CORPTIVE
RESEARCH
Knowledge Partner
Media Partner
www.nidoworld.com
From the Editor’s Desk
(100 pages including 4 for cover) Volume III • Issue 10 • May 2019
®
®
ISO 9001-2015 CERTIFIED
Dear Readers, Greetings from SecurityLink India! After absolute peace for the last 10 years, Sri Lanka has been hit by one of the most heinous terror attacks by suicide bombers on the auspicious day of Easter, causing massive loss of life and property. There are usual aftermaths, and permutations and combinations by security experts but the fact remains – any terror activity succeeds primarily for the disconnect whatsoever between intelligence and the enforcement agencies. A driver wins the race not the car; and thus human elements like consistent preparedness, focus and alertness of each component of the system are the prerequisites to evade unfortunate incidents like these. Nine year old girl P Srihitha –’Little Security Angel’ – teaches a similar lesson. She puts up a true-to-life rationale before all security stakeholders, including the community at large, to revisit the fundamentals of security and the security business. The angel has recently donated 30 CCTV cameras to Chennai Police to help them ensure security at the wanted spots. She purchased them out of her savings that her father had kept for her birthday. Her one-off gesture has been honoured by the Chennai Police Commissioner, and very recently by the Secona Shield Awards 2019. What fetched her applauds – her mere dare of tangible donation, or the intangible human factor in the form of her thoughtfulness of this degree at this tender age whereby she valued security over her birthday celebration? The answer is certainly the latter which is conspicuously depleting in our technology rich society. What if the implementation of the contributed CCTV cameras is lackluster, which is most often observed in public deployments, the intent of the girl and the objective of security will remain unaccomplished. However, it will certainly make a point for the security business. Frequent incidences of security and fire safety lapses also attribute to the lack of security culture in countries like India and Sri Lanka which can be achieved by boosting human elements through education and awareness. Objectives of security precisely include those of the security business. Srihitha has done her small bit – it is our turn as the stakeholders to remake our mind and endeavor to contribute our due true bits. Team SecurityLink India salutes the angel, as well as her parents who acknowledged her emotion and reinforced her sense of human responsibility by consenting to her decision. Till we meet next month, stay safe and happy reading! With warm regards,
Santosh Pathak, M: +91 9968172237
Editor-in-Chief Santosh Pathak Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Divya Wadhwa Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher.
Innovative Product of the Year in Security (Hardware-CCTV) Axis Communications
6
R & D Effort of the Year in Security-Hardware Vehant Technologies Pvt Ltd
SecurityLink India presenting Awards at the Secona Shield Awards 2019
(The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
National Roundup
may 2019
CONTENTS NATIONAL ROUNDUP 16
SECONA Shield Awards 2019
22
CP PLUS Secures Kumbh Mela 2019
18
HIKVISION at Secutech India 2019
23
Netgear Tri-Band Wi-Fi 6 Router
19
APS Man Hits Boston Marathon Track
24
20
Parekh Integrated Services Adopts Matrix VMS
Fortinet Commits to Close Cyber Skills Gap
26 NEC to Secure Gurugram and Manesar
21
27
MyZicom – A Service & Bill Management App
Matrix Enhances Financial Services of IndiaNivesh
WHITE PAPERs
Best Practices for Video Storage Infrastructure
34
Cyber-Sustainable Video Surveillance Systems
62
Application/ case studies 42
Vanderbilt Access Control in Hospital Security
47
Tasmanian Distillery Knocks Out Counterfeiters with HID
44
Axis Bolsters Drill Fleet in Africa
48
45
Genetec Helps Bank Branches Unify Security
Bradley Business Center Deploys 3xLOGIC infinias
8
SecurityLink India ■ May 2019
National Roundup
150 SecurityLink India â– May 2019
9
National Roundup
may 2019
CONTENTS Feature Articles On Site Training for Security Operations
28
Digital Infrastructure Vs Cyber Threats
30
Revolutionizing Security with AI
49
5G Market Boom – Clarity is Needed
50
Evolution of Storage Technology
52
Ways to Make Fleet Management Easy
65
56-61 Product showcase
10
International updates
66-81 82-93
SecurityLink India ■ May 2019
National Roundup
57
SecurityLink India â– May 2019
11
National Roundup
ENGAGING CO-CREATION TO PREPARE FOR FUTURE SECURITY THREATS 2 - 4 July 2019 Sands Expo & Convention Centre • Singapore
Key Highlights at INTERPOL World 2019 More than Co-creation Labs
More than
30
4
8,000
Exhibitors 200 International
4
National Pavilions
Attendees
Working Groups
(by invite only)
Meet the Keynote Speakers: Register by 31 May to enjoy Early Bird Rates! Richard van Hooijdonk
Dr Mary Aiken
International keynote speaker, crime and technology trendwatcher and futurist The Netherlands
Cyberpsychologist and academic advisor Europol’s European Cyber Crime Centre (EC3) United Kingdom
Learn and Contribute to These Topics and More at the Co-creation Labs: 2 July 2019 • Regulating Big Data • Partnerships • Data Fusion
EVENT OWNER
12
SUPPORTED BY
3 July 2019 • Future Capabilities and Cultures • Border Security • Community Participation
visitor@interpol-world.com #INTERPOLWorld
4 July 2019 • Smart Cities • Cyber Disruptors & Drivers of Change • Privacy
INDUSTRY INSIGHTS BY
SecurityLink India ■ May 2019
HELD IN
MANAGED BY
National Roundup
SecurityLink India â– May 2019
13
National Roundup
14
SecurityLink India â– May 2019
National Roundup
SecurityLink India â– May 2019
15
National Roundup
SECONA Shield Awards 2019 Powered by Secutech India
T
he fifth edition of the SECO- heinous terrorist attacks at Pulwama During the event, SECONA reNA Shield Awards, powered by and Sri Lanka, and hence on behest of launched the Religious Premises SecuSecutech India, was held at a glittering Prasad Patil, Chairman, SECONA, a rity Guide (2019). The booklet was unfunction on 26 April 2019, at Bom- one-minute silence was observed for veiled by Mr. Patil along with Manish bay Exhibition Centre, Mumbai during the martyrs of Pulwama and the victims Gandhi (Exhibition Director, Secutech Secutech India – one of India’s largest of Christchurch and Colombo. He also India); Sudhir Deshpande (Co-director, exhibitions on security, safety & fire. thanked the Indian armed forces for their SECONA & MIPL); Col. Samrendra KuThe Shield Awards are one of the ‘first’ selfless contributions towards protecting mar – Retd. (Co-Founder and MD, Mitof its kinds which have recognized the Indian citizens and assets. kat) and Ashish Dhakan (MD & CEO, contributions of many ‘superstars’ of Mr. Patil mentioned that the scale of Prama Hikvision). Mr. Patil appealed Indian security & safety sector – they awards is becoming bigger every year to the audience to help their respective are women and men, working day and that keep individuals and organisations places of faith in terms of installation of night to provide products, services, and eagerly looking forward to it. In that various security technologies. even ideas that can make the communi- sense, SECONA Shield awards are inIndia is exposed to uniquely diverse ties truly safe. deed the most awaited and the most cov- risks, which require customized and loLike every year, SECONA Shield eted awards in the Indian security and calized solutions to mitigate them. There Awards 2019 was focused on recognizing safety industry. is a need to encourage local research the contributions of individuand innovation in technoloals, organizations and teams, gy, and that is one of the key who inculcated innovation and objectives of SECONA and excellence in their offerings. the Shield Awards. Efforts to There were over one hundred design or Make in India, or finalists in various award catat least adapt technologies egories. Winners were highly to the context of Indian risks joyful and expressing their often find resonance in the sense of achievement. They shortlisting of finalists and the mentioned the recognition as a final selection of the winners, special honour in front of the which is what was noticed in industry peers. the several awards for OEMs, The award ceremony was projects and integrators. Manohar Bidaye, the Founder and Chairman, ZICOM (C) receiving the Award from Prasad Patil (L) and Manish Gandhi (R) held in the backdrop of the Eight educational institu16
SecurityLink India ■ May 2019
National Roundup
Charisma of the Show
Security Angel – Little P Srihitha Honoured
T
his year, there was a special awardee – little P. Srihitha, just 9 year old, who recently donated her entire birthday savings to Chennai police for the installation of CCTV cameras. This must have been the first such instance in the whole world; and hence SECONA decided to honour Srihitha and her family, who came all the way from Chennai, for their outstanding thoughtfulness and generosity. Srihitha certainly stole the show with her poise and charm. Srihitha, who is studying in class 3 and an ardent fan of Kiran Bedi – (IPS), Lt. Governor of Puducherry, got to know the importance of CCTV cameras during a meeting organised by Chennai Police which was near her father’s office. When she came across how CCTV cameras can help the police reign criminals and establish a crime free society, she decided to contribute to the cause in her own way. She went home and expressed her desire to donate Rs 1.5 lakhs, which her father had kept for her birthday celebrations. A few days later, Srihita and her father bought 30 CCTV cameras with the money and donated them to the police. Chennai Police commissioner AK Viswanathan later honoured her for her contribution, thoughtfulness, and solidarity with police during the inauguration of the CCTV cameras. She is an inspiration and learning for the entire security industry and the community at large – ‘Security is the fundamental necessity.’
tions from all over India were shortlisted as finalists for the prestigious ‘Safe Educational Institute of the Year award.’ The award was shared by three institutions – in the higher education category, the Sanjeevani Group of Institutes, Kopargaon; and in schools category, the Orchid School and the Pawar Public School, Bhandup, Mumbai. This year, SECONA introduced the popular choice award in two categories through an online poll – the Security Professional of the Year and the Sales Professional of the Year in Security/ Safety which were respective-
ly won by Sanjeev Mishra, Reliance, and Shantanu Krishna, Pinkerton. The Amit Popat Award for the Entrepreneur of the Year in Safety/ Security was presented to Roshan Bohra, ESSL for his sterling achievements in the field
SecurityLink India ■ May 2019
of biometrics and access control. ESSL is now the leading player in that domain in India and spreading its wings rapidly in the international market. This year, the Lifetime Achievement Award was conferred on Manohar Bidaye, the Founder and Chairman of ZICOM. Mr. Bidaye has been one of the earliest entrants and a true change maker in the Indian security industry. He mentioned that he is happy to see the growth of the security technology sector, and is satisfied that as an early pioneer Zicom has had an important role to play. 17
National Roundup
Evangelises
AI Applications and Security Innovations at Secutech India Expo Wins Big at SECONA Shield Awards
H
ikvision successfully launched and showcased their latest technology and signature products during Secutech India. The special AI Applications and AI Cloud demo zone created the maximum interest among the security professionals and visitors. The latest SECONA Shield award wins in six categories reflects Hikvision’s excellence in innovation and their value proposition to offer vertical solutions for e-commerce, logistics, retail, education, hospitals and religious premises. The technologies and products unveiled at the event included AI enabled DeepinView cameras, DeepinMind NVRs, face recognition terminals with a turnstile, robotics, access control, video intercom, smart pole, UVSS, HDTVI Turbo 5.0, Easy IP 4.0 cameras and iVMS. The security professionals showed keen interest in face recognition (rich applications for various scenarios), data visualisation (making operation more data driven), and behaviour analysis (quick response to emergency events). Hikvision also demonstrated new technologies in video surveillance, including seamless image stitching, smooth streaming, and Hikvision Acusense and ColorVu. The live demos of AI based face recognition, people tracking and perimeter protection applications evoked good response from the security professional community. Ashish P Dhakan, MD and CEO, Hikvision India commented, “Being a leader in AI innovations, robotics and security solutions, Hikvision has a long term commitment to bring best-in-class technologies and innovations, and to offer
18
solutions for different verticals like smart city, homeland security, PPOG, BFSI, education, retail, transportation, hospitality, tourism, pharma, healthcare, mining, heavy industries etc. Towards creating a more secure environment, we are proud to introduce the latest products and innovative technologies including artificial intelligence, AI cloud, big data and IoT. At this year’s Secutech India, we have introduced AX-Hub intrusion solution, PIR cameras along with smart pole and face recognition terminal turnstile. We are sure that all the latest products and cutting-edge AI technology applications will empower the future of security and surveillance industry.”
SECONA Shield Awards
T
he fifth edition of SECONA Shield awards was also held concurrently at the expo, where Hikvision had six wins – one Innovative Security Accessory of the Year for Intrusion Security Control Panel (AX-Hub), and five for key projects executed by Hikvision’s vertical solutions team Hikvision also won the best booth design award. Adding further about the latest award wins, Mr. Dhakan said, “The big win at SECONA Shield Awards is a recognition of Hikvision’s dedicated team efforts across the product categories and verticals. The awards won by the end-users in the field of innovation, real estate, education, hospitals, retail and religious premises come as an acknowledgement to our commitment to deliver best-in-class solutions.”
SecurityLink India ■ May 2019
National Roundup
Age is just a Number for the Head of Credit Control, Aps Group
Ramanjit Singh Oberoi Hits Boston Marathon Track F
ifty nine (59) years old Ramanjit Singh Oberoi, Head – Credit Control, AP Securitas Group has once again defied his age and upheld that age is just a number. He has participated in the Boston Marathon on 15 April 2019 with around 30000 runners, and finished the 26 mile (42 Kms) run in three hours and forty minutes. He believes that everything is achievable, if one pursues one’s passion single mindedly. “I discovered running rather late in life when almost people are slowing down. But I saw how it made me feel – I feel free and doubly alive. When I am on the road, in the hills, I start singing. It’s the most enjoyable part of my life, I will not give it up,” said Mr. Oberoi. Now at the age of 59, he has an enviable track record of huge successes in various marathons. His unbounded energy and enthusiasm found inspiration in the APS environment and he ran his first half-marathon at the age of 55. He has participated in 23 half-marathons and 3 full-marathons before qualifying for the Boston Marathon 2019 (USA). Raman reflects and embodies the indomitable spirit of a ‘Security Man.’
Anil Puri (R) honouring Mr. Oberoi
An Individual’s pursuit of excellence needs to be encouraged and supported. We at APS are deeply involved in Raman’s journey of marathons. We find more and more members of the APS family taking part in shorter runs. It is not uncommon to see people talking of building stamina and adopting a healthier life style. His strenuous hard work also inspires us to imbibe this indomitable spirit in our work place and become a better professional and service Provider Anil Puri CMD, APS Group Anil Puri, CMD – AP Securitas, celebrated the achievement, and felicitated Raman at a grand party thrown in his honour.
SecurityLink India ■ May 2019
19
National Roundup
Parekh Integrated Services Adopts Matrix VMS P
arekh Integrated Services Pvt. Ltd (PISPL) is in the business of providing high-quality logistics services that give customers a competitive advantage in the Indian market. Established in 1981, PISPL is a one-stop shop logistics and supply chain service provider in India offering storage and distribution services, freight forwarding, transportation, information technology and cold chain management solutions, along with other value added services to multiple industry verticals.
them a common control of all the video surveillance systems to reduce the technical manpower cost for different systems. Due to low bandwidth at some of the remote locations, PISPL was not able to secure video evidence at a central location. It was required for any kind of post analysis or dispute resolution. PISPL were looking for an occupancy control system in each warehouse/ storage area to manage and control the worker’s presence in sensitive areas. It was getting difficult to do it manually at each location with the increase in number of employees over the last few years.
