from the security industry selected the top entries in the 2017 categories and named them winners using criteria including features, innovation, user friendliness, inter-operability, quality, design, market opportunity, impact in the security industry, technical advances, and scalability.

DIGIOP Partners with National Anti-Organized Retail Crime Association D IGIOP has recently partnered with National Anti-Organized Retail Crime Association (NAORCA) and look forward to taking a stand with NAORCA in the global effort against unethical behavior. Christopher McGourty, Executive Director of NAORCA said, “Organized retail crime groups have coerced and worked in collusion with internal employees committing many different forms of theft. DIGIOP's solution will

SecurityLink India ■ 1 June 2017

CMYK

help defend against these crimes and keep employees and customers safe.” NAORCA is an association of more than 3,000 businesses and law enforcement officials addressing organized retail crime through collaboration, education, training, awareness and working for stronger legislation. NAORCA is passionate and dedicated to the cause and strongly believes they can make a global impact.

85


CMYK

INTERNATIONAL UPDATES

E

New Momentum for PPE Sales in a Digital World

verything will revolve around safety, security and health at work in Düsseldorf during 17 to 20 October 2017 when trade visitors from all over the world will meet for the A+A International Trade Fair with Congress at the exhibition Centre. A+A 2017 will present the world’s latest trends and products in the fields of safety at the workplace, health promotion at work and security management in companies. Exhibitors to the tune of 1,900 will take part in the trade fair where companies from all continents have registered. Those coming to A+A in Düsseldorf in October will experience an industry in growth. The market for personal protective equipment is considered especially

dynamic which currently boasts a volume of some EUR 18 billion worldwide: 38% of this (EUR 5.8 billion) are accounted for by EU markets, EUR 1.8 billion by Germany alone. Experts expect the market to continue growing. At A+A 2017 international specialist retailers for personal protective equipment will find a complete overview of innovations and new impulses for their business. The event will also conduct the pivotal international PPE specialist conference entitled ‘New Momentum for PPE Sales in a Digital World’ on 18 October. The conference will take place from 9.00 am to 2.00 pm at Congress Center Süd (CCD. Süd) at Düsseldorf exhibition center, where eminent speakers from

Amazon Business, Lyreco, Kübler, Uvex Safety Group and Zamro to name a few companies, will deliver their viewpoints. The Employers’ Liability Insurance for the Construction Sector will discuss with specialist retailers from throughout the world the challenges posed by the speedy growth of e-commerce, in particular. New regulations governing PPE and cooperation possibilities between manufacturers and dealers also feature on the agenda. The lectures of the international specialist trade conference will be in English. Tickets cost EUR 110 online, and EUR 135 on site in Düsseldorf. Tickets include participation in all lectures of the specialist conference, a snack lunch and admission to A+A 2017.

Avigilon Joins NVIDIA in Silicon Valley Showcases Advanced AI Video Analytics at GPU Technology Conference

Avigilon to provide thought leadership on latest deep learning technologies for video surveillance

A

Avigilon Appearance Search is a sophisticated deep learning AI search engine that enables users to quickly locate a specific person or vehicle of interest across an entire site

86

vigilon Corporation, provider of trusted security solutions, has been selected to participate in the recently held GPU Technology Conference (GTC) in Silicon Valley, California. GTC is one of the largest and most important technology

SecurityLink India ■ 1 June 2017

CMYK

conferences of the year, bringing together a global community of thought leaders, to discuss innovations in deep learning artificial intelligence (AI), big data analytics, intelligent machines and more. As a leader in developing AI technology for surveillance, Avigilon has been invited to demonstrate its latest video analytics search technologies. Avigilon’s Chief Technology Officer, Dr. Mahesh Saptharishi, was also a featured speaker on the importance


CMYK

INTERNATIONAL UPDATES

of intelligent video analytics and deep learning for public safety. “Avigilon is thrilled to be part of this important conference in Silicon Valley’s tech sector,” said Dr. Mahesh Saptharishi, “We continue to integrate our AI technology with NVIDIA GPU

platforms, to deliver new advancements in our video analytics portfolio, and redefine the way customers think about and interact with their video surveillance systems.” “GTC brings together a diverse group of thought leaders focused on

AI and deep learning innovation,” said Deepu Talla, Vice President and General Manager of the Tegra business at NVIDIA, “Avigilon is developing nextlevel capabilities for the video surveillance space using deep learning on NVIDIA GPUs.”