Solution offered
M
atrix provided video management software (VMS) as the centralized platform to monitor and manage all
Challenges
P
arekh Integrated Services Pvt. Ltd (PISPL) has established their operation with more than 1,500 warehouses and distribution setups to cover all the major cities in India for their services. With this expansion, IT infrastructure equipment was procured, including IP video surveillance systems of different reputed brands from different vendors. Over a period, it became costly and difficult to manage different brands procured separately at different locations. Cost of operation also went up due to the technical expertise required for each individual system. PISPL was looking for a centralized solution, which can work with different reputed brands as well as give 20
SecurityLink India â– May 2019
National Roundup
‘MyZicom’ One of India’s First Service & Bill Management Apps
Z
the cameras from a central location on a single platform, which led to reduction in operation cost. Matrix VMS supports all the camera models of major brands including ACTI, Samsung, SONY, Mobotix, Panasonic, Vivotek etc., along with ONVIF protocol. Using Matrix VMS solution, PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location. This made it easy to go through the video evidence at a central location and resolve issues in a short time. Another issue of maintaining occupancy up to a certain limit in each zone was addressed by the Matrix VMS Crowd Management feature. All the entry/ exit points were covered with a camera to count number of heads passing through the points. From central control room, using Matrix Smart Client, security can monitor the total occupancy of an area and instruct the team accordingly.
Why Matrix? ●● Matrix VMS architecture supports centralized/ decentralized monitoring and management. ●● Matrix VMS interoperable with most of the reputed brands. ●● Possibility of scheduled backup at central location even at lower bandwidth. ●● People counting feature to control zone occupancy.
Benefits ●● ●● ●● ●●
Centralized control and management. Ease of use. Secure evidence. Improve productivity.
icom Electronic Security Systems Ltd., India’s leading electronic security and surveillance company, has identified the way to connect with customers through a mobile app to ensure that they have an easy access during its lifecycle while using Zicom products. The company has recently launched ‘MyZicom’ app which is available on iOS & Android mobile devices and is a one-point solution to facilitate all their customers’ needs. With this
app Zicom Electronic Security Solutions has become the first ever security company in the industry to introduce a Service & Bill Management Mobile App for a convenient customer experience. With this app, the users will be able to discover even more about Zicom product and service offerings. A recent research says, 73% of buyers point to customer experience as an important factor in their purchasing decisions. MyZicom app facilitates fine experience to all its existing customers with just a click by giving them an online platform with various useful features. It aims to create a constant connect with the customers, and help them foster happier and more productive relationships. Pramoud Rao, Managing Director – Zicom Electronic Security Systems Ltd. said, “Today’s generation demands everything online – be it food, shopping, entertainment, and any other subjects of relevance. Hence, we thought of offering security and service experience online through – MyZicom App for our users, while they are on the go.”
SecurityLink India ■ May 2019
21
National Roundup
CP PLUS Secures Kumbh Mela 2019 India’s Largest Holy Confluence Raises the bar by securing massive 39 sq. km area of The Kumbh Mela with meticulous combination of latest surveillance solutions
K
umbh Mela – one of world’s largest spiritual gatherings and a mass Hindu pilgrimage of faith – is a highly revered religious event where Hindus gather to bathe in a holy river. The spectacular fair displays uniqueness of the Hindu tradition, culture and historical significance. There are four normal Kumbh Melas, which are held periodically in every three years at Allahabad (Prayagraj), Haridwar, Nashik, and Ujjain. At any given place, the Kumbh Mela is held every 12 years. The recently held event at Prayagraj is Ardh Kumbh Mela which is held every six years at Hardwar and Prayagraj. The Allhabad Ardh Kumbh Mela, held from 15 January to 4 March 2019, is claimed to be one of the most successfully organised mega event of this calibre – especially in terms of safety and security. A massive 39 sq. km of land area was turned into a temporary city, constructed by nearly 20,000 workers, to provide shelter to millions of pilgrims, sages and ascetics. The whole area had an arrangement of 1 lakh makeshift urinals, and 40,000 LED lights were installed to brighten the ceremony.
Challenges
M
anaging and ensuring safety and security of people in lakhs was not an easy task. Safe movement of pilgrims, monitoring of crowd and dispersals through gates at such a large scale were some key challenges, and hence the concerned authorities planned to implement several security measures considering factors like the expanse of area, number of people, vulnerable spots and methods of security arrangement. 22
There were arrangements of four Police Lines with 40 Police Thanas, three Mahila Thanas, and 62 Police outposts. The authority also employed Jal Police with 3 units along the river stretch, and one Mounted Police Line to ensure seamless pilgrim movement by the river front and in other crucial religious spots. Monitoring that massive crowd in millions to prevent stampede and like disasters also required cutting edge security solutions such as integrated CCTV surveillance system (ICCC).
Solution by CP PLUS
C
ollaborating with the UP Police, CP PLUS installed a total of 1,135 CCTV cameras covering 268 vulnerable locations of the expansive 39 sq. kms of area. An Integrated Command and Control Centre (ICCC) was set up, which included 2 sub-command and control centres with 4 video monitoring cells and 20 video wall cubes, well-connected to installed CCTV cameras. The integrated ICCC surveillance solution by CP PLUS helped in the monitoring of crowd activities and provided round the clock surveillance of the entire expanse, preventing any unfortunate occurrences. The ICCC unit was manned by 120 monitoring operators and 30 call centre operators, making the execution of this mammoth-size project by CP PLUS a roaring success. CP PLUS meticulously combined some of the latest surveillance solutions for the event ●● Video analytics and real-time video analysis for crowd management.
SecurityLink India ■ May 2019
National Roundup
Unveils
Tri-Band Wi-Fi 6 Router Fastest Wi-Fi to Speed Home Networking in India Delivers higher speed and greater bandwidth for the broad range of household network needs ●● Real-time detection and alert algorithm for overcrowded spaces. ●● Automatic number plate recognition (ANPR) system for parking sites. ●● Vehicle detection by vehicle colour/ license plate and date time combinations. ●● Variable message display (VMD) boards. ●● Real-time information dissemination containing warnings, traffic advice, route guidance and emergency messages. ●● Text and graphic based messages display. ●● Integrated traffic management system.
N
ETGEAR has recently launched the Tri-Band Wi-Fi 6 routers – Nighthawk AX4 & AX8 in Bengaluru. Today households are dealing with an increasing number of connected devices and an increasing demand for greater bandwidth from streaming video, audio and online gaming. These smart home devices from IP cameras, voice assistants, smart thermostats and appliances etc., depend on a constant connection to the cloud. These devices just increase the complexity of a network as they compete for bandwidth, pushing wireless home networks beyond the technical threshold for the current generation of Wi-Fi. NETGEAR has solved this modern-day dilemma with the introduction of a full suite of ultra-fast Wi-Fi 6 routers.
The impact
W
ith the given safety and security measures, Ardh Kumbh Mela Prayagraj 2019 went on for more than 20 days with reportage of zero mishap. The operators of the integrated command and control centre remotely helped authorities by making live feeds of the vulnerable areas readily available, enabling early alarm mechanism, and providing complete control on the crowd movement with the police personnel. Director General – UP Police, O.P. Singh applauded the efforts of the police personnel and CP PLUS, and said, “We employed all kinds of modern surveillance technologies to make this Kumbh Mela a huge success. Simultaneously, forces – ATS and NSG – were on duty to prevent terrorist’s acts an/ or any other criminal or unpleasant incidents in the fair. Commandos monitored the event via choppers and worked in collaboration with the surveillance provider. For us, it was crucial to maintain safety of the people at the most vulnerable spots without intervening in the fair rituals. We received tremendous support from the designated surveillance teams who enabled us in monitoring such a massive crowd as per our requirement with zero mishap count.”
Speaking at the launch, Marthesh Nagendra, Country Manager – India & SAARC, NETGEAR said, “With the increasing number of Wi-Fi devices in our home network, it is has become critical for NETGEAR to provide a solution where each device gets the Wi-Fi bandwidth it needs so that you can get the quality connected experience that you deserve. The NETGEAR AX Nighthawk delivers super fast Wi-Fi with better coverage, and more importantly, has the power and capacity to handle dozens of devices in the typical congested smart home.”
SecurityLink India ■ May 2019
23
National Roundup
NSE Institute Training and Certification Program Fortinet Continues Commitment to Close the Cyber Skills Gap ortinet® continues to lead the way on training and education in the company’s ongoing efforts to close the cyber security skills gap by rolling out even further expanded training and education initiatives. Recent additions to the company’s education and training programming include additional Fortinet Network Security Expert (NSE) Institute cloud certifications and the offering of its cyber security awareness training at no cost for individuals or organizations seeking to deploy a cyber security awareness training program.
F
The cyber skills gap
A
2019 Gartner survey shows the global talent shortage is now the top emerging risk facing organizations. The expansion of the digital market place has generated more jobs than the current supply of security professionals. Unfortunately, there are not enough skilled humans available to
properly plan, manage, integrate, and optimize security devices, strategies, and protocols. In addition, there is currently not an efficient way to create skilled security practitioners at the same rate. For example, according to a recent workforce development survey, 59% of organizations have unfilled cybersecurity positions, with Frost & Sullivan forecasting a shortfall of 1.5 million by 2020. The Fortinet NSE Institute was created to provide broad-based training that arms participants with a foundational understanding of the threat landscape, as well as the cyber security fundamentals and skills to implement strategies and technical concepts that are in high demand. While the Institute’s flagship NSE training and certification program has issued nearly 200,000 certifications, it is equally focused on education programs such as the Fortinet Network Security Academy program for high schools,
colleges and universities, the FortiVets program that facilitates the transition of exceptional military veterans into the cybersecurity industry, as well as free publicly available awareness training that can be accessed by any company wishing to deploy an internal cyber security awareness program for employees.
Addressing the skills gap at scale
I
n addition to the established company-led training and education programs, a comprehensive training and education strategy must include strategic partnerships within government, academia and NGOs such as Fortinet’s strategic relationships with organization such as the World Economic Forum (WEF) and its Centre for Cybersecurity, the Global Threat Alliance, CompTIA, and various university research programs.
Bridging the gap
This unprecedented shortage in the cyber security workforce has resulted in security operations teams who are over worked and understaffed and it continues to benefit our cyber adversaries. Fortinet is more than a technology company; we’re also a learning organization. Fortinet is dedicated to closing the cyber skills gap and goes well beyond providing training on products and solutions as part of our commitment to deliver a response to the growing global cybersecurity threat – Rajesh Maurya Regional Vice President, India & SAARC at Fortinet 24
SecurityLink India ■ May 2019
I
n today’s global cybersecurity threat landscape, education is crucial to the success of organizations. Creating and executing a strategy with a wide scope can be a daunting task but this is precisely the mandate and strategy of the Fortinet NSE Institute, which was created to provide broad-based training that arms participants with a foundational understanding of the threat landscape, as well as the cyber security fundamentals and skills to implement strategies and technical concepts that are in high demand.
National Roundup
With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.
Soft Facility Management
Hard Facility Management
Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.
Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.
Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.
www.sisindia.com A 5000 crore Indian multinational company
SecurityLink India ■ May 2019
25
National Roundup
to Deploy Advanced Surveillance & Traffic Management System in Gurugram and Manesar
Appointed Master System Integrator under Gurugram Metropolitan Development Authority Project
N
EC Technologies India (NECTI), a leading player in the integration of IT and network technologies, has been awarded a contract as the master system integrator for installing CCTV surveillance and traffic management systems in Gurugram City. Under the project, selected locations in Gurugram will be fitted with a variety of CCTV cameras to perform traffic enforcement and general surveillance across 115 sectors of Gurugram and Manesar. The project was awarded in March 2019 and is expected to be implemented within this year. To support the implementation of a comprehensively integrated video surveillance system, NECTI will set up IP-based outdoor security cameras across various identified locations in the city. The video surveillance system from NEC will help in enforcing traffic discipline through the use of AI-based analytics software such as automatic number plate recognition (ANPR) and red light violation detection (RLVD). The system will monitor traffic junctions and other sensitive areas to identify traffic offenders and issue alarms. Subsequent e-challans (electronic fines) can be issued to offenders who are captured flouting traffic rules with the help of these systems. In the first phase of the project, approximately 1,200 high definition (HD) and ultra high definition (UHD) cameras are expected to be deployed in over 200 traffic junctions, sending video feeds to 26
monitoring centers 24 hours a day. The project will utilize the dedicated optical fiber backbone currently being laid out by the Gurugram Metropolitan Development Authority (GMDA) using robust ring network topology. Cameras deployed in key selected locations will be equipped with facial recognition technology featuring NeoFace Watch, NEC’s flagship facial recognition software platform, to identify persons of interest and other suspicious elements to support law enforcement efforts. Commenting on the occasion, Takayuki Inaba, Managing Director, NEC Technologies India said, “Gurugram, one of Delhi’s major satellite cities, is host to many leading brands and representatives from across the world, and is widely acknowledged as a finance and technology hub. We are honored to be awarded this project and contribute to Gurugram’s smart city ambitions. NEC aims to leverage our global expertise while bringing cutting edge technologies and established best-practices to Gurugram as a master system integrator. We are looking forward SecurityLink India ■ May 2019
to working closely with the Gurugram Municipal Development Authority to create a better society and a safer environment for its residents.” The Gurugram Municipal Development Authority added, “The current population of Gurugram is estimated to be close to 2.5 million and is expected to grow rapidly over the next few years. We need to constantly aim and strive to work towards enhancing public welfare, and NEC’s leading position in the field of public safety is paramount behind our decision to work with them. We are hopeful that the successful implementation of this project will propel Gurugram into an attractive city to live, work and visit.” NEC brings more than 100 years of expertise in technological innovation to provide solutions for empowering people, businesses and society. Headquartered in Japan, NEC started operations in India in the 1950s, accelerating its growth through the expansion of business to global markets. NEC in India expanded its business from telecommunications to public safety, logistics, transportation, retail, finance, unified communication and IT platforms, serving across governments, businesses as well as individuals. With its Centre of Excellence for analytics platform solutions, big data, biometrics, mobile and retail, NEC in India offers innovative new services and solutions for India and global markets.
National Roundup
Matrix Enhances Financial Services of IndiaNivesh With Comprehensive Time-Attendance and Access Control Solutions
I
ndiaNivesh is one of the leading financial service conglomerates in India which is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric and progressive financial group in the country with pan India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India.
Business challenge
I
ndiaNivesh required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. It has been a tedious task for them to streamline and manage attendance data of all employees accurately and perform calculation of error-free salary. Integrating their existing payroll software with the time-attendance software was challenging.
●● Accurate in/ out time of each employee. ●● Live monitoring of in/ out timing. ●● Generation of time-attendance and access control reports and charts for all branches. ●● Improved overall productivity of the organization. ●● Continuous operations with excellent service support.
Offered solution
M
atrix offered COSEC Time-Attendance solution with web based architecture, that can help IndiaNivesh in connecting all its regional and branch offices to their head office in Mumbai. Matrix COSEC time-attendance software can get easily integrated with existing payroll software, and hence it can also help the company in automatic salary calculation.
Result ●● Real-time attendance of all employees at a centralized location. ●● Integration with its existing payroll software. ●● Ease of implementation using the existing infrastructure. ●● Fraudulent time-keeping is completely eliminated.
Products ●● COSEC Door FOP: Optical fingerprint based door controller for access control and time-attendance. ●● COSEC Door CAS: Card based door controller for access control and time-attendance. ●● COSEC Panel: Site controller to manage multiple door controllers and advanced access control features. ●● COSEC LE Platform: Application server platform for 1000 Users and expandable up to one million users. ●● COSEC LE TAM: Comprehensive time-attendance and leave management module for COSEC LE platform. ●● COSEC LE ACM: Comprehensive access control module for COSEC LE platform.