Cybersecurity Product Suite for New Ram Compound Cyberbit to provide Cybersecurity Product Suite for Israel’s first secure-by-design Government facility

C

yberbit, the wholly owned subsidiary of Elbit Systems, whose cybersecurity solutions protect the world’s most sensitive systems, has been selected by the Arison Group – Solel Boneh Infrastructure, one of Israel's most prominent construction and infrastructure companies, to provide its cybersecurity product suite for the new Ram Compound, an ultra-secure facility under construction in the Israeli capital. The Ram Compound will serve as headquarters for sensitive government ministries and will integrate physical and cybersecurity to achieve unprecedented resilience. Deloitte was contracted to lead the cybersecurity aspects of the project. The team performed comprehensive hazard analysis to determine the core elements of the IT and operational (OT) infrastructure that must remain operational to survive an attack. The analysis was then used to define the cybersecurity requirements for ensuring undisrupted operation of these core assets. Deloitte se-

lected the entire Cyberbit product suite to provide integrated security across the converged network. “Attackers are always looking for the weakest link to exploit, so security must be implemented seamlessly across both the IT and OT networks,” said Lior Kalev, Information Security Expert and Head of Cyber Risk Services at Deloitte, “We selected Cyberbit due to the technical superiority of its portfolio and ability to provide integrated, end-to-end cyber security across the entire IT/ OT stack.” “Physical and cyber security are blending,” explained Cyberbit CEO Adi Dar, “The most severe cyber-attacks are those that move from the IT realm into the physical. This project, with Deloitte and the Arison Group, is an extraordi-

Cyberbit selected by Deloitte and Arison Group to provide endpoint and OT security for sensitive government ministries compound SecurityLink India ■ 1 June 2017

CMYK

nary opportunity for collaboration of domain leaders to build a first-of-its-kind secure facility.” The Ram Compound will implement the following Cyberbit products: ● EDR – Endpoint detection and response protecting against advanced and targeted threats, including ransomware, and providing advanced forensics and threat hunting tools. ● SCADAShield – Visualization of the OT network to detect continuity and security risks in real time. The facility’s cyber security team will train in a local training center powered by the Cyberbit Range, the most widely deployed cybersecurity training and simulation platform. Created to protect the most high-risk organizations in the world, Cyberbit secures enterprises and critical infrastructure against advanced cyber-threats. The company’s battle-hardened cybersecurity solutions detect, analyse and respond to the most advanced, complex and targeted threats. 87


CMYK

INTERNATIONAL UPDATES

Intersec Saudi Arabia 2017 Curtains come down with double the anticipated visitor numbers

Debut security show attracts 6,131 trade buyers seeking latest solutions from 170 exhibitors, 500 brands

T

he inaugural edition of Intersec Saudi Arabia concluded its debut run in high style, welcoming 6,131 Saudi trade buyers at the Jeddah Centre for Forums and Events. The visitor count was nearly double than what was anticipated by organisers

security upgrades and construction safety as part of the Kingdom’s Vision 2030. The event was buzzing with activity from the official inauguration by HH Saud Bin Abdullah Bin Jalawi Al Saud, Deputy Governor of Makkah Region for Security Affairs, right through to the

Messe Frankfurt Middle East and AlHarithy Company for Exhibitions (ACE Group), underlining the need for a business networking platform dedicated to the Kingdom’s security, safety and fire protection industries. Saudi visitors were treated to the latest technologies and product innovations by 170 exhibitors from 24 countries, while a three-day conference programme ensured hundreds of delegates and professionals were privy to the latest

closing bell at 7pm on 4th May at the Red Sea port city trading hub. “We couldn’t have asked for a more successful debut show, and as a launch event, Intersec Saudi Arabia 2017 was a remarkable feat,” said Ahmed Pauwels, CEO of Messe Frankfurt Middle East, Valued at US$5.4 billion in 2016, Saudi Arabia’s commercial security and fire protection market is by far the Middle East’s largest, and we always had high expectations that this exhibition would

88

SecurityLink India ■ 1 June 2017

CMYK

be well received by the industry once we decided to expand the well-known Intersec brand here. “We owe this success to a number of factors,” added Pauwels, “The support and backing of local authorities was paramount, as were the show’s 22 official launch partners, which are among the world’s most prominent global players, and who signed on right from the outset.” Intersec Saudi Arabia is held under the patronage of HRH Prince Khalid Al Faisal, Advisor to the Custodian of the two Holy Mosques and Governor of Makkah Region. The annual showcase is also officially supported by the Saudi Ministry of Health, the Saudi Safety & Security Department, Jeddah Police and Jeddah Civil Defense. More than 500 brands were on display, presenting a comprehensive overview of the safety, security and fire protection industries covering commercial security, information security, perimeter and physical security, homeland security and policing, fire and rescue and safety and health. The show’s launch partners include Hikvision, Dahua, Axis Communications, Nedap, Milestone, Bristol, CP Plus, dormakaba, Draeger, Genetec, Hanwha Techwin, Harco Group, HID, NAFFCO, Pelco by Schneider Electric, Promise Technology, Smiths Detection, BSIA, SAS Systems, Nitin Fire Protection Industries, Al-Alameya Group and ZMR Technology Distribution.