SecurityLink India ■ May 2019
27
feature
On-Site Training An Inescapable Requirement of Security Operations By Col A K Singh (Retd.), Head of Training, APS Group
B
asic training within the framework of PSARA 2005 enables security personnel with just elementary knowledge and hands-on experience of manned-guarding; the induction and on the job training (OJT) take his/ her learning curve to some steps ahead. The litmus test of a security team led by a security officer and supervised by a security supervisor begins in the first shift of the day when the team is left to handle the operations at site independently because they
Mobile Training Vas
28
have no PCK (previous course knowledge). The old hands with previous experience of handling the challenges pop up round the clock at the new site, while the new client generally insists on 100% change over of the security personnel and does not intend to allow them for any retention from the previous security provider. Besides, the security team who forms the frontline of the personnel in the security envelope is always the first one to either become victim/ hostage, or the rescuer in any kind of terrorist strike or emergency. The statistics show that the immediate reaction to the given incident is often characterized by the panic and/ or fear which cast a dim shadow on the security provider, and security industry as a whole. So, how can these situations be avoided? What can aid, facilitate and/ or equip the security personnel to react in a calm, composed, measured and calibrated manner until the responsible authority arrives on the scene? The answer to both problems lies in organizing focused, site specific, realistic and regular on-site training at client site, coupled with daily morning and evening briefing by security supervisor and security officer in charge at site. To set the pace of operations, the security providers must ensure to take certain prior actions before they take over the site. They should bring about survey and security audit of the site to identify risks, threats and vulnerabilities; study the security SOPs of the client for the site, and analyze previous incidents and lessons
SecurityLink India â– May 2019
feature
●● Hold day and night surprise checks and penalize the defaulters to enhance compliance of SOP. ●● Hold sessions to analyze the root cause of past incidents and the preventive measures. The vital significance of the on-site training in running the security operations in an effective and smooth manner is indisputable and needs to be implemented by all security providers to ensure a high level quality of service. In conformity with the industry demand and to keep
Mobile Training Van
APS Mobile Training Van
APS Centre of Excellence
learnt therefrom; put down the post and site instructions in writing with detailed job description (JD) for each post; and make detailed orientation/ familiarization with the peculiarities of the site. The key areas to focus during the conduct of an on-site training to orchestrate response matrix as differentiator are as follows: ●● Drawing out absolute clarity in the roles and responsibilities (PSI) of each man on the ground. ●● Ensuring hands on experience on the entire gamut of the security and safety equipment. ●● Development of demonstrative ability in soft skills, and meet & greet procedures. ●● Mastering continuous flow of info, monitoring, surveillance and reporting procedures. ●● Hold regular mock drills of major emergency handling like fire, accidents, first aid, workplace violence, fall from heights, drowning, earthquake etc. ●● Involve the employees and management in awareness drive on National Fire Safety Day, Women Safety Day, Child Safety Day, Road Safety Day, and demonstrate the expertise of security personnel through the role play technique.
• Fully equipped with state-of-the-art security and safety equipment. • Facilitates on-site training. • Ideal platform for conduct of RPL. • Live streaming of training to the client from site. APS Centre of Excellence
pace with the technological disruptions, the APS Group has custom designed a mobile training van which houses all the essential security and safety equipment, lifesaving first aid appliances, emergency rescue equipment, simulation devices, training charts, and live streaming facility of training being conducted at remote locations directly to the client’s boardroom/ workplace. This innovative and indigenous effort has hit the street with high voltage and is in great demand.
About APS Group
A
PS Group, established in the year 1986, is led by strong, service oriented professionals with vast experience in diverse fields. The company has been persistently expanding vertically and horizontally since its inception. Certified under ISO 9001:2008, APS Group provides smartly uniformed, well-supervised, strongly trained and very competitive personnel through a wide network of over 113 branches spread across the country, consisting of a work-force of over 13000 security personnel. SecurityLink India ■ May 2019
29
feature
Digital Infrastructure Vs Cyber Threats By Cdr Sudhir Kumar (Retd)
I
t is indeed not only a current fact but also an unavoidable need that no country or economy can survive and progress without having a resilient and robust digital infrastructure as a backbone to support its ecommerce, health, education, agriculture, manufacturing and all service sectors. However more a country has the exposure to digitalisation, more commensurate risk is manifested by virtue of a spurt in probability of cyber and hacking attacks as vulnerabilities or point of intrusion (PoI) multiplies. It is also reported in a study carried out by Huawei that artificial intelligence (AI) could almost double the value of global digital economy to $23 trillion by 2025 from $12.9 trillion in 2017. However, the worldwide scarcity of AI talent is a challenge and threat to this growth. So, a strong cyber security defence for digital infrastructure is a top priority for each country.
Latest updates & serious incidents ●● One of the reports in the Washington Post stated that Chinese government hackers have stolen highly-sensitive ‘top secret category’ files on underwater warfare. The files include the data that pertains to a supersonic anti-ship missile meant for the use on US submarines. Though the Chinese Embassy in the US has denied any such incident, it is reported that hackers targeted a contractor who works for the Naval Undersea Warfare Centre, a military entity based in Newport, Rhode Island. As reported, it was related to the project called ‘Sea Dragon.’ So, it is one of the most serious incidents of hacking so far as it has a potential that could bring two countries at loggerheads against each other with serious consequences. One can look at this incident as to what kind of pursuits/ measures shall be taken forward in times to come. 30
●● People all over the world and now even in India are chugging data like never before. In just last three years, the use of data in India has increased fifteen times. It stood at 4GB per capita on 31 December 2017 which within a year rose to 5.5GB per capita by December 2018. Data has become cheaper and faster. India provides data globally at the cheapest rate and its expansion is fastest. Cyber threats have also increased in the same proportion as hackers do spend energy and resources to remain ahead to the counterparts who design improved defence processes and technologies to counter. ●● About 500 million Indians were online in 2017 and the rate is growing exponentially. The Indian annual growth rate is about four times of the global average which is just 3%, even though India is still considerably underpenetrated compared to China and USA. Half of these online Indians usually make use of social media platforms while about 40% use e-mail and search. It is expected that e-commerce business in India shall become nearly $130-140 billion by the end of 2020. Indian digital economy itself is expected to be about $1 trillion by 2024, and hence, this volume of business shall also be at risk caused by cybercrimes and hacking attacks. ●● In a sensational case, CBI booked unknown officials of the National Stock Exchange (NSE), Securities Exchange Board of India (SEBI), the promoter of a stock-trading company OPG Securities, and an economist and former consultant in the finance ministry for manipulating NSE software to get prior access to the markets after opening, ahead of other brokers by some seconds, to make gains in trade. It is just to make out how serious such incidents could be as it offers serious challenges to a market place globally that deals in trillions of dollars every day.
SecurityLink India ■ May 2019
feature
●● The researchers have discovered a way to crash a person’s desktop or laptop simply by playing a sound through the device’s speakers. Such techniques could disrupt surveillance systems and sabotage medical devices. It has been published by a US and a Chinese university with details of their findings in a paper titled ‘Blue Note: How International Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.’ This discovery is the latest in a long line of methods available to attackers to crash devices remotely, which include symbols and messages sent by a text message or other messaging apps. ●● There is a new crypto-jacking cyber warfare where the injected malware infiltrates target’s systems and converts computers into zombies. In doing so the primary intention of hackers is not to steal information but to mine crypto currencies. It was used against nearly 2000 computers of Aditya Birla Group. One of the symptoms noticed during the attack was of slowing down of the machines. The digital currency that was mined in this attack was Monero. This currency is virtually untraceable and believed to be more anonymous than Bitcoin, the best known crypto currency which experienced huge volatility amid regulatory crackdowns and strong interest from wealthy investors who chose to diversify beyond conventional securities and central bank-backed dominant fiat currencies like dollar and euro. ●● A team of Dutch security researchers recently unveiled some new findings regarding ‘Rowhammer,’ an unintended side effect in DRAM chips that can be used to tamper with an entire computer which could be an effective way to hijack any smart phone. Though Google says that it is still a theoretical concept and not yet used in any attack but it is for sure that the smart phone manufacturers have to use a permanent fix for the same while incorporating them in designs. ●● It is also a fact that the first native blockchain mobile phone by the HTC has been unveiled as HTC-Exodus. The Android powered Exodus device features a universal wallet and hardware support for all major crypto currencies like Bitcoin and Ethereum, and decentralized apps. So, one more new challenge is on the horizon. ●● Though GDPR has been put in place by EU and Justice Krishna’s report on data protection in India is out but there is a lot that needs to be taken care of, and such laws are to be constantly improved and updated keeping pace with
No country or economy can survive and progress without having a resilient and robust digital infrastructure as a backbone to support its ecommerce, health, education, agriculture, manufacturing and all service sectors. However more a country has the exposure to digitalisation, more commensurate risk is manifested by virtue of a spurt in probability of cyber and hacking attacks as vulnerabilities or point of intrusion (PoI) multiplies the developments in order to remain in safe environment in this digital world. The dark net brings huge amount of challenges as it has become a source of inspiration to many for making quick bucks. A disgruntle senior programmer from an Israeli Spyware developing company was caught recently after he stole its malware, and tried to sell it on the dark net as he got lured by an opportunity to make money the fastest way. It provides a host of new threats to the security of the nation and its establishments. So, India needs to bring in and develop a huge indigenous R&D infrastructure in the quickest time span in order to address the emerging challenges of cyber security threats. ●● The Department of Telecommunication, Government of India has unveiled the National Digital Communications Policy, 2018 which aims to attract investments worth $100 billion by 2020 in the sector, so that it can contribute 8% to the GDP. The IT Minister says that India shall have a $1 trillion Digital India worth by 2025. The GoI has also plans to digitally connect each house in villages, and public institutions such as post offices, police stations and schools. There are plans to connect 2.5 lakh villages by March 2021 as 1.25 lakh have already been connected through Bharat Net. There are also plans to create 10,000 Wi-Fi hot spots by the year end and it shall provide an opportunity to a new stream of public data offices (PDOs) providers. So, there are ambitious plans by the GoI in times ahead and India has 400% increase in the mobile net connectivity in past two years which is
SecurityLink India ■ May 2019
31
feature
About 500 million Indians were online in 2017 and the rate is growing exponentially. The Indian annual growth rate is about four times of the global average which is just 3%, even though India is still considerably underpenetrated compared to China and USA. Half of these online Indians usually make use of social media platforms while about 40% use e-mail and search. It is expected that e-commerce business in India shall become nearly $130-140 billion by the end of 2020 unprecedented in the world. This needs commensurate efforts towards creation of cyber defence for India with a strong R&D infrastructure. There are so many new tools of business intelligence for data analytics, and some of them have inbuilt provisions whereby data of an organisation or a bank or any other GoI offices could be compromised. The integrated security solutions backed by state-of-the-art centralized command & control centres for 100 smart cities mission of India also has huge responsibility to lay fibre optic cable based infrastructure for the connectivity and IoT. ●● Indian public cloud services revenue was projected to grow 37.5% in 2018 to $2.5 billion, up from $1.8 billion in 2017, and it surpassed the target. The growing segment is ‘Infrastructure-as-a-Service (IaaS).’ The Business Process-as-a-Service (BPaaS), Platform-asa-Service (PaaS), Software-as-a-Service (SaaS), cloud management and security services are already contributing to the digital spread underway in India. It is indeed a fact that India does not have a befitting cyber security infrastructure as of now and a lot needs to be done in that direction, not only by the GoI but by the cyber security providers as well. Physical and electronic security providers have to venture into it as there is a need to have seamless security solutions as offerings to consumers to meet such challenges. 32
Conclusion
T
he popularity of virtual currencies has grown, and hackers are focusing on a new type of heists i.e., putting malicious software on people’s handsets, PCs, TVs and smart fridges, and other smart gadgets that make them mine for digital money. Crypto-jacking has become a growing problem in the cyber security industry, affecting both consumers and organisations. It has been noticed that the electricity bills of some companies grew in thousands of dollars as their systems were used for mining crypto currencies. Hackers try to use victims’ processing power because that is what’s needed to create or mine virtual currencies. In virtual currency mining, computers are used to make the complex calculations that verify a running ledger of all transactions in virtual currencies around the world. There were about 1,46,704 such incidents in September 2017 and that grew to about 22.4 million in December 2017. So, one can make out what speed cybersecurity challenges are increasing day by day. We need to think as security providers in India how best we can run this race and meet such challenges? As of now the homeland security industry in India is lacking not only in efforts but also in will to take on such challenges. Skills are scarce and there are no plans to either acquire or upgrade at a scale needed. No one wants to take the onus. It is a fact that internet users will beat TV globally by next year. An average person spends about eight hours a day on its use i.e., about 479 minutes, and close to 3,000 hours by this year end. It shall touch to nearly 492 minutes a day in 2020. The growth in India is no different as Indian population love technology upgrades and their favourite toy as on date is mobile handset with fastest internet services on it. But they ignore security features and we in the industry forget to ensure safety against cyber and hacking attacks. There was a time when people came to India because business was lucrative, the land was lush, the rulers were liberal about expats and the standard of living was good. India is going to provide all these shortly but with additional free field to cyber crimes and hacking attacks if adequate measures are not put in place against cyber crimes and hacking attacks on its digital infrastructure. There is a need that India brings an India International Institute of Excellence in Cyber Security Defence at a suitable central place at New Delhi at the earliest.
SecurityLink India ■ May 2019
feature
Securing Nation from
Internal | External | Eternal
Risk & Threats
5
th PolEx
DRONE
TM
INTERNATIONAL EXPO www.droneinternationalexpo.com
www.internationalpoliceexpo.com
&
&
INDIA HOMELAND SECURITY EXPO
cctvExpo www.cctvexpo.com
4
th
www.homelandsecurityexpo.in
Two Indispensable Exhibitions On Police, Central Armed Police Forces, Army, Navy, Air Force, Defence & Internal Security
Two Exhibitions On Drones & Unmanned Systems, CCTV, Access Control & Surveillance
19 20 JULY 2019 Pragati Maidan, New Delhi
For Space Booking & Other Details Please Contact:For International Police Expo & India Homeland Security Expo:
For CCTV Expo:
For Drone International Expo
Mr. Ashish Gupta
Mr. Subhash Bhatt
Mr. Mukesh Kharia
(+91) 7533018555 ashish@nexgenexhibitions.com info@internationalpolicexpo.com /in/policeexpo
(+91) 7533018444 subhash@nexgenexhibitions.com info@fsdexpo.in in/fsd-expo/
(+91) 8285009906 mukesh@nexgenexhibitions.com info@droneinternationalexpo.com company/drone-international-expo/
SecurityLink India â– May 2019
33
white paper
Best Practices for Video Storage Infrastructure Systems must be carefully thought out to ensure crucial data isn’t lost
S
uccessfully recording video from hundreds of security cameras 24 hours a day, seven days a week without losing a single frame is a very complex challenge. If that wasn’t tough enough, your system also has to allow for future growth and show that it’s reducing your claims and/ or shortening response times. Video surveillance is becoming more and more important as perceived and actual physical security threats increase worldwide. Hardware and solutions proliferate even as budgets have flattened or turned downward. Whether you’ve been a security professional for decades or your IT department just inherited video surveillance, there’s a morass of technologies to wade through to find the right components. This white paper focuses on how to specify video storage, how video is unique in the world, and why systems must be carefully thought out to ensure crucial data isn’t lost. Central to the discussion is a review of the trio of storage technologies – Direct Attached Storage (DAS), Network Attached Storage (NAS), and Storage Area Network (SAN). Before diving into the details of each of these technologies, let us look at some broader considerations to have in mind while writing video surveillance system requirements for your building, complex or campus.