CMYK

INTERNATIONAL UPDATES

Identiv’s Intelligent Temperature Datalogger Solution Wins Best New Product at 11th Annual RFID Journal Awards

I

dentiv, Inc. has recently announced the company’s next-generation uTrust Sense temperature tracker solution has won ‘Best New Product’ in the 11th Annual RFID Journal Awards during RFID Journal LIVE! 2017. The end-to-end solution includes a low-cost, secure, portable smart sensor label that tracks and stores temperature readings, and can be read locally by near field communication (NFC) readers including mobile devices, and can be uploaded to the Internet for analysis. “The scope of projects expands each year as the technology matures,” said Mark Roberti, Founder and Editor, RFID Journal, “In many cases, the tech-

nology is being used in mission-critical applications and delivering incredible benefits. Attendees at LIVE! 2017 will benefit from hearing about these deployments and seeing the products chosen as among the best this year.” Identiv’s uTrust Sense temperature tracker Datalogger solution monitors and tracks temperature-sensitive products for cold chain applications, smart packaging, government use cases, medical products and pharmaceutical logistics, and other fragile goods. The precise temperature accuracy of the tag makes it ideal for use with perishable goods, including fresh fish, caviar, wine, blood, vaccines, flowers, and more, protecting

product and brand integrity and profits, while significantly minimizing costs for the shipper, receiver, and customer. The data can be read locally by a mobile device or uploaded to the cloud for analytics and remediation. “Identiv is thrilled to accept the award for ‘Best New Product’ during the 11th Annual RFID Journal Awards,” said Stephane Ardiley, Identiv Director of Product Management, “This compact, complete sensor solution for the Internet of Things (IoT) empowers businesses by providing a low-cost, self-adhesive temperature monitoring solution for virtually anything and protecting data integrity.”

Nedap wins Intertraffic Parking Solutions Award 2017 N

edap is recognized with the Intertraffic Parking Solutions Award 2017 for its smart parking solution in the Turkish city of Izmir. During the ceremony at the start of Intertraffic Istanbul, Nedap’s SENSIT smart parking sensors received this prestigious award. In this project, SENSIT monitors the vehicle occupancy of individual parking spaces in the streets of Izmir. This results in improved parking guidance and efficient

monitoring of all paid, time restricted and disabled parking zones.

2000 smart parking spaces in Izmir

A

s part of the cities’ large-scale intelligent transportation systems (ITS) implementation, that includes solutions to optimize traffic and transportation, 2000 parking spaces are equipped with Nedap’s smart parking sensor sysSecurityLink India ■ 1 June 2017

CMYK

89


CMYK

INTERNATIONAL UPDATES

tem SENSIT. Thanks to this solution, the city of Izmir has found a smart way to reduce traffic congestion and to increase the utilization of existing parking spaces. Integrated with the traffic management platform of Cross, the vehicle occupancy of individual parking spaces in the streets of Izmir is monitored by SENSIT. Based on the real-time information, motorists are guided to

available spaces easily. In addition, all paid, time restricted and disabled parking zones can be monitored efficiently. The project was realized by the Czech companies Cross in a joint venture with AZD Praha.

Solving mobility challenges

We are honored with this recognition by the professional jury. This

award emphasizes that Nedap’s SENSIT is seen as the leading smart parking platform for on-street parking in cities worldwide. It is great to see that SENSIT is recognized for adding true value to ITS projects. It is one of the reasons that more and more cities rely on SENSIT to solve their mobility challenges,” says Ido Wentink, Business Development Manager at Nedap.

ENTR® Smart Door Lock Wins International Smart Home Award

Mul-T-Lock’s ENTR® smart door lock has won a premier product innovation award from globally connected home publication, SMAhome. The ENTR® lock was selected from among 28 smart home product finalists to receive the overall Popularity Award for 2017

S

MAhome awards are judged anonymously by a jury of industry insiders including system integrators and service providers with an established track record in this market. ENTR®’s affordability, convenience, sustainability and easy integration with leading smart home ecosystems were cited in the SMAhome award announce-

Mul-T-Lock/ ASSA ABLOY

The ENTR® Smart Lock: convenient, secure and easy to install

90

ment. Award winners were announced at a ceremony at the Taipei Nangang Exhibition Center in Taiwan. “SMAhome is one of the world’s leading sources of news and knowledge on the fast-evolving smart home technology and product market,” says Ehud Dinerman, Managing Director ENTR® at Mul-T-Lock, “We are extremely proud SecurityLink India ■ 1 June 2017

CMYK

our ENTR® Smart Door Lock was selected from a strong list of 28 finalists, which included some of the global industry’s best-known manufacturers.” It takes just one screw to fit an ENTR® lock and transform a front door into a smart front door. With ENTR®, homeowners can open their door via the app, PIN code, remote control or fingerprint reader. ENTR® makes domestic key troubles a thing of the past. There’s no longer any need to get a spare set cut for kids, cleaners, carers or temporary workers. A couple of swipes on a smartphone screen is all it takes to share an ENTR® digital key with family or anyone who needs access, and to revoke the key instantly when required. The Mul-T-Lock ENTR® smart lock works equally well as a standalone solution or connected to a smart home system.


CMYK

INTERNATIONAL UPDATES

Comcast’s Rise and its Impact on the Professional Security Intruder Alarms Market By Anna Sliwon – Analyst, IHS Technology

C

hallenges to the professional security equipment market emanating from players outside the industry have grown significantly over recent years. Recent subscriber milestone announcements from both Comcast and ADT suggest that the competition is intensifying every year. Furthermore, customers are increasingly demanding additional functionality from their intruder alarm systems, which would allow them to easily and securely connect to other in-home smart devices.

Multi-service operator becoming disruptive

I

n recent years the multi-service operator (MSO) market has grown to pose an increased challenge to traditional security providers, and the latest Comcast press release including the number of subscribers confirms just how serious the challenge is. According to the IHS Markit intelligence service, Intruder Alarms and Monitoring Services, the traditional alarm monitoring market will shrink at four percent compound annual growth rate (CAGR) between 2016 and 2020, while the connected monitoring market will experience a 15.9 percent CAGR for the same period. MSOs have approached smart security as a way of growing the number of customers and reducing attrition rates by offering security packages which include additional functionality, enhanced user experience and ease-of-use, while also providing the ability to connect with a wide range of smart devices available on the market.

Many MSOs have been able to take advantage of their wide footprints and existing customer bases to convert existing customers and bring new customers to the security (smart home) category. Converting existing customers has been one of the primary strategies of many security service providers. However, MSOs often are working with tens of millions of existing customers while even the top security service providers have fewer than seven million total residential customers to convert, giving MSOs a distinct advantage.

Comcast’s role in professional security monitoring

I

n essence, Comcast demonstrated success in taking advantage of its wide array of services while taking into account customers’ needs by releasing an inexpensive, innovative package and constantly improving its products quality and reliability, with R&D investment reported at $1.8 billion. Comcast has been able to achieve subscriber growth of 90.4 percent CAGR since 2010, when Xfinity Home was first unveiled. Moreover, the latest merger with iControl is likely to open up additional opportunities for growth. This may bring additional challenges to professional security equipment manufacturers and service providers (such as ADT), particularly if iControl’s Converge platform and Comcast’s Xfinity products begin to be offered through sales channels normally reserved for the professional security market: dealers. SecurityLink India ■ 1 June 2017

CMYK

Traditional security providers try to maintain share

T

he professional security market is working to respond to the changing dynamics of the market and ADT has been leading these efforts. The company, which launched connected home security offering Pulse in 2010, reached two million subscribers in 2017. ADT’s convergence in connected monitoring accounts has been largely drawn from converting its long-established base of subscribers to traditional alarm monitoring services. On the other hand, Comcast has been able to attract customers who have never used security equipment before, which will have strong knock-on effects for the intruder alarms market.

Future could belong to MSOs

I

f Comcast and ADT continue to convert their subscriber base to smart security at a similar rate with which they achieved their 2017 milestones, by 2025 ADT will reach a nearly 100 percent conversion of its existing residential subscribers, requiring it to devise a new strategy of increasing the total number of subscribers. Its current total number of subscribers is estimated at nearly seven million, most of which are residential customers. Conversely, Comcast currently has more than 22 million subscribers, and by 2025 its conversion rate will be much lower, at less than 20 percent of ADT’s, which will present a greater opportunity because Comcast will not have to rely as heavily on a greenfield customer base. 91


CMYK

INTERNATIONAL UPDATES

Hikvision & Cisco Hold Parley on

Cybersecurity Collaboration Hikvision has recently held a joint meeting with Cisco at Hangzhou, China on cybersecurity collaboration

T

he meeting marked the successful completion of the first phase of a collaboration that began in December 2016. Cisco is sharing its professional and sophisticated cybersecurity management experience and technologies with Hikvision, facilitating Hikvision’s globalization process.