Important considerations for building and upgrading surveillance systems
Y
ou spend hours Googling ‘surveillance systems’ or an entire week at a trade show and easily come away confounded by the plethora of security hardware, software and services. In this first section, we outline the problem and a few considerations to keep in mind while developing the requirements for your physical security system.
ments are demanding more and better physical security. ●● Surveillance options are growing in number and capability. ●● The growing camera population (with ever higher resolution) is creating a flood of data. ●● Cameras never stop recording and what they ‘see’ must be stored somehow. ●● Despite event-driven spikes, security budgets have generally declined in recent years.
The conundrum of surveillance
T
hirty years ago, you simply went out and bought some cameras, coaxial cable and a VCR. Now, all the components are digital. The surveillance conundrum is clear to anyone who follows the news: ●● Threats (real and perceived) are growing. ●● In response, the public, private companies and govern34
A growing demand for surveillance eyond public security, there’s an ever-growing demand for video surveillance inside and around banks, casinos, school campuses, hospitals, hotels, transportation hubs and highways, railways, harbors, factories, power plants, refineries etc. Of course, many of these systems
B
SecurityLink India ■ May 2019
white paper
can serve a dual purpose such as speeding up ferry departures based on traffic conditions, remotely-monitoring trucks as they’re being loaded, or alerting hotel staff of a VIP’s arrival.
can also run all the software and storage on virtual machines.
With the edge getting smarter, it is the
Ever-improving cameras mean ever-growing data time that the backend Infrastructure gets streams smarter too. With ML & AI being deployed hether you are seextensively, data is the ‘new gold’ and its Analytics: The shift to digital curing a small oftransforms watchers into fice or large factory camreliability needs to be addressed as well actors pus, now that cameras are Prakash Prabhu ci-fi and action films digital, you’re able to take Regional Sales Director – SAARC, Pivot3 may offer windows into advantage of Moore’s Law the future of surveillance, and watch prices droping as but today you can tap into sophistication soars. However, a lower price also suggests the temptation of buythe wealth of information found in the real world. When ing more. Better capabilities (like high-definition) offer tied to biometric reads (such as iris scanners) and using better detail in a wider range of light conditions. With a behavioral analysis algorithms, video surveillance systems can now monitor numerous real-time scenes and 180° or 360° view, one camera can do the work of several automatically respond with say – a coupon to a shopper analog eyes. For example, the wide angle can enable you who shows interest in a particular shirt, or an alert to unuto watch an entire parking lot, then pan or zoom electronically to read a license plate or see a face. The downside sual activity in a subway station. With automation, human is such cameras require a huge amount of network bandeyes aren’t needed for the mind-numbing task of watching a bank of video monitors. Personnel can instead focus width and storage. As the name suggests, each IP camera has its own on stopping a bad guy in the act, correcting a problem, IP address and connects to the network with a standard anticipating a need, or providing a service. In fact, advanced users are turning their surveillance data from cost RJ-45 jack. It often has a built-in web server, email clicenters into cash. ent, FTP client and supports Power-over-Ethernet (PoE) standards. As IP cameras become more sophisticated, Digital equipment and software they’re able to stream to more than one destinations; perhe shift to digital has also changed the way video surveilform more processing and analytics; and make adjustlance systems are built. Instead of endless ‘home runs’ of ments for changing environmental conditions (such as coaxial and power cables from a control room to each camera, rain or fog) and lighting changes; and reduce frame rates IP (Internet Protocol) cameras and monitors can be networked if a scene is unchanged (thereby lowering bandwidth and just like computers. Cameras can even be powered by the same storage loads). Ethernet cabling that transmits their video data. System performance is measured in terms of how many Today’s video surveillance systems typically have at cameras or video streams can be delivered without dropleast one computer server running video management ping frames. Camera and video management vendors use software (VMS). The VMS enables users to control the the combination of: cameras and monitors, as well as search archived ‘foot●● Number of channels supported: a ‘channel’ is one age’ in storage. Storage can either be inside the VMS camera viewed by one or more people. server (as DAS in a NVR) or in a separate storage device ●● Image resolution: 1.3 megapixel (720p), 2 megapixel on the network (NAS or SAN). Computer processing and (1080p) etc. storage infrastructure software underlies the VMS appli●● Frames per second (fps): The higher the fps, the better cation layer, ensuring that all your equipment is working is the video quality. as it should, with little or no administrative burden. You ●● Compression method: MPEG-4, H.2647, H.265.
W
S
T
SecurityLink India ■ May 2019
35
white paper
Network bandwidth
IOPS (input/output operations per second) is a term you’llcameras frequently # of megapixel (MP) hear in storage streaming simultaneously
1.3 MP
3 MP
5 MP
10 Mbps
2
1
1
100 Mbps (fast Ethernet)
23
13
10
1 Gbps
230
130
105
10 Gbps
2,300
1,300
1,040
A camera with a 180° or 360° view contains several lenses and sensors. Onboard software stitches multiple images together to look like one. A 180° camera with five lenses can generate five times the data of a single lens camera
How is Video different? ●● Surveillance cameras never stop streaming content. This reality is a complete reversal of what most traditional storage solutions are designed to accommodate. ●● Video content is constantly being written to disc (recording). Most other types of digital content are read-intensive. ●● Write-speed is crucial in video storage. In ‘normal’ IT environments, storage devices are optimized for quick reads (providing files to users). Video playback is infrequent, occurring only when there’s been an incident that requires review. ●● Video’s volume is huge and fluctuates with activity. ●● A large amount of bandwidth is crucial in video surveillance systems. It must be able to handle huge traffic spikes (called pixel storms) caused by an increase in scene activity (such as a classroom change). ●● When a video surveillance system becomes overwhelmed, it simply drops frames or entire video streams with no warning. Why? Because the content never stops coming. In a normal IT datacenter environment, when the system becomes overwhelmed, users experience slow response times. With video, the only options are to drop the frames/ video or not to store it. Users become aware of this silent form of data loss only when they are trying to retrieve the content days later. How can your organization respond without this vital evidence? Networks: Streaming video from here to there P networks are indifferent to the kind of data that moves through them. Like a highway, a network is all about volume. How much traffic can you move back and forth? Performance is measured in bandwidth – what’s the throughput capacity available to move data?
I
36
Streaming Video from Here to There: Networks Likeare traffic lights, also have IP networks indifferent to theIP kindnetworks of data that moves throughrouters them . Likeand a highway, a switches. Performance is much measured byyou themove number of packets network is all about volume: how traffic can back and forth? Performance is a device can direct perthe second andcapacity the latency for measured in bandwidth: what’s throughput available(delay) to move data? each packet as it moves through that device. Like traffic lights, IP networks also have routers and switches . Performance is measured by Overall system performance is measured by the number the number of packets per second a device can direct and what the latency (delay) is for each of cameras or video streams the surveillance system can depacket as it moves through that device . liver to live monitors and storage without losing frames or an Overall performance is measured by the number of cameras or video streams the entiresystem stream. surveillance system can bandwidth deliver to live monitors and storage without losing frames Beyond pure and latency considerations, just or an entire stream . how are you going to power your remote cameras? Using the Power-over-Ethernet (PoE) standardjuston 1Gbps wired Beyond pure bandwidth and latency considerations, howa are you going to power your network, youUsing canthe kill theover networking and poweronbirds remote cameras? Power Ethernet (PoE) standard a 1Gbpswith wired network, onecanstone. you kill the networking and power birds with one stone .
Pharamaceutical Marketing
OF DE CE U T N I GN LIA MA OMP C
Government
COST OF DATA LOSS
Retail
COMPLIANCE FACTORS
Gaming
• Regulatory Requirements • Liability Exposure/Risk • Industry Standards
15 DAYS
60 DAYS
90 DAYS
365 DAYS
The Value of Video Evidence is Highest in the First 24-48 Hours
The value of video evidence is highest in the first 24-48 hrs When there’s an event, you want to be sure that your system captures it, and that your team hen there’s an event, you want to be sure that your has immediate access to it . Be sure to specify a system that has failover capabilities measured system captures it, and that your team has immediate in minutes, not hours . The longer your system (or a crucial component) is down, the less likely access to it. Be sure to specify a system that has failover you’ll be able to apprehend a suspect . capabilities measured in minutes, not hours. The longer your Likewise, value video surveillance evidence whenlikely it’s required for systemthe(or a ofcrucial component) isdeclines down,over thetime less regulatory or legal Make sure that the system you specify protects adequately you’ll be ablecompliance . to apprehend a suspect. againstLikewise data loss forthe the retention period your organization is required to follow . value of video surveillance evidence de-
W
clines over time when it’s required for regulatory or legal compliance. Make sure that the system you specify protects adequately against data loss for the retention period your organization is required to follow. Strict budgets demand flexible tools hen you’re reviewing the cost of your video surveillance system, look at the total cost of ownership over a five-year period. How flexible will the system be as your needs change over time? Can you incrementally add to the
W
SecurityLink India ■ May 2019
6
6
white paper
system or will you be required to replace major components? Can you justify a higher capital expenditure if the system costs less to maintain, is easier to use, or ensures that when you’re looking for footage a month after an incident, all the frames will be there?
Storage technologies
A
bout one-third to one-half of the total cost of your video surveillance system is incurred by the storage equipment and administration. There are several ways that you can capture streaming video for safekeeping. This section describes three very different storage technologies you’re likely to run across in your research and discussions. First, however, a brief history on the development of the boxes called ‘recorders.’
A brief history of video recorders
V
ideo cassette recorders (VCRs) record analog video and audio on a magnetic tape. Television stations began using them in the mid-1950s, and the first home video recorders were introduced a decade later. By the late ‘70s, they became a mass-market product. With improved equipment, longer recording times and lower costs, VCRs were quickly adopted by the surveillance profession, and reigned supreme for more than two decades. DVRs are VCRs with captive digital storage y the early 2000s, digital video recorders (DVRs) had dropped in price enough to begin outselling VCRs. DVRs control one or more cameras and record an analog video and audio feed on some kind of digital media (DVDs, hard drives, and/ or flash drives). Despite their widespread popularity (they’re relatively cheap), DVRs have a number of shortcomings: ●● Bandwidth is fixed. When you run out of physical ports, you’ll have to buy a second box. ●● Storage capacity is fixed, and captive. Data cannot be shared with other DVRs. ●● Access is restricted. To search for and review stored content, you must be at the DVRs. ●● Reliability is very limited. When a DVR breaks down, there’s no automatic failover. It simply stops recording.
B
NVRs: Computer servers running Windows network video recorder (NVR) can be thought of as a souped up DVR. NVRs work with IP cameras and offer more features, more throughput, and can handle a greater
A
number of cameras than DVRs can. With the falling prices of IP cameras and NVRs, both have been gaining popularity in the last few years. An NVR can be a box (thus sharing the same limitations of 1980s as its DVR cousin), or it can be software-based – loaded on a Windows based computer server and connected to external storage. However, given the higher cost and complexity of software-based NVRs, most ‘solutions’ come in the form of self-contained boxes with internal direct attached storage (DAS). Software-based recorders offer reliability and scale n the late 2000s, several vendors began to take advantage of the obvious shortcomings of DVRs and NVRs and introduced competing software-based video processing and storage systems. This software is loaded on virtual machines, which in turn are hosted on commodity computers. The approach takes advantage of the substantial advances enterprise IT has made over the last two decades, by allowing many users and devices to share resources over a network. When the system is specifically designed for video surveillance, it turns out to be particularly robust, flexible, scalable and reliable. For example, when a single hard drive fails (which they do!), your system can be built to ensure your critical evidence doesn’t go with it. If you want to add more cameras, you can. When there’s a blizzard of activity, the system has a much better chance than a DVR or NVR of capturing every frame amid the pixel storm. Now that you’ve reviewed different video recording form factors (boxes), take a look at the following sections and the varied approaches to actually storing a video stream.
I
Direct Attached Storage (DAS)
D
AS is, as it sounds, the storage that is found inside a DVR or NVR box. (In fact, an NVR is often called a ‘DAS recorder’). Without question, DAS is by far the most dominant storage type used in video surveillance. Why? Because onboard storage is a simple concept, and bundled storage inside a DVR or NVR appears, at first, to be inexpensive. Performance is very high because the data is close to where the user is. (Latency is very low) However: ●● DAS is designed for small facilities requiring only a handful of cameras. Some folks attempt to circumvent this inherent restriction by placing several DAS systems in the same control room, with each machine tied to a different collection of cameras. However, this approach creates far more problems than it solves.
SecurityLink India ■ May 2019
37
white paper
●● Storage capacity is fixed and captive. Upgrades or expansions usually require replacing systems, rather than simply adding to them. If you have a small facility that only requires a handful of cameras and you know that your storage capacity requirements are fixed, then DAS may be the way to go. The remaining questions are: ●● How valuable is your data? ●● How accessible do you need your data to be?
Network Attached Storage (NAS)
N
AS was developed in the early 1980s as a way to share remote file access with a number of networked client computers. Businesses and government agencies quickly saw the benefits of sharing information and resources (infrastructure, servers, printers etc.) among their employees. Over the next two decades, the use of NAS systems proliferated as IT departments stitched together ever-growing and changing organizations and teams of employees. NAS systems are perfect for IT environments – they’re designed to record data in a file format, and perform very well for typical office applications like word processing, Whitepaper Best Practices email and accounting. To understand whyfor Video this Storage core Infrastructure design feature is problematic for video, it’s necessary to dive a bit below the surface to see how NAS works. A dominant protocol for communicating with NAS storage devices is the Common Internet File System (CIFS – usually for Windows-based machines). This network proA SAN server also makes storage tocol enables a client computer available (say, an PClevel . or workat aNVR, lower block (The file system is only found on the station) to manipulate a storage device’s files as though they clients .) This design is perfect for capturing streaming video, enabling were on the local machine. the data to go from the camera CIFS works by sending packets from theandclient through the network directly toto a the storage, without server. The server then checks togeneralized see if pool theofrequest is legal, interruption . verifies that the client has the appropriate file permissions, As you can a guess, putting all ofpacket your executes the request, and then returns response to data storage eggs in one basket the client. The client reviews themeans response packet toto deterthat SANs are engineered be: mine whether the initial request was successful. • highly available (reliable): must All of this back-and-forth traffic is necessary for users be able to withstand component failures without interrupting who are creating, editing, sending, receiving, and access deleting or losing data files such as documents and email. In the case of video re• highly scalable: capacity and input/ cording, however, the additionaloutput traffic takes up crucial performance (bandwidth) must be able to grow as you bandwidth and only impedes performance. NAS add requires greater load (cameras) and SAN that all writes to storage access anstorage additional layer (the storage device’s file system). In addition to creating increased network traffic, this extra layer has another hidden cost – file fragmentation. 38
In surveillance systems, numerous video streams are continuously writing to the NVR, forcing the file system to constantly re-allocate space on the hard drives. As a result, fragmentation is much worse than what normally occurs in a normal IT environment. While some systems allow continued operations while defragmenting processes are underway, they nevertheless experience major performance issues which can result in dropped frames or video streams. Despite these drawbacks, NAS offers some important advantages over DAS: ●● Video data is more easily available to you and your colleagues (since it’s on a network). ●● NAS can also scale much better than DAS.