● Cisco lauds Hikvision’s dedication to safe R&D management. ● Hikvision resolves to strengthen its research on security technologies. ● Reiterates commitment to improve cybersecurity. During the meeting, Cisco cybersecurity experts reviewed results of the

first phase of the project and shared relevant experience and advice on the next step. They also recognized and lauded the Hikvision’s dedication to safe R&D management. Weiqi Wu, VP at Hikvision reiterated Hikvision’s commitment to the highest possible levels of cybersecurity. He said, “Although the company’s cybersecurity best practices are industryleading, cybersecurity efforts must be ongoing. Going forward, Hikvision will continue to assess and improve its cybersecurity efforts in the R&D process, and strengthen its research on security technologies. Hikvision will also continue to deepen its collaboration and communication with the world’s top-notch cybersecurity companies such as Cisco,

to further improve cybersecurity in the security industry.”

Cybersecurity

C

ybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In the computing context, security includes both cybersecurity and physical security. Crises related to Cybersecurity cause losses of every year. Besides, they also have an impact on our daily lives as our dependence on technology continues to grow. According to Forbes, the global cybersecurity market reached $75 billion for 2015 and is expected to hit $170 billion in 2020.

ONVIF Holds 16th Developers Plugfest in Québéc City O

NVIF®, the leading global standardization initiative for IP-based physical security products, recently hosted its 16th ONVIF Developers Plugfest (ODP) in Québéc City, Québéc. With multiple testing of ONVIF conformant products, the Developers’ Plugfest offered inter-operability testing for five ONVIF pro92

files, including the Release Candidate of Profile A for broader access control configuration, which is scheduled for final release this summer. During the Plugfest, engineers and developers from ONVIF member companies tested their products’ implementation of ONVIF Profile specifications with other ONVIF ProSecurityLink India ■ 1 June 2017

CMYK

file-conformant products to ensure inter-operability between conformant products from other vendors. In addition to Profile inter-operability tests, attendees were offered one hour of testing using the ONVIF device/ client test tools, as well as the opportunity to discuss with test tool developers the issues, if any that arose during con-


CMYK

INTERNATIONAL UPDATES

formance testing. “The ONVIF Developers Plugfest is a literal testing ground for members to establish that their products are ONVIF conformant and interoperable with other ONVIF-conformant products before they are released to the market,” said Steven Dillingham, Chairman of the ONVIF Technical Services Committee Taskforce, Developers Plugfest, “The product development lifecycle can be long and

involves the work of many hands, so when our members test their products at the Plugfest, it represents one of the final phases of product development after months of hard work.” The Plugfest in Québéc city drew 32 attendees from 17 member companies from 13 different countries. Attendees logged 177 hours of total testing time during the three-day event, testing five ONVIF profiles for inter-operability, including Profile Q

for out-of-the-box inter-operability, Profile S for IP-based video systems, Profile C for IP-based access control, Profile G for edge storage and retrieval, and the Release Candidate of Profile A for broader access control configuration. Profile A is in the final stages of development and scheduled for release this summer. The 17th ONVIF Developers’ Plugfest is scheduled for November 8-10, 2017, in Seoul, South Korea.

Allegion Expands IoT Footprint with New Yonomi Alliance A

llegion, plc has made, through one of its subsidiaries, an equity investment in Yonomi – a leading mobile application and cloud platform provider for connected living. Allegion Futurist and Vice President of Strategy and Partnerships, Rob Martens called the investment a strategic alliance between two smart-home IoT thought leaders. “As an IoT thought leader, Allegion drives connected device integration in both residential and non-residential security markets,” said Martens, “We form strategic alliances with others who embrace the IoT as we do, furthering our capabilities and pushing innovation in our industry. This new alliance with Yonomi is a perfect example. We’re impressed by the flexible IoT solutions Yonomi offers to manufacturers as well as end consumers, and

look forward to using this technology to give our customers smarter security experiences.” Through the alliance, Allegion’s portfolio has elite access to Yonomi’s Thin Cloud Infrastructure and cloud computing expertise. Schlage® recently deployed Yonomi Thin Cloud to support millions of its smart locks. Allegion will also further its integration into the smart-home market through the Yonomi consumer application that fosters seamless communication between smart-home devices. The mobile application allows users to set conditions and personalized routines that control multiple smart-home devices with simple voice command. The app currently integrates with more than 60 popular smart-home devices, including some Schlage locks. “We’ve designed Yonomi to be SecurityLink India ■ 1 June 2017