Storage Area Network (SAN)
W
hile NAS offered IT users widespread network access to data, each application server still had its own internal storage device. In effect, this created ‘islands’ of storage that proved cumbersome to access. In the mid-1990s, NASA began to research clustering several application servers together on a network with a shared pool of storage. By 1999, several vendors were offering SANs to the commercial IT market. Thought-leaders began defining a SAN as a specialized high-speed network that creates universal storage connectivity for all the storage devices, servers and client computers. This behind-the-scenes network enabled SANs to have seamless consolidation (and sharing) ofseamless storageconsolidation space, makThis behind-the-scenes network enabled SANs to have (and sharing) ing them efficient their competitors. of storage space,much makingmore them much morethan efficient thanNAS their NAS competitors .16 Rather than creating several islands of information as in NAS:
SAN presents an entire pool of storage to every server and client:
CLIENTS
CLIENTS
Client Access LAN Storage
Client Access LAN
Storage
Storage Application Server A
Application Server A
Application Server B
Application Server B
Application Server n
Application Server n
Storage Area Network (SAN)
No matter how many storage devices you add to a SAN, cameras and other devices ‘see’ them as one destination.
Storage Device
Storage Device
Storage Device
All servers to storage devices
Fibre Channel SANs Fibre Channel SANs n answer to the highly-scalable requirement, the first In answer to theused highly-scalable first infrastructure. SANs used a Fibre Channel (FC) SANs a Fibrerequirement, Channel the (FC) Its fib-
I
infrastructure . Its fiber-optic cabling and switching provided a much faster and more reliable storage access than NAS’s higher-level file system protocols . Indeed, FC SANs proved to be SecurityLink India ■ May 2019 superb tools for applications like online transaction processing and providing access to big
white paper
er-optic cabling and switching provided a much faster and more reliable storage access than NAS’s higher level file system protocols. Indeed, FC SANs proved to be superb tools for applications like online transaction processing and providing access to big databases. Unfortunately, the cost and complexity of FC SANs (not to mention the advanced storage administration skills and certifications needed to install and configure them) largely restricts them to the datacenters of Fortune 1000 companies and large governmental agencies. iSCSI SANs he basic SAN concept was enticing to a much wider market. after all, who wouldn’t want the kind of scalability and reliability that the technology offered? In the midto late-2000s, several start-ups developed iSCSI SAN, which used IP over a one gigabit Ethernet network to interconnect the storage devices. Today, iSCSI SANs on 10 gigabit per second Ethernet (10GbE) offer the same benefits (very high reliability, storage capacity and bandwidth) without the high hardware and administration costs of FC SANs. As a result, iSCSI SANs have made huge inroads into the IT datacenter market, displacing FC SANs at the high end as well as NAS in the small and medium-sized business market. However, their inherent design (perfect for a general-purpose IT environment with lots of small, random inputs and outputs) requires you to greatly over-provision them in order to manage the constant barrage of incoming video from hundreds or thousands of sources. Fortunately, a newer, much more flexible technology is available that offers pooled resource benefits of an iSCSI SAN without requiring the sizable capital investment and operating expenses of a six-foot tall, 1,500-pound machine.
T
Snapshot comparison of storage technologies
S
o, how do different technologies compare in a video streaming environment?
Consideration
DAS
NAS
SAN
Reliability
Low
Moderate
High
Level of fault-tolerance protection
Low
Moderate
High
Storage
Captive to the box
Storage device ‘islands’
Pooled storage
Capacity
Fixed
Moderate
High
Scalability
Requires hardware replacement
Add additional NAS devices
Add new hard drive trays, with additional control units
Input/ output bandwidth Capacity
Fixed
Moderate
High
Scalability
Requires hardware replacement
Moderate
Moderate
File system fragmentation
N/A
Yes
N/A
Datacenter SANs vs. SANs optimized for video
I
f you’ve decided to take a look at SANs for your surveillance system, keep in mind that your business use case is very different from what most IT departments are trying to solve. Consideration
Datacenter SAN
Video Surveillance SAN
Workload optimized for
Short-block, 80% reads, maximizing cache-hit ratios and fast IOPs.
Streaming data ingest and 95% backend writes.
Bandwidth scalability
Speed is critical to fast reads, so the system should be able to scale up.
Aggregate bandwidth is important, so the system should be able to scale out.
Disc drives
Rotation (read) speed is important.
Spindle count (number of drives) is important.
Performance for video
Poor
Excellent
Scale up Vs. Scale out he point about bandwidth scalability is worth further discussion. A traditional IT SAN is a scale-up not a scaleout model. What that means is that the SAN has a single control unit (which may include some redundancy) with a fixed amount of bandwidth. That’s why IT storage SANs have ‘kneeof-the-curve’ performance issues, meaning that they can’t balance the bandwidth available on that one controller with the capacity demands of a growing storage backend. A video-optimized scale-out SAN adds bandwidth with every new set of hard drives. This feature is critical for handling all the streams your hundreds or thousands of cameras are sending.
T
SecurityLink India ■ May 2019
39
white paper
Simply put, make sure that the SANs you are researching are optimized for video surveillance.
Benchmarking performance
I
f you want to compare the performance of the various technologies that are in the marketplace, be sure the tools and configuration you use are designed to measure and mimic the unique requirements of a video surveillance environment. As you might guess, many of the benchmark tests measure aspects that are important to IT datacenters (such as IOPs), while overlooking problems that occur after a few weeks of normal video surveillance use (such as heavy disc fragmentation). For video surveillance systems, some important benchmarks include: ●● Before beginning your tests, the system must have a failed drive or storage component. A degraded system sets the maximum input/ output you can expect in a real-world situation. ●● What is the number of frames per second recorded as cameras are added to the system? ●● At what point does the system being tested begin dropping video frames or streams? ●● How well is the bandwidth utilized? Can you add bandwidth as you add cameras and storage? ●● What happens after the disc storage system is ‘aged?’ Do the discs become fragmented? ●● What is the expected failure rate for the system’s disc drives? ●● What happens when more than one hard drive fails in an array? Does the system still operate at its rated performance?
Emerging technologies
A
s previously mentioned, virtualization software allows you to host several virtual CPUs on a single box. The technology has enabled administrators to consolidate enterprise IT resources considerably, saving equipment and power costs. One emerging technology, called hyper-convergence, takes virtualization a step further. It abstracts the CPU and the other computer infrastructure components within a single machine – RAM, storage, and network cards. What if, you could virtualize computing, networking, memory, and storage resources across more than one physical machine? As your surveillance needs grew, you could incrementally grow your general pool of video storage one 3.4-inch tall (2U) server appliance at a time. 40
The main reasons that enterprise IT adopted external network storage technologies in the 1990s were a lower total cost of ownership (TCO), a much higher performance and reliability, and a lower administrative burden. With the right network storage, properly tuned to the unique properties of video, all of these advantages are available to the surveillance community.
Recommendations
T
his white paper touches on the growing demand for and sophistication of video surveillance, and how those facts have completely transformed the surveillance landscape. DVRs and NVRs with DAS proliferated because they were simple ‘digital’ replacements for disappearing VCRs. Yet, those systems cannot offer the scalability, bandwidth, and reliability that surveillance professionals demand. At first glance, it seems clear that NAS’s design is perfect for IT datacenters (and day-to-day business applications like word processing and email). However, that doesn’t mean it’s a good fit for video. NAS’s ‘islands of information’ and inherent file system layer creates additional traffic on the very network you’re trying to optimize for video data recording. To ensure you spec the kind of video system that you and your surveillance team can depend on: ●● Begin with the physical requirements – what rooms, buildings, perimeters, and campuses do you need to cover? ●● How critical is your video data to your mission? If you need high reliability, scalability and data protection, study the available iSCSI SAN options. ●● If initial equipment cost is your top priority, DAS looks like a sound investment. However, DAS presents significant limitations such as fixed, captive storage capacity and an inability to scale. Look instead at your total cost of ownership budget over a period of five years. (Equipment, additions, licensing, operating expenses, maintenance and administration). ●● Find an integrator who understands your business and is willing to work with you to assemble the best, most cost-effective system for the long haul. ●● When comparing and benchmarking systems, make sure that you replicate your own video streaming environment as closely as possible.
Pivot3 Continuing Education
SecurityLink India ■ May 2019
white paper
SecurityLink India â– May 2019
41
Application/ case study
Hospital Security Why Access Control Should be at the Center of Strategy
W
hen we think about ourselves or a loved one becoming injured or ill and needing professional care, we’d like to envision a hospital or healthcare facility as a place that is welcoming, comforting and safe. In times that we’re most vulnerable, we should be able to feel confident that the room we’re in is located within a secure and organized environment.
But the reality is that hospitals face a variety of challenges when it comes to streamlining security and mitigating risks, just as other types of large, complex campuses do. With so much ground to cover and people constantly entering and exiting the building, directors of security at hospitals tend to grapple with various concerns such as: ●● Visitor management. At the core of any hospital is the goal of creating an open environment that encourages healing and patient support. But this often means hundreds of ingress/ egress points, varying levels of access and the possible exposure of patient data. ●● Cybersecurity. The aforementioned personal data that hospitals obtain on a daily basis is unfortunately subject to breaches and cyber attacks, especially as the connected network continues to grow and become more complex. These facilities must also adhere to specific privacy laws and regulations, adding another layer to the mix of requirements. ●● Variance. There are often many tasks and processes 42
being performed in a hospital at one time – from controlling contagious diseases to restricting sensitive areas to rushing critical patients around, there’s no doubt that the element of uncertainty can lead to chaos.
Access control in hospital security
T
o manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, security directors must look to implementing integrated and innovative security solutions; and one of the most important components of any system that’s deployed is access control technology. Utilizing an access control solution enables hospital security officials to break down the facility’s overwhelming size into controllable, role-based zones that come together within one common platform. Access control encompasses not only main entrance doors, but also internal entrances and exits based on location and access level – meaning all methods for going in, out or throughout the facility can be actively monitored. Most importantly, hospitals demand a security system that can withstand the large volumes of traffic generated each day without disrupting critical functions. A traditional key-based system will struggle to keep up with this level of activity, but taking advantage of a more advanced solution, such as Vanderbilt ACT, can provide numerous benefits.
SecurityLink India ■ May 2019
application/ case study
Lockdown functionality
I
n the event of an attempted unauthorized entry or emergency incident, it is paramount for hospital security officials to be able to control access quickly and efficiently. Access control systems allow these organizations to ensure security with the push of a button, as well as remotely and instantly obtain real-time monitoring, user management and administration.
Flexibility
W
ith the many moving parts hospitals must manage, scalability and flexibility are key to maintaining a secure facility. An access control solution can help security officials constantly adjust access rights based on numerous characteristics such as areas of practice and likely working hours. Former employees can also immediately be removed from the system, eliminating the possibility of a threat.
Restriction
D
ifferent hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and an access control system can make this process easy. Sensitive materials such as narcotics or sterile environments, can be given added protection, and medical files or controlled substances can be protected with electronic access-controlled cabinet locks to create an audit trail in the case of a breach.
Convergence
W
hile access control is a crucial centerpiece of a hospital’s security system, the ability to integrate additional components and products can create the strongest solution that facilitates complete protection. Incorporating video surveillance, for example, increases situational awareness and
allows security administrators to evaluate a situation before it may become a threat such as a door being forced open.
Vanderbilt’s ACT Enterprise 2.8
T
he latest version of Vanderbilt’s ACT Enterprise access control software is an ideal solution to provide the aforementioned benefits to hospitals and healthcare facilities. ACT Enterprise has been designed with ease of installation and usage as primary goals, with scalability and simplicity key characteristics for enhanced efficiency and effectiveness. One of its newest features, the rules mapping engine, enables the advanced configuration of triggers, which can be actioned on events such as input and output change and card swipe outcomes across the access control system. In a hospital, an example of this functionality could include a card reader for doctor badges on the emergency room suite, which would send an alert to the ER team for immediate assistance. ACT Enterprise 2.8 also facilitates simplified integration with Vanderbilt’s SPC intrusion system, which enables hospital security personnel to view high-quality graphical maps on a single screen that shows all access and alarm points from both systems. This type of wireless integration solution makes system expansion flexible, without the disruption of maintenance teams closing corridors or priority areas of a hospital to run cabling or other installation equipment.
Access control is key
A
s hospitals aim to balance contending with security challenges and establishing a place that provides a comfortable recovery and visitation options, adopting an integrated access control solution must be top-of-mind. Learn more about how the flexibility of Vanderbilt ACT allows healthcare facilities to easily manage public areas and permit access to restricted areas while preventing unauthorized access. Contributed by Vanderbilt
SecurityLink India ■ May 2019
43
Application/ case study
Axis Bolsters Africa’s First Fully Automated Drill Fleet Real-time monitoring supports automated drilling process at Kumba Iron Ore’s Kolomela Mine
Mission
K
umba, Anglo American’s iron ore business in South Africa, cemented its position as an early adopter of new technologies when it implemented automated drilling on the Kolomela Mine. This project was the first fully automated drill fleet in Africa which aimed to increase utilisation, improve safety and performance, boost reliability and productivity, and save costs. The remote command of mining equipment relies on line of sight through remote drill monitoring to honour the guidelines of the Mine Health and Safety Act, specifically guidelines towards trackless mobile machinery (TMM). As the preferred supplier to Kumba Iron Ore, Sedna Industrial IT Solutions (Sedna), were asked to provide visual monitoring to support this.
sence of an operator, and the Geo-Cam was used with AXIS Q6115-E as the base platform for drill and bench monitoring, from a distance providing a 360 coverage of the entire working area of the drill. AXIS Q8722-E were used as the base for the thermal Geo-Cam for drill and bench monitoring in poor light or high dust conditions.
Result
T
he custom-built, world-class mining application reinforces the project through real-time visual monitoring for automated process optimization and early problem detecting. As a result, the Kolomea Mine is benefited from increased efficiency, improved safety, minimized downtime and lowered operating costs.
Remote drill visual monitoring Solution
A
s an Axis development partner, Sedna naturally collaborated with the market leader in video surveillance. The team has worked together on several mining applications in the past, and Sedna relies on the exceptional durability and performance of the Axis products. AXIS P3905-RE network cameras were installed on the drills in order to replace the onboard visibility during the ab-
44
A
utomated drilling presents many benefits as it promises to increase efficiency and reliability, while improving safety, minimising downtime and lowering operating costs. It is best suited for remote and inaccessible locations, and allows for more accurate pressure control and more rapid response to drilling anomalies. Combined with visual monitoring through high definition cameras, a single person can operate multiple drills from a control room on a 24/7 basis. Axis development partner, Sedna Industrial IT Solutions (Sedna), specialising in mining-based systems was approached by Kolomela Mine Project to provide visual monitoring support. Peter Dormehl, Director of Sedna Industrial IT Solutions, has partnered with Kolomela over the years on technical mining solutions, and therefore understood the requirements and client preferences. Dormehl commented, “In making our recommendations to Kumba’s team, we put Axis forward as the IP camera partner of choice. Sedna has worked with Axis for almost a decade and we are confident in their product support. We know their hardware can survive demanding environments, as we’ve deployed their cameras in mining operations worldwide.”
SecurityLink India ■ May 2019
application/ case study
The project’s conceptual phase required creative thinking that led to custom-built products. Sedna provided basic specifications, with minor on site changes to products once introduced and thoroughly tested. Furthermore, their Axis partnership meant we had superior technology and hardware to support the project requirements. Their combined commitment and technical ability is phenomenal and contributed to the overall success of the project Pieterjan le Roux Technologist Engineering at Kolomela Mine, Kumba Iron Ore
Superior technology and hardware
A
few years ago, Sedna built a Geo-Cam for monitoring operations within environments such as opencast mines, where there is no cabling infrastructure. The robust, mobile device is solar powered and locates positional information or tracks a moving object with GPS. The camera communicates via industrial wireless LAN and can be controlled (Pan, Tilt, Zoom) remotely, allowing for monitoring from remote operations. “Part of our comprehensive solution to Kolomela was to install 7 Geo-Cams, which were used with AXIS Q6115-E network cameras as the base platform for drill and bench monitoring, while AXIS Q8722-E was used as the base for the six thermal Geo-Cams for drill and bench monitoring in poor light or high dust conditions. In addition, we installed outdoor-ready AXIS P3905-RE on the drills, as they are ideal for onboard surveillance. This is recorded and managed on a Milestone platform with the Geo-Cam software,” explained Dormehl.