CMYK

both easy to use and powerful, much like Allegion’s IoT-enabled products,” said Yonomi CEO, Kent Dickson, “As a company that’s focused on simplifying smart-home experiences, we’re excited to have a strategic partner like Allegion with expertise specific to the evolution of smart security devices – an important part of the connected home.” The partnership is consistent with Allegion’s strategy to drive growth and create shareholder value by investing in new technologies. Allegion is a global pioneer in safety and security, with leading brands like CISA®, Interflex®, LCN®, Schlage®, SimonsVoss® and Von Duprin®. Focusing on security around the door and adjacent areas, Allegion produces a range of solutions for homes, businesses, schools and other institutions. 93


CMYK

INTERNATIONAL UPDATES

New Solutions with Added Value New Pelco VMS solution to build on Dell EMC hardware expertise

P

elco by Schneider Electric has collaborated with Dell EMC to share technology, information and best practices in order to better serve customers globally. As a first initiative, Pelco is developing a new VideoXpert™ Professional video management system (VMS) line built with Dell EMC’s industry-leading OEM solutions. Working with Dell EMC enables Pelco to deliver a superior user experience by leveraging Dell EMC’s powerful hardware capabilities for the servers and workstations of Pelco’s new Windowsbased VideoXpert Professional VMS.

Working closely with Dell EMC’s sales organization Pelco will bring its own expertise in video security solutions to the collaboration while sharing best practices in the areas of production, procurement and process. “Our relationship with Dell EMC further strengthens our initiative to deliver meaningful innovation to our customers globally,” said Diane Feliciano, Vice President of Marketing, Pelco by Schneider Electric, “By working closely with Dell EMC OEM Solutions, we gain a competitive edge in many business areas including hardware, software

and the entire production and delivery chain.” VideoXpert Professional, Pelco’s new video management system (VMS) which is scheduled to launch in June 2017, will feature Dell EMC hardware. “Today’s security customers are looking for easy-to-deploy solutions that are smart, scalable and flexible,” said Ron Pugh, Vice President and General Manager for the Americas, Dell EMC OEM Solutions, “We are excited to work with Pelco to help them bring the VideoXpert platform to mid-size customers in the video surveillance market.”

VisionHub Qblock Converged Infrastructure Built on industry-leading Dell EMC technology, it is the security market’s most reliable, enterprise class, turnkey VMS Network Attached Storage (NAS) solution providing a one-stop-shop for centralized video data management

Q

ognify has launched Qblock, a unique offering built on industry’s leading technology from Dell EMC to address the growing need for securely and efficiently storing critical video data. The Qblock converged infrastructure is designed specifically for the surveillance industry, optimized with Qognify’s state-of-the-art video management solution. Qblock meets the needs of clients who have expanded surveillance environments and/ or critical video data with storage intense requirements. This integrated solution can scale to support thousands of video channels with easy, centralized management, avoiding complex storage migrations. Qblock combines the power of Dell EMC PowerEdge servers, Dell EMC 94

Isilon storage and Qognify’s VisionHub Video Management Solution to create a best-of-breed, large-scale solution. As storage requirements are rapidly increasing, the need for a turnkey solution that is easy to deploy and manage has become a market necessity. VisionHub Qblock uniquely addresses this need, allowing users to scale their solution as much as required, without having to rearchitect it. Qblock is now offered to the market by Qognify to meet the needs of both Security and IT in a single solution. Support for the solution and all its components is provided from a single point of contact. “Based on the surveillance market’s trajectory, the need for a reliable, scalable, and simple video SecurityLink India ■ 1 June 2017

CMYK

storage solution was clear. Coupled with our leading video storage management capabilities and Dell EMC technology, we are delivering a truly unique solution that addresses the stringent IT requirements from a VMS solution,” commented Moti Shabtai, CEO & President of Qognify, “We’re proud to be the leading Video Management Solution provider offering a solution based on Isilon scale-out network attached storage (NAS) platform.” For security conscious organizations, the loss of video is unacceptable, making high availability and fault tolerance critical. Qblock responds to this need by reducing failover time and increasing fault tolerance beyond typical RAID storage configurations.


CMYK

INTERNATIONAL UPDATES

Arecont Vision® Technology Partner Program Welcomes AMAG Solution provider is Megalab certified

A

MAG Technology has joined the Arecont Vision Technology Partner Program. AMAG’s Symmetry™ CompleteView VMS (video management system) is certified for use with Arecont Vision megapixel cameras, and is available in the MegaLab™ as part of the program. “Arecont Vision is a long standing Symmetry Preferred Partner,” said David Ella, Vice President, Product and Partner Programs, AMAG Technology. “By combining high resolution and multi-sensor cameras to provide situational awareness with our access control and

intrusion detection system allows for quicker response times and an improved overall security system.” “AMAG is a perfect fit in our Technology Partner Program offering industry leading access control, intrusion detection, and video management,” said Jason Schimpf, Director of Arecont Vision’s Technology Partner Program, “Combined with Arecont Vision single- and multi-sensor cameras, integrators have a fantastic total solution for their customers. Customers can now be even more confident that the joint solution will work seamless-

ly with AMAG that is now officially MegaLab certified.” Through the Arecont Vision Technology Partner Program, sales, development, and support contacts are established between the two companies in order to better engage with end user customers and integrators, integrate new features and technology, and quickly resolve any customer support issues. As part of the program, Arecont Vision cameras are in the AMAG test labs, while AMAG’s Symmetry CompleteView VMS is in the MegaLab test and certification facility.

Datumstruct Partners with Barco

Singapore’s Leading Control Room Solution Provider Datumstruct Partners with Barco to Raise Comfort and Efficiency in Control Rooms

N

etwork visualization expert Barco is delighted to see OpSpace, its operator workspace solution making inroads in control rooms around the world. Under the new agreement, Datumstruct will include Barco’s OpSpace in their control centre design philosophy and product portfolio providing users with a healthier and more efficient environment to handle stressful operations.

Datumstruct is one of Asia Pacific region’s most leading turnkey solutions providers with experiences in design, manufacturing and implementation of command & control centre solutions, data centre IT infrastructure solutions, office furniture solutions, and bio-tech solutions for various industries and agencies worldwide. Their aptitude spreads to a variety of industry sectors, including oil & gas, aviation, security, SecurityLink India ■ 1 June 2017

CMYK

government, transportation, telecommunication, energy and more. Datumstruct’s control centre design & build has grown leaps and bounds and matured into providing a totality in control centre design philosophy in the region. Barco’s OpSpace - a patent pending technology – is the first personal workspace that creates a single workstation – comprising a number of displays on the operator’s desk for view95


CMYK

INTERNATIONAL UPDATES

ing, monitoring and interacting with multiple clients that reside on multiple networks with different security clearances or liability concerns. All relevant information can be consulted and manipulated within a single pixel space, with just one mouse and keyboard. This creates a very flexible approach to the operator’s job, allowing better situational overview, and therefore better decision-making. Ken Low, MD, Datumstruct said, “Our focus has been on holistic control center and data center solutions where we incorporate our design with HFE analysis

coupled with ergonomic considerations; say for critical environment, we provide task and workload analysis ensuring the user a healthier and more efficient environment to handle stressful operations. When we discovered Barco’s OpSpace we were really impressed as it is the first operator workspace solution that is tailored to the operator and provides an intuitive user interface, one pixel space integrating all information, secure access to any application, and much more.”

Work more focused, more comfortably and

more intuitively

Barco developed OpSpace to make life easier for control room operators and help them raise their productivity. The enthusiastic feedback of OpSpace proves that OpSpace meets a real market need,” comments Mark Bultinck, VP APAC at Barco, “We are excited about this new partnership as it enables Barco to better service the market with a new platform that is designed to streamline the busy workday of control room operators, allowing them to work in a more focused, comfortable and intuitive way.”

The Imprimerie Nationale Group and Lyon Saint-Exupéry Airport Unveil the

First Automatic e-gates for Border Control Just a few days after the announcement of Thales Identity and Biometric Division integration in the Imprimerie Nationale Group

T

he Imprimerie Nationale Group launches the first e-gates deployed for border control at Lyon Saint-Exupéry Airport, within the national PARAFE (Passage Rapide aux Frontières Extérieures – Fast Pass through the External Borders) framework experimentation. Developed by engineers from Thales Identity & Biometric Division, recently acquired by Imprimerie Nationale Group, this equipment, compliant with the PARAFE system, allows to significantly speed up border identity controls. This experimentation is based on a unique architecture that includes a series of five gates with fingerprint-based biometric recognition in the border control area. The installed system is innovative 96

as it already supports fingerprint recognition and it is ready for the addition of face recognition capability in the near future. It is open to passengers equipped with a French or German biometric passport and it will gradually be extended to other European Union passengers. The test configuration installed in Lyon allows controlling 5 passengers at once by a single police officer while, in a traditional setting, an officer is needed to control one passenger. This installation allows passengers to go through border controls in a simplified, fluid and fast manner. It consists in: ● Presenting one’s passport on the document reader at the gate entrance. ● Going through the gate after the enSecurityLink India ■ 1 June 2017