Automatic success
“
The drill project deployment was rolled out over eight months by a strong, competent team of experts who helped contribute towards ensuring that our automated drilling delivers against an ambitious growth strategy,” concluded Sipho Mathonsi, Manager Engineering at Kolomela mine.
Helps Small and Midsized Bank Branches Unify Security, Operations and Business Intelligence with New Bundle of Solutions Affordable offering helps banks manage security, identify threats, reduce fraud losses, and close cases quickly
G
enetec Inc. has recently announced the immediate availability of a new unified solutions bundle for financial institutions, an all-in-one offering, specifically tailored to help banks with small and mid-sized branches and automated teller machines (ATMs) manage security, make more informed decisions, and collaborate to close incident cases more quickly. The unified solutions bundle combines several easy-to-install, enterprise-class Genetec products, at an affordable price for financial institutions. “Traditionally, financial institutions with small or midsized branch locations and ATMs worked with multiple physical security technology and analytics suppliers to combine solutions that were not designed to work together. This created inefficiency and introduced cybersecurity vulnerabilities, challenging maintenance, and operational situations which increased costs. Our unified solutions bundle solves that problem by bringing security, operations and business intelligence together into one single interface, reducing operator overload and improving efficiency. With Genetec Security Center at the core of this bundle, banking customers can be confident knowing that their solutions are deployed following cybersecurity best practices,” explained Rob Borsch, Commercial & Practice Lead at Genetec.
SecurityLink India ■ May 2019
45
Application/ case study
With this new bundle, and the Genetec Security Center unified platform at its core, financial institutions will be able to make the most of their existing security infrastructure to develop strategies to attract and retain customers, reduce fraud losses, and close cases quickly. By using embedded analytics tools to analyze the vast amounts of data and video already being collected, they can make better-informed decisions about staffing and how to manage the flow of people. This can help them become more competitive and have a significant positive impact on their customers’ journey. A unified system can also improve overall branch security by giving personnel all the information they need including alarms and associated video footage, on mobile devices or at their central operations center so they are ready to respond quickly. In an emergency, an IP-based physical security system that includes a map-based interface showing a location’s cameras, doors, and other devices, can make all the difference. The Genetec unified bundle features a Streamvault™ turnkey appliance, pre-loaded with the Genetec Security Center unified platform, and other software including: Omnicast™: An IP-based video management system that goes beyond simple monitoring. Combined with video analytics, it helps secure and better understand banking environment with real-time access to surveillance video from any computer or smart phone. 46
Synergis™: IPbased access control to manage the movement of people throughout buildings, while securing doors and restricted areas in bank branches and administrative offices. AutoVu™: An automatic license plate recognition solution that facilitates vehicle identification. This can assist your marketing and operations team to link specific vehicles to customer or employee profiles in the database, or identify unknown vehicles in your parking area. Camera Integrity Monitor module that alerts customers when a camera is either moved (pointed in a different direction), covered, or tampered with. Retail Sense™ advanced consumer intelligence to empower banks by using existing security data to deliver insights and help transform customers’ in-branch experience. These new insights enable one to make informed, real-time decisions, that increase consumer engagement and profitability by analyzing the data your system already gathers. A free 90-day license of the Genetec Clearance™ digital evidence management system to speed up investigations by securely collecting, managing, and sharing digital evidence from various sources with others. Optional add-ons include: ●● ATM transaction integration (to correlate ATM activity with video footage), ●● Intrusion alarm panel integration plug-in (efficiently respond to intrusion breeches), ●● Sipelia™ intercom hardware & licenses (SIP-based communications between operators and intercom devices), ●● Federation connection license (Connect different sites together), ●● Extended 5 -year warranty, ●● Analog encoder card(s) for 8, 16, 24 or 32 channels.
SecurityLink India ■ May 2019
application/ case study
Tasmanian Distillery Knocks Out Counterfeiters with
HID Global’s IoT Platform for Brand Protection T
asmania’s Old Kempton Distillery (OKD) has deployed HID Internet of Things (IoT) enablement platform, HID Trusted Tag® Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against grey market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. “Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery, “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy preserv-
ing, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC, “HID Trusted Tag services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.”
How it works ●● The distillery’s solution incorporates HID Trusted Tag services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. ●● An HID cryptographically secure near field communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. ●● By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. ●● Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. “HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their SecurityLink India ■ May 2019
products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global, “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.”
The power of HID Trusted Tag services
H
ID Trusted Tag services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11, and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment. 47
Application/ case study
Bradley Business Center Deploys
3xLOGIC infinias CLOUD Access Control Cloud-based access control offers many advantages for property management company and its multiple tenants
T
he Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias Cloud access control system throughout the redevelopment project. HTML Global, an IT managed services provider (MSP), oversaw system installation and continues to provide remote system management.
Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals, and boasts a wide array of features and amenities. At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC managed doors and those for a tenant company, Compass Health Center. The two organizations manage their own access separately but use some of the same network and PoE switches. 48
BBC managed doors are mainly those controlling common areas and shared amenities – parking, fitness facility, rooftop terrace, and others. They also includes data rooms and other sensitive areas within the office space. Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global, “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services, and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses – that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers. We can add one door or hundreds of doors upon request,” said Hunt, “Compass likes the system functionality and ease-of-use so much, SecurityLink India ■ May 2019
they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” BBC controls access by zone and/ or amenity for each credential holder. Administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Hunt said, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck – that’s very cost-effective.”
feature
How Organizations Can Revolutionize
Security Strategies & Outcomes with Artificial Intelligence Artificial Intelligence allows machines to do the jobs which were previously done by people. When it comes to security and surveillance, the AI technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras, allowing security teams to take immediate action towards protecting people and assets
V
ideo surveillance cameras are the electronic eyes of a security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain captured events are posing any security risks or not. With some organizations using hundreds or even thousands of cameras, manual review of footage is simply impossible, leaving them potentially vulnerable to security breaches. To help organizations overcome this challenge and to optimize their security, Hikvision has embedded advanced artificial intelligence technology into their surveillance solutions whereby their cameras, control room equipment and back-end infrastructure can ‘learn’ about potential threats for themselves by recognizing people, vehicles and even behaviours.
Improving all aspects of security with ‘proactive’ detection and prevention
T
he manual interventions needed with traditional security systems require teams to frequently react to the breaches which have already taken place. Artificial intelligence, however, has changed all this by recognizing potential
threats before they impact company’s people or assets – allowing security teams to react immediately to neutralize any potential threat. For example, Hikvision artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. As alerts are automated, potential threats are hardly missed or overlooked.
How does Artificial Intelligence work?
A
rtificial intelligence systems have become more intelligent over time, building database of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Hikvision’s artificial intelligence technologies use advanced algorithms based on deep learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: ●● Facial recognition: It allows law enforcement personnel
SecurityLink India ■ May 2019
49
feature
to identify suspects and commercial teams to identify VIP customers in real time. ●● Vehicle identification: It can be used to identify vehicle number plates, and recognize different types of vehicles (including make and model), or to trigger alerts when vehicles enter restricted areas. ●● Perimeter protection: It helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. ●● Business intelligence: It employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report.
Why is Artificial Intelligence great news for businesses?
A
rtificial Intelligence isn’t just useful for identifying security threats – although that is a key strength of the technology – it can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. In the same way, artificial intelligence can help organisations better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature i.e., people counting allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit the most, and adjust their merchandising and product positioning accordingly to maximise the sales opportunities.
Hikvision: An Artificial Intelligence pioneer
H
ikvision has created a family of artificial intelligence products to maximise the benefits for organisations such as the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition, monitoring and counting of people, and recognition and detection of vehicles, to name a few. These features depend on artificial intelligence technology to recognise, classify and respond to security threats. 50
5G Market Set to Boom – But Clarity is Needed As global 5G capabilities expand, alignment of what 5G is, what end users should expect and how it should be measured will be critical to adoption
A
s the first commercial deployments of 5G start to appear, the stage is set for consumers finally to find out what the powerful next-generation mobile standard promises can bring – an ambitious and far-reaching technological advance that transforms virtually all aspects of human activity such as how we experience life, conduct business, create goods, and build societies. In its latest complimentary white paper, “The Promise and Potential of 5G,” business information provider IHS Markit explores the opportunities and challenges surrounding the upcoming global rollout of new 5G wireless networks. Without question, 5G is helping set the stage for incredible change, but it remains a confusing landscape, with varied and sometimes conflicting interpretations of what 5G is and what to expect from it. This confusion is impacting not just consumers but also complicating the industry’s ability to measure itself against a standard set of 5G expectations and requirements. To optimize short-term and long-term 5G adoption, it is imperative that clarity regarding what 5G is and when each capability will be available is established for both consumers and the ecosystem. To that end, IHS Markit follows the official 3GPP definition of 5G but also believes that this description needs to be understood within the context of everyday experience and concepts. According to the white paper, 5G will improve existing services and enable new use cases such as driverless cars, immersive entertainment, zero-delay virtual
SecurityLink India ■ May 2019
feature
reality, uninterrupted video and no-latency gaming. On the industrial front, 5G will be key to expanding and realizing the full promise of the internet of things (IoT), with the technology’s impact to be felt in smart homes, smart cities and smart industries. “The marketplace implicitly understands 5G represents an unprecedented growth opportunity, with the initial smartphone rollout set to generate record shipment volumes,” said Francis Sideco, Vice President, Technology at IHS Markit, “However, fewer people understand the iterative nature of major technology rollouts such as the one we are going through now with 5G – a process involving multiple major updates that will add new capabilities in the coming years. With each of these updates having the potential to significantly disrupt the market’s competitive dynamics, it’s critical for companies to clearly understand the implications of each rollout or risk falling behind the competition.” Following initial sales of 37 million first-generation 5G smartphones this year, with initial shipments only now commencing, worldwide shipments will surge to 120 million devices in 2020, IHS Markit forecasts. This rollout will be the fastest ever for a new wireless generation, generating six times more unit shipments than previous record-holder LTE over a similar timeframe. Benefitting from strong industry momentum and alignment, global 5G smartphone shipments will continue to rise in the coming years, reaching over 525 million devices in 2023. “Despite strong growth, the level of success among individual competitors in the smartphone and infrastructure market will hinge on their ability to shift their business strategies in parallel with the evolution of 5G,” said Sideco. New 5G technical standards will eventually enable the creation of applications that could open new opportunities, inform new business models and transform everyday life for multiple industries and billions of users throughout the world. However, many of these capabilities won’t be available in initial 5G roll-outs, instead will arrive in subsequent releases of the standard to be implemented over the next few years. Each of the releases will deliver new challenges and opportunities not only for the wireless industry but also every industry for which the new use cases are envisioned. To fully realize the potential of these opportunities, competitors
Despite strong growth, the level of success among individual competitors in the smartphone and infrastructure market will hinge on their ability to shift their business strategies in parallel with the evolution of 5G will need to understand and capitalize on new capabilities even before they are fully introduced. The 5G standard’s next release is already on the horizon, with the expected introduction of Release 16 in late 2019. The upcoming release will deliver highly desirable enhancements, including far greater reliability and peak data rates of 20 gigabits-per-second (Gbps) downlink and 10 Gbps uplink. “This next phase of implementation and rollout will trigger a race among mobile network operators to meet and take advantage of these performance enhancements,” Sideco said, “The winners of this race are likely to gain a competitive advantage as they gear up for the next wave of growth.” Future revisions will spur similar competitive battles, as 5G adds major new capabilities and expands into other markets beyond mobile communications such as mission-critical applications and massive internet of things (IoT) deployments. “For companies throughout the technology supply chain – from network operators, to smartphone brands, to industrial and automotive device manufacturers and electronics suppliers – it will become increasingly important to understand the changes brought by each phase of the 5G deployment and to be ready to capitalize on the latest capabilities to gain a competitive advantage,” Sideco said.
SecurityLink India ■ May 2019
51
feature
Storage Technology Then & Today, and the Trend Contributed by Pgm Security Group Intl
C
omputer storage systems have seen a massive evolution and transformation over the last 100 years or so. These changes have been dramatic in relation to the size, price and the access speed of storage. These changes have been possible due to the rapid advances in technology, which was initially slow and took years to evolve but later in the last decade it accelerated due to rapid innovations and concerted/ collaborative efforts of the industry giants. These technology advances have revolutionized the way companies, businesses and consumers use storage technologies today – from the most ubiquitous smart phone devices and personal computers all the way to businesses which now have come to rely more on cloud storage services. In this article we try to capture the evolution of storage technologies over the years and examine the fundamental technical reason that has accelerated storage evolution over the last decade.
Storage evolution over the last 70 years
Storage technology evolution over the last 100 years
(Relative to size, capacity and price) he table below highlights the trends in storage. Initially, the advances in technology were slow, mostly led by IBM in the 60s and 70s in the Megabyte revolution. In the 80s and 90s other companies jumped on the storage bandwagon and started the Gigabyte revolution soon to be followed by the Terabyte revolution. Today there are many physical form factors of storage devices from the traditional mechanical hard disk drives (HDD) to non-volatile memory (NVM) or solid-state devices (SSD); however, the fastest and most dynamic revolution is occurring in the cloud.
(Another view) here is another view of understanding the evolution of storage technology as well. The diagram below is a pictorial representation of the other view how storage technologies have evolved over the last 100 years.
T
T
The fastest growing storage technology today
T
oday, most storage systems use some or the other form of a mechanical device for storage which is otherwise known as ‘hard disk drives’ (HDD). HDDs are the dominant technology for several reasons such as very high recording density per platter, more than one platter per HDD, higher rotational speeds up to 15000 RPM for enterprise class drives, 52
SecurityLink India ■ May 2019
feature
and reduced costs due to economies of scale. However, they do have inherent disadvantages for the following reasons – further recording density increase has hit the limits of the physical space, increasing the rotational speed of the platter increases the cost exponentially, and being a mechanical device it is bound to physically fail due to all the moving parts. A single HDD with a single platter at 15000 RPM can at most deliver a transfer speed of 100MB/s for sequential block reads, and for the random reads for the same configuration, transfer speed drops down to as low as 10MB/s Given the inherent limitations of mechanical storage devices and the rapid drop in prices of non-volatile memory (NVM), NVM is the next revolution in storage. It is found in almost all mobile devices and now continues to replace mechanical devices across the board. There are several reasons for this – they are now cost competitive with HDDs per terabyte of storage capacity and this price parity will continue to erode in favor of NVM in the coming years; NVM technology is far more reliable in the longer term because it has no moving parts; NVM is over 100 times faster than HDD and has similar transfer speeds for both sequential and random reads/ writes unlike HDDs; and micro-second read/ write latency compared to milli-second latency for HDDs. Companies like Intel and Samsung have now developed NVM technologies that are 3 dimensional – it means increased storage density per cubic measure of volume without any performance degradation. The first system implementations of NVM were found to be SSDs that use the serial ATA protocol or SATA. The reason behind this is very simple. They achieve a 100-fold increase in transfer speeds relative to HDD immediately, without changing the upper level small computer systems interface (SCSI) protocol. The SCSI protocol is over 4 decades old and is used by all I/O protocols such as fiber channel etc. All major operating systems also support the SCSI protocol. So for the industry’s quick gain, it was easy to replace the HDD with an NVM based SSD. The next disruption was soon born because the SCSI protocol and its associated software stack were very heavy as far as execution time was concerned. The SCSI protocol overhead directly impacted latency of reads and writes which is detrimental to high performance applications such as high frequency trading, small transactions in banking, and numerous database applications for machine learning and artificial intelligence. Thus, an industry working group was formed to address the latency problem associated with the SCSI proto-
col. The industry came up with a new protocol which takes advantage of the native speed of NVM. They completely eliminated the SCSI protocol to define a new protocol called NVMe (Non-Volatile-Memory Express). In this protocol, the NVM device is directly attached to the I/O PCI express bus – and hence the extension ‘e’ in NVM. This eliminates the need to have the traditional hardware and firmware that resides in a host bus adapter (HBA) along with HBA itself. The following diagram illustrates this concept.