CMYK

trance door opens. ● Presenting a finger on the fingerprint reader. ● Exiting the gate through the exit door after the fingerprint has been authenticated by the system. Commenting on the occasion, Didier Trutt, the Imprimerie Nationale Group CEO, declares, “We are very happy to be here today for the launch of these e-gates that will allow to reinforce border security and to provide better services to Saint-Exupéry Airport passengers. We thank the Airport authorities for their confidence in the technologies and expertise of our new biometric identity solutions branch (formerly Thales Identity & Biometric Division), for their choice of these user-friendly and secure


CMYK

INTERNATIONAL UPDATES

systems for automated identity control.” The teams belonging to Imprimerie Nationale Group’s Biometric Identity Solutions branch benefit from more than 30 years of experience in the field of integrated identity management throughout the world. They rank first in civil biometric market in France. The integration of technologies and experience of Thales Identity & Biometric Division into Imprimerie Nationale Group, from May 9, 2017, allows the Group to reinforce its leadership as a

trusted supplier of biometric and secure identity solutions with a global offer: innovative technologies, components, products, systems and digital services for governments and citizens in France and internationally. The Imprimerie Nationale Group is a globally leading company in secure identity solutions. In a mobile and digital world where data security has become the major issue, the Imprimerie Nationale Group offers states, governments and busi-

nesses trusted solutions including added value electronic components for banking, identity solutions including electronic components, cutting-edge secure credentials and safe and reliable interoperable systems, but also innovative and efficient digital services, and secure solutions for complex printings and workflows. The Imprimerie Nationale Group is specialized in the integration of electronic and biometrics in identity documents and in polycarbonate cards.

QNAP and ABBYY Team Up to Demonstrate a Total Solution for File Digitization at CeBIT 2017 Q

NAP® Systems, Inc. and ABBYY®, a leading provider of document recognition, data capture and languagebased text analytics technologies, have teamed up to introduce a file digitization offering that unifies paper documents on computers for digital management. By supporting ABBYY’s PDF conversion and text recognition software, QNAP NAS provides a complete file digitization solution for file storage, archiving, and optimized file searching to realize optimized business workflows. “We are pleased to cooperate with ABBYY to showcase an inspiring application for file digitalization and management,” said Y.T. Lee, Vice President of QNAP, adding, “The file digitization offering we introduced is practical and easy-to-use, suitable for all users who are struggling with managing and finding files.” “QNAP NAS is a solid foundation

for managing and storing digital data,” explained Kristin Wagener, Director of the Application Software Business Unit for ABBYY, “This partnership makes our text recognition and PDF conversion tools more easily accessible for a wide range of customers and we are excited to work with QNAP on this initiative.” Organizations that strive to efficiently archive and manage documents can benefit from the joint QNAP NAS and ABBYY solution – simply creSecurityLink India ■ 1 June 2017

CMYK

ate a Windows® VM on QNAP NAS by using Virtualization Station, install ABBYY FineReader which converts images to searchable PDF on the VM, and centrally store all the files in QNAP NAS as a file center. Alongside QNAP’s productivity apps including the powerful Qsirch full-text search engine and Qfiling for automatic file archiving, organizations can enjoy a full-spectrum solution for scanning, storing, backing up and archiving documents. 97


CMYK

Annual Subscription: 1500/- for 12 Issues

“Security Link India” payable at New Delhi dated__________

* Please subscribe through admin@securitylinkindia.com

WE ARE UPDATING OUR DATABASE For free listing in Database:

For

Advertisement Contact:

editor@securitylinkindia.com

* Send your detail to admin@securitylinkindia.com

Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 98

SecurityLink SecurityLink India ■ 1 April June 2017 2017

98

CMYK


0x270mm_v1.ai

CMYK

LIST OF ADVERTISERS

JUNE 2017

S. No.

15

02.

05, 09 Gate Fold

04.

21/2/17

Page #

01.

03.

1

Company

S. No.

Company

Page #

08.

78-79

09.

13

10.

16

11.

07

12.

100

13.

16, 33

10

06, 11 Back Cover

05.

33

06.

Inner Front Cover & 17

07.

08

6:17 pm

99

SecurityLink SecurityLink India â– 1 April June 2017 2017

99

CMYK


CMYK

100

SecurityLink India â– 1 April 2017

100

CMYK




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.