Latest NVM highlights ●● PCIe Gen1 is 2.5gbps per lane per direction. Today’s SSDs pack Gen3x2 or Gen3x4 (8Gbps x 2 or 4 lanes = upto 32Gbps) bandwidth in a very tiny M.2 gumstick form-factor. ●● 3-D NAND and 3D-Xpoint NAND, DRAM-bandwidth at flash-economies, very low-latency flash (20us IO read/ write) latency compared to 200us latency for enterprise flash. ●● New form-factor coming to pack TB of capacity – ‘ruler’ form factor from Intel. ●● NVMe enables performance scaling with the increase in capacity – traditionally denser HDD did not bring any performance improvement. ●● NVMe over TCP enables low-cost SAN deployment compared to Infiniband, RoCE, iWarp or FC. ●● NVMe allows dual-ported drives providing high-availability (same PCIe connector for either gen3/ gen4x4 or 2 separate gen3/ gen4x2 links); and same connector can connect a native SATA drive as well.
Further evolutions in NVMe – Non-Volatile Memory Express Over Fabric (NVMe-o-F)
R
estricting NVMe inside the box, server chassis has implications for scaling a storage system. Network attached storage (NAS) and storage area networks (SAN) do
SecurityLink India ■ May 2019
53
feature
not have scaling issues. These are field proven technologies for large enterprises with each having advantages and disadvantages in certain type of applications. NVMe-o-F is now about to change the dominance of NAS and SAN storage networks. Several competing technologies are now defining new protocols to replace FC and NAS in enterprise and cloud environments. These are iWarp, FC and RoCE. These technologies intend to use existing ethernet and fiber channel networks to deploy NVMe outside the server chassis. TCP/ IP is also a very old protocol that runs over existing ethernet infrastructure and they too are in the process of extending NVMe outside the server chassis. It is only a matter of time when all storage (green field projects) adopt NVMe-o-F as the preferred storage technology. The following diagram illustrates NVMe-o-F in a CCTV surveillance application.
as these breaches can become very expensive. ●● Increasing data value: All the more reason to prevent data breaches by having a solid security policy. Storage vulnerabilities are inherent in storage systems. They include the following: ●● Lack of encryption: Data must be encrypted both in transit and at rest. ●● Cloud storage: Understand the security offerings by cloud storage providers. All these features come at a cost. ●● Incomplete data destruction: All efforts and methods must be implemented to ensure the total destruction of data when it is no longer needed. ●● Lack of physical security: This is one of the most common causes of data breaches and is often overlooked. Policies and procedures must be put in place to address this issue as critical data breaches are done by human beings.
Data security and data protection
D
ata security has to do with unauthorized access to data whereas data protection has to do with computer component failure. Both these needs are to be considered as important, and must live together ‘components’ with interrelated recovery policies. As this subject is too vast for discussion, we highlight the main points here: ●● Data growth: Sufficient policies must be in place to handle future growth. ●● Cyberattack growth: This phenomenon is bound to increase so this also needs to be considered in an overall security policy. ●● Cost of data breaches: Must act as a powerful incentive to have a strong security policy and mechanism in place 54
Eight data security best practices 1. Write and enforce data security policies that include data security models. 2. Implement role-based access control and use multi-factor authentication where appropriate. 3. Encrypt data in transit and at rest. 4. Deploy a data loss prevention solution. 5. Surround your storage devices with strong network security measures. 6. Protect user devices with appropriate endpoint security. 7. Provide storage redundancy with RAID and other technologies. 8. Use a secure backup and recovery solution.
SecurityLink India ■ May 2019
feature
SecurityLink India â– May 2019
55
International Updates
VIVOTEK Strengthens Cybersecurity with its Latest Cybersecurity Management Solution
V
IVOTEK, the global leading IP surveillance solution provider, has recently introduced the end to end comprehensive protection in its cybersecurity management solution under the strategy of the ‘security within security’ campaign. The solution provides a robust shield that starts from the front-end network camera, to the network video recorder, and to the back-end video management software. This solution was displayed at the recently held ISC West 2019. Built on the collaboration with Trend Micro, a global leader in cybersecurity solutions, VIVOTEK’s network cameras and video recorders are embedded with Trend Micro’s anti-intrusion software with multi-layer protection including brute force attack detection, intrusion detection and prevention, and instant damage control. Users can obtain the following cybersecurity management features with the latest firmware update releases, available by the end of April.
The advanced management in its self-developed video management software, VAST 2 includes instant alert notifications, allowing users to receive notifications either automatically or manually, and real-time cyber risk dashboard to easily identify common types of cyber attacks. Last but not the least, users can take a further step to filter attack logs through different criteria, making it quicker to find abnormal events in a large number of records. Shengfu Cheng, Director of VIVOTEK Marketing and Product Development Division commented, “To address the rising threat to cybersecurity, VIVOTEK puts enterprise power and resources in the hands of Cybersecurity Management Solution. This solution allows users to respond faster to threats and minimize cyber risks in IP surveillance networks. We will continue working to provide our valued customers with reliable products under cybersecurity protection.”
Dahua Technology Announces the Product Integration with Control4®
D
ahua Technology, a world leading video-centric smart IoT solution and service provider, has announced a new integration with Control4®, a leading global provider of automation and networking systems for homes and businesses, at the recently held ISC West. Dahua Technology’s North American models of IP cameras, Pro and Lite series NVRs and HDCVI XVRs are fully integrated with the Control4 Composer HE 2.9.0 automation system. This marks the first full integration between Dahua Technology and a home control and automation platform. Dahua NVRs support motion detection, if enabled on the camera, to trigger events on the Control4 system’s watch menu and alert a user of suspicious activity. The Dahua NVR driver also provides MJPEG and H.264 video feeds, allows selection stream quality, and more. Integrations with home automation platforms cater to industry demands for a single portal to control security and
56
SecurityLink India ■ May 2019
International Updates
household features in users’ homes and businesses. These steps towards simplification and system unification will make interactions with smart homes easier and more convenient for Dahua Technology and Control4 customers. “This product integration furthers our commitment to provide smart home and security integrators with a complete platform for home control,” said Tim Wang, President and CEO at Dahua Technology USA, “We are excited to offer solutions that shape how businesses and homeowners can use, access and control their security systems.”
Avigilon Unifies Video Surveillance Platform Through Secure Cloud Connectivity Expanded capabilities of subscriptionbased platform brings cloud connectivity and unified access to hybrid enterp
A
vigilon, a Motorola Solutions company, previewed its latest and upcoming version of the Avigilon Blue™ cloud service platform for security and surveillance at ISC We t 2019.
Expanded capabilities of subscription-based platform brings cloud connectivity and unified access to hybrid enterprise systems
The launch of Avigilon Blue 3.0 is the first major step as Avigilon begins to unify all its platforms with cloud connectivity and unified access. The upcoming version of Avigilon Blue, a subscription-based platform, will enable secure remote connectivity to Avigilon Control Center (ACC) sites through Avigilon Blue’s web-based interface, allowing ACC™ users to connect to the cloud directly through the Avigilon Blue platform. This provides complex deployments that have
a centralized command center such as citywide surveillance, healthcare and energy facilities, among others, the ability to connect to remote sites securely through the cloud, enabling greater flexibility for hybrid enterprise systems. “With the latest advancements to the Avigilon Blue platform, we are taking the first major step in unifying all our platforms and creating a new hybrid approach,” said James Henderson, Avigilon’s President, “As we move forward, customers will be able to design systems using ACC software for their enterprise sites and command centers, while deploying Avigilon Blue for remote smaller sites. With Avigilon Blue 3.0, we are moving toward a seamless experience and bringing secure cloud connectivity to more customers.”
HID Global Introduces Several New Trusted Identity Offerings ID Global® showcased new offerings, an industry changing access control tool and new integrations at recently held ISC West in Las Vegas. The company also participated in Security Industry Association (SIA) educational sessions and local community events during the conference. HID Global launched its new fingerprint reader that merges credential excellence with HID’s globally patented multi-spectral imaging technology to fuel broad adoption of biometrics at the door. The high-performance iCLASS SE® RB25F fingerprint reader provides an unrivalled experience by dramatically increasing image capture performance and fingerprint matching in under a second. The new integration of HID® SAFE™ Enterprise, a centralized platform for identity management, with the revolutionary cloud-based card issuance solution HID® FARGO® Connect™ takes seamless on-boarding and credential issuance to a new level. HID SAFE’s award-winning physical identity and access management solution allows identity information to be captured from physical access control systems, active directory, HR, and other external systems so that it can be pre-loaded prior to printing a credential. Premiering at ISC West, demonstrations highlighted how
H
SecurityLink India ■ May 2019
57
International Updates
the integration of HID FARGO Connect further streamlines the on-boarding process. HID FARGO Connect enables organizations to easily design cards as well as capture data and securely print cards – all with a single click from any device and from anywhere across multiple printers or locations. HID has teamed with the world’s top turnstile manufacturers to bring mobile access to lobby security. Six leading turnstile manufactures exhibiting at this year’s ISC West exhibition have integrated the new Essex Electronics iROX-T with embedded iCLASS SE® technology from HID. Each company is showcasing mobile access in their booths to illustrate how mobile is upping the convenience factor at the turnstile. HID will also feature partner solutions that showcase elevator access control for a completely connected and more secure lobby experience that is powered by HID technology. HID has married augmented reality (AR) and access control as part of its commitment to continually make it easier to do business with HID Global.
new camera models which were demonstrated at the recently held ISC West. “We’re very pleased to receive this important industry recognition for our newest SurroundVideo Omni series,” stated Brad Donaldson, Vice President, Product Development, Arecont Vision, “The Omni SX brings both enhanced image quality and increased product reliability to meet the needs of our customers across multiple challenging surveillance environments.”
HID Global teams with Mission 500 to help children and families in need
H
ID is participating in a number of charitable events with the Las Vegas community during ISC West, in partnership with Mission 500, a non-profit organization that works closely with the security industry to provide aid to children and families living in poverty in the US.
Surround Video Omni SX Receives Industry Award New omnidirectional multi-sensor camera named 2019 Govies winner
A
recont Vision Costar has received a 2019 Government Security Award (a ‘Govie’) for a new advanced camera model at the ISC West security conference and exposition. The SurroundVideo® Omni SX was among several 58
The compact, low-profile SurroundVideo Omni SX is the newest member of the proven family of omni-directional, adjustable view dome surveillance cameras that the company pioneered for the security industry beginning in 2014. The new multi-sensor camera series builds upon the global success of the Omni G2 in offering both 12 and 20MP models. Each feature True day/ night capabilities for indoor/ outdoor usage including advanced wide dynamic range (WDR) for varied lighting conditions and NightView™ technology for strong low-light performance. Built-in SNAPstream™ technology reduces bandwidth without sacrificing image quality. The 4-sensor, user-configurable Omni SX camera series features the customer’s choice of remote focus lens options ranging from 2.1 to 16mm. An independent panel of judges from the security industry selected the top entries in the 2019 competition sponsored by 1105 Media. The Omni SX and other award recipients were named across multiple categories using criteria that included features, innovation, user friendliness, interoperability, quality, design, market opportunity, impact in the security industry, technical advances, and scalability.
SecurityLink India ■ May 2019
International Updates
BCDVideo Simplifies Surveillance with Hyperconverged Solution Announces certification from Genetec at 2200Mbps with twelve video archiver virtual machines (VMs), with BOTH 1MP and 5MP streams
B
CDVideo, the leading player in enterprise-quality, purpose-built IP video storage solutions, and Scale Computing, a leading provider of edge computing and hyperconverged solutions, have recently announced the certification of BCDVideo’s new Hyperconverged Infrastructure for Video Surveillance (HCI-VS). Developed over the last year and underpinned by Scale’s HC3 software, BCD218-HCI series, built on a Dell OEM technology foundation, offers modularity and ease-of-use without sacrificing performance and quality. Initial tests of the solution, configured with Genetec’s Security Center software, ran at throughput of 1800Mbps with ten video archiver virtual machines (VMs). BCDVideo expects final testing in the 2200-2400Mbps range. “We acknowledge that recording video on virtual machines has been a challenge in this market for years. We decided to tackle this issue and finally through engineering and testing built a viable solution,” said Tom Larson, Chief Technical Officer, BCDVideo, “We successfully adapted the technology for video.” BCDVideo’s new Hyperconverged Infrastructure for Video Surveillance (HCI-VS) series greatly simplifies the deployment, management, and maintenance of its infrastructure, saving the security integrator training costs, and most importantly, eliminating system downtime. The HCI-VS system installs at the project site within an hour and is a fully integrated cluster-wide resource. Deploying new virtual machines (VMs) can be achieved in minutes and everything is managed through a very easy-to-use web interface. The native high availability built into this all-in-one solution utilizes automation and self-healing to eliminate the complexities
around deployment and ongoing management. “It goes far beyond building an easy-to-deploy hyperconverged solution on the Dell OEM platform, although flexibility within that technology is an innovator’s dream,” reflected Jeff Burgess, Chief Executive Officer of BCDVideo, “It’s more about making a significant difference in a market that sincerely needs one. Customers need high-availability solutions that don’t cost an arm and a leg and perform as promised. BCDVideo has delivered on both counts.” “The HC3 self-healing machine intelligence automatically identifies, mitigates, and corrects infrastructure problems in real-time, eliminating the need for infrastructure management componentry. This innovation makes HC3 simple for security integrators to manage and administer,” commented Jeff Ready, CEO and co-founder, Scale Computing, “The HCI-VS system, powered by Scale Computing combines the HC3 self-healing automation with BCDVideo’s leading technology, giving customers a solution built to meet industry wide surveillance requirements while also simplifying the management and maintenance of their infrastructure.”
MOBOTIX Showcases IoT Innovations
M
OBOTIX showcased its award-winning lineup of smart IoT devices for a range of vertical applications at ISC West 2019. MOBOTIX solutions are quality engineered for high-performance and reliability with a multi-layer approach to cybersecurity safeguards. MOBOTIX highlighted its programmable logic devices (PLDs) in a unique IoT wall booth design. The IoT wall showcased pre-programmed cameras alongside peripherals such as lightbulbs, fans and switches, for automation demonstrations. These intelligent IoT devices reach beyond security to create more efficient operations for businesses in many verticals, from predictive militances in industrial applications to data-based merchandising strategy in retail. Similarly, MOBOTIX also hosted in-booth presentations covering a wide variety of topics.
SecurityLink India ■ May 2019
59
International Updates
MOBOTIX also displayed its T26 outdoor station and access module for education campuses, which is a high-resolution hemispheric IP video door station with emergency-duress functionality allowing for keyless entry to secured buildings. Further, MOBOTIX showcased the MOBOTIX MOVE line, featuring enhanced infrared technology and a pan-tilt-zoom functionality, and it’s thermal imaging line in which the M16 thermal camera won an SIA New Product Showcase Award last year. Both product lines are embedded with MOBOTIX’s layered cybersecurity protocols and support ONVIF standards to enable seamless integration into third-party systems. “This year at ISC West, MOBOTIX is focusing heavily on our intelligent IoT solutions. We are looking to educate integrators and end users on programmable logic devices, or PLDs, to highlight the endless customizable solutions we offer to our customers,” said Joseph Byron, Vice President, Americas MOBOTIX, “All of MOBOTIX’s products are quality engineered in Germany, with outstanding performance capabilities that reach far beyond simple security and surveillance applications to provide enhanced value and business intelligence for customers.”
adoption with a common set of challenges. These include economic, technical, regulatory, and perceived risk concerns. Pelco’s pragmatic vision and architecture address these issues as voiced by both current cloud users as well as system integrators. Pelco also showcased soon-to-be-released products such as VideoXpert Plates analytics – a Pelco VideoXpert-compatible automatic license plate recognition system, and the GFC Professional multi-camera series – a multi-directional IP camera line that provides targeted coverage from a single location. Pelco’s commitment to 4K imaging was on display with the GFC Professional 4K and Spectra Professional 4K cameras along with platform enhancements for VideoXpert™ video management system (VMS). In addition, the new VxCare Professional Services, a bundled three-tier service plan for VideoXpert Professional and Enterprise systems, were also represented. Pelco showcased solutions in multiple vertical markets such as healthcare, smart city, commercial/ hospitality, banking/ finance, education, and others. The Evolution camera series (ultra-wide-angle panoramic monitoring), the Spectra Enhanced and the award-winning Esprit Enhanced cameras, the Optera 270 camera (seamless panoramic view), and the High Security Corner Mount IBD camera were also on display for hands-on, real-time demos.
Pelco Showcases New Analytics, Cameras, Services, & its Enterprise Video Surveillance Cloud Service elco™ by Schneider Electric, the trusted global provider of end-to-end video security solutions, exhibited products, solutions, and services for several market segment applications at ISC West 2019. Pelco led with its forthcoming cloud-enabled video surveillance service for commercial and enterprise scale deployments as part of its phased delivery of capabilities and services that ties Pelco’s VMS, VideoXpert, into their cloud-based architecture. Today’s video surveillance as a service (VSaaS) limits broader customer and system integrator
Avigilon Showcases NextGeneration Analytic New AI-powered camera line to feature Avigilon’s most advanced video analytics technology
P
60
A
vigilon, a Motorola Solutions company, unveiled its new upcoming H5A camera line at ISC West 2019. As part of Avigilon’s end-to-end platform, the versatile H5A camera line lays the foundation for Avigilon’s next-generation of intelligent video solutions. The H5A camera line will offer expanded object classification analytics as well as
SecurityLink India ■ May 2019
International Updates
detailed object detection and tracking in crowded scenes, empowering Avigilon Control Center (ACC) operators to detect, verify and act faster by bringing potentially critical events to the forefront of their attention. Avigilon’s H5A camera line brings the next generation of neural network-based video analytic technologies and image processor features to market. Manufactured in North America, the H5A camera line will offer Avigilon’s most advanced video analytics to date, leveraging ACC™ software features and AI technology to focus attention on what matters most, provide actionable information to users, and dramatically increase the effectiveness of security systems. “Our H5A camera line marks the beginning of a new chapter of Avigilon’s evolution,” said James Henderson, Avigilon’s President, “Built with state-of-the-art deep learning algorithms, it is designed to recognize and classify different objects such as weapons and backpacks with incredible accuracy, helping bring a more proactive approach to security.” The full H5A camera line is expected to launch in the latter half of 2019.
Vicon Showcases the Latest Valerus VMS, New IP Cameras and the Valerus Security Console
V
icon Industries, Inc. designer and manufacturer of video surveillance and access control software, hardware and components, offered personal demonstra-
tions at a meeting room conveniently located just outside the ISC West 2019 show floor. Many additions and enhancements to its suite of end-to-end video surveillance offerings were presented. Vicon previewed its next generation Valerus VMS platform. In addition, visitors were among the earliest to see the Valerus Security Console, the industry’s first advanced monitoring workstation. New IP cameras that deliver edge analytics were showcased, as well as VAX mobile credentials. These enhanced and expanded offerings span every category of Vicon product and reflect the Company’s renewed commitment to providing cutting-edge solutions that have been engineered to simplify the entire user experience. These include: Valerus 19: The latest update to Vicon’s popular VMS software provides mapping and event management. Valerus Security Console: Vicon’s new all-in-one security and operations workstation can be used as a central control station for a combined security console and business desk. This high-powered console places the capabilities of Vicon’s integrated security suite, featuring Valerus VMS and VAX access control, literally at the fingertips. With three 24-in. high-resolution touch-screen displays, this multi-functional work console eliminates cluttered desks and improves operational efficiency like no other workstation. IP cameras with edge analytics: Vicon’s broad line of ONVIF cameras now includes models that offer extensive edge analytics built into the camera. VAX mobile credentials: Vicon’s series of contactless smartcard readers with mobile access support offers a new level of convenience for Vicon access control (VAX) customers who prefer to use their smartphones (iPhone or Android) instead of cards or fobs. “Vicon showcased our many new products and product enhancements at ISC West this year. We are very excited to introduce the Valerus Security Console, the industry’s first security and operations console that offers an all-in-one ergonomic workstation with unmatched flexibility for today’s multi-tasking IT security workforce,” said Bret McGowan, Senior V.P. of Sales and Marketing, Vicon.
SecurityLink India ■ May 2019
61
white paper
Development of Cyber-Sustainable Video Surveillance Systems C
yber security is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions, however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cyber security.
Introduction
C
ustomers are currently overwhelmed by the perpetual advertisement of products related to cyber security. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cybersecurity. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist. In general it is possible to universally define safety requirements for installation in special environments such as a drilling rig, a marine vessel or along a railway. For soft62
ware, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Furthermore, a device’s firmware and video management software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever changing conditions. Other aspects of security such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements such as gases or dusts, and deducting the product requirements. During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. The result of the lack of certainty that characterizes software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap by pursuing certifications and stamps, or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features.
SecurityLink India â– May 2019
white paper
Deploying a cyber-secure Orientation between different cyber-security certification options
S
system is a challenging task under these ever changing conditions. Other aspects of security such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements such as gases or dusts, and deducting the product requirements
everal certification options are currently available on the market, and these can be placed in two main groups – System certification and Product certification As the name suggests, system certification addresses cyber-security at a system level. This group includes ISO27001, NIST SP 800-53 and ISA/ IEC62443-3. In these frameworks, risks related to information management are evaluated across every aspect of the organization – information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organization willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/ IEC 15408, also known as ‘common criteria.’ It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers.
Videotec’s strategy for cyber-secure video surveillance systems
V
ideotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products i.e., developing safe products for all possible tasks – mechanical, electrical, electromagnetic and software – according to current and future security requirements. The
mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalogue. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Every night, the validation tools embedded into the continuous integration process automatically test each product to verify that no regression was unconsciously added while we proceed with software development. Every time Videotec adds a new feature in response to a suggestion for improvement by our customers or identification of an issue, it also updates the testing tools to increase the reliability of our products. Videotec believes that its products and the continual updating thereof actively contribute to maintaining the safe
SecurityLink India ■ May 2019
63
white paper
operation of secure video surveillance system, helping IT departments and system administrators by keeping their systems balanced and by not requiring excessive mitigating actions or protections due to future issues. At Videotec, we call this cyber-sustainability. At the time of writing this white paper, Videotec has yet to definitively choose a certification scheme for the DeLux technology. Several options are being evaluated, as we search for a solution that will create value for our customers without sacrificing the addition of new features on all products that make up the DeLux technology range. Although Videotec is still exploring the best certification scheme for its software, this does not prevent us from having a clear and active development path for the cyber-security in our products. At Videotec, the following five principles are the basis for implementing cyber-security in products: ●● Hardened software architecture to minimize the attack surface of the cameras, ●● Constant updates and availability of new features, even on old products, ●● Removal of predefined credentials in the products to strongly indicate to customers that, as a minimum, a new username and password combination must be defined by the user during installation according to the system-level security requirements, ●● Contribution to the ONVIF security service specification to push the industry shifting from usernames and password to X.509 certificates, ●● Clear communication to customers by avoiding fake marketing claims. Videotec had an active role in the development of the ONVIF Profile Q specifications. Among other activities, it contributed to driving the standard towards the removal of predefined credentials. The security market must teach installers and users that using pre-defined usernames and passwords is equivalent to not having credentials at all. Defining the factory-default state of Profile Q compliant devices, where no authentication is required, is the strongest reminder a vendor can provide to its customers. Similarly, with regard to the commitment for the ONVIF Profile Q, Videotec is proposing extensions to the ONVIF security service specifications that will include the widespread adoption of X.509 certificates to replace the usage of credentials. Moving towards this new way of handling authentication between devices and VMSs will not only impact devices, but it will require a leap forward for the whole video 64
surveillance market. Beyond implementing the functionality in its devices, Videotec is already planning the actions that will be necessary to make its customers effective at selling, installing and maintaining video surveillance systems based on this technology. Last, but not the least, trustworthy communication to customers is a key value for Videotec. For this reason, Videotec will never exploit the unintuitive requirements of system certifications of international privacy rules to send wrong messages to the market. As an example, Videotec added to all its IP products an instruction about performing a safe installation according to the General Data Protection Regulation (GDPR), similarly to the instructions given for mechanical, electrical and environmental safety. These instructions are meant to teach customers and stimulate their attention to aspects related to cyber-security. As such, instructions will never be turned into unreliable market claims such as claims for conformance to the GPDR or any other rule.
Conclusions
C
yber-threats started menacing video surveillance systems from the day the first IP-based device was put into the market. At that time, the number of digital systems was low and video surveillance was not as pervasive as it is today. In the last ten years, the video surveillance industry has vigorously shifted from analogue to IP products, and at the same time, it has witnessed a constant growth in market demand. As a result, digital video surveillance systems are everywhere nowadays and attract attention not only from professionals but also from malicious users. Keeping these systems safe from cyber-threats is an activity that cannot be performed just by performing a risk assessment analytics during the commissioning phase – maintenance and recovery plans must be operative during the whole lifespan of the systems. These activities have a cost; also managing the effects of a system violation has a cost. Integrators and users must find the correct balance, to minimize expenses while keeping video surveillance systems updated and secure. In order to make reduction of expenses related to maintenance and recovery plans easier, Videotec bases the development of its products on the concept of cyber sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle, and assist integrators and customers keeping their systems protected.
SecurityLink India ■ May 2019
feature
3 Ways Traka Makes Facility’s Fleet Management Easy I
n the logistics and distribution industry, overseeing fleet management can be far from easy. When you have thousands of drivers and vehicles that transport goods, you’re bound to lose precious minutes due to misplaced keys or vehicles – and those add up to millions annually. How do you get back your lost time and maintain full visibility over your entire fleet of vehicles?
Local benefits of Traka’s fleet management
S
hipping quickly and efficiently is the bread and butter of the logistics and distribution industry. Then it goes without saying that access to a warehouse’s vehicles and inventory should be properly safeguarded to prevent the loss or damage thereof. One clear way to avoid this is by ensuring that access is limited to only the staff with correct login credentials, but how to make that process as streamlined as possible? Here’s where Traka’s iFob comes in. The Traka iFob can be programmed to act as an electronic key for the vehicles by integrating with powerful software each time it’s received from Traka’s intelligent key cabinet. The system then determines whether or not a user is permitted to access that key. If a vehicle is faulty, an authorised user can notify the management of it when putting their key back into the cabinet. Traka’s system will prevent others from accessing the vehicle until a repair is carried out, protecting the rest of the staff from using defective vehicles. This also makes the vehicles last longer. In short, the results of a Traka fleet management solution include: ●● Controlled access to warehouse and vehicles. ●● Minutes saved from knowing where to get the keys at any time. ●● 24/7 audit trail tracking key use for complete visibility over operations. ●● Safer work environment and longer life of vehicles. Let’s think beyond the local benefits for a moment, though. What are the regional benefits of a Traka system? At the regional level, the local benefits are amplified due to Traka’s administrative control. All key tracking informa-
tion and permissions are stored in each Traka key cabinet, which allows administrators to see who possess which kind of key, and when they received it. Changing access permissions takes just seconds, and has a near-instant effect across all the Traka key cabinets, making employee turnover less stressful. With Traka, the solution can track: ●● Location of each vehicle and distance logging. ●● Mileage, fuel levels and scheduled vehicle maintenance. ●● Status of each vehicle in a large vehicle fleet. And it can do it all in a streamlined system managing all facilities and warehouses.
Global benefits of Traka’s fleet management
N
ow look at all these benefits globally. By having complete visibility over operations – even across hundreds of miles – the overwhelming task of managing a large fleet is largely automated. This makes scaling the business easier because one can easily replicate this system in different locations. With their central reporting, one can say with confidence how much mileage their company uses on average each year. They can decrease the wear and tear on their vehicles by scheduling enforced maintenance alerts while increasing accountability for all employees with audit trails for each vehicle. As we mentioned before, a few minutes saved for each driver by finding their key in the same place each morning can translate across thousands of drivers, saving a company millions of dollars annually, and these are just their solutions for fleet management!
SecurityLink India ■ May 2019
65
International Updates
Hikvision Hosted the Second AI Cloud Summit in Hangzhou H
ikvision, the world’s leading supplier of innovative security products and solutions, successfully hosted the second ‘Shaping Intelligence’ AI Cloud Summit at Hangzhou Whitehorse Lake International Exhibition Centre during 29-30 March 2019. Under the theme of ‘Data Enrichment with AI,’ the summit served as a platform for AI cloud ecosystem partners to exchange knowledge on leading-edge AI and big data technologies and applications. It comprised a main forum and four sub-forums on the topics of finance, commerce, public services and smart governance for cities. Over 3,000 participants took part in the event including Hikvision customers, industry leaders, academic experts and partners.
Vision of the future: Fusion of Intelligent IoT and Information Networks
O
and to create continuous value to end users. The cutting-edge architecture is designed to enable collaboration between partners across edge computing, industry applications, service platforms, standard systems, and much more. As an example of this, Hikvision demonstrated how the launch of its AI algorithm training system has enabled partners to train algorithms easily for specific customer application needs and deployment. Using a digitised event exhibition area of 6,000 square metres, Hikvision and its ecosystem partners demonstrated versatile AI solutions including smart retail, smart campus, smart financial service, smart construction, smart agriculture and so on. In addition, intelligent transportation system (ITS) was showcased including intelligent buses, intelligent road networks, intelligent airports and intelligent railway systems – all designed to boost passenger safety and enhance the travel experience.
ne of the most important topics discussed at the conference was how Hikvision’s AI Cloud platform can AI applications to empower industrial users support the integration of IoT and information network data t the four sub-forums held on the second day, end users in order to drive the future development of new, intelligent from different markets exchanged thoughts and shared applications. Ideas discussed included the development of a use cases of collaborating with Hikvision AI deployment. computing architecture that unites cloud and edge computing, At the commercial forum, plus a data architecture that partners from retail, energy, can enable the integration of We believe that, as a fusion platform, property management and intelligent IoT and information the AI Cloud will be able to support our cuslogistics explored how AI can network data. tomers in their quest to unleash the full potential of AI and IoT. increase business insight and Ubiquitous intelligence will be Providing fully open transform how businesses opthe new normal of the AI era; platforms for mutual erate. intelligent applications and development At the smart governance their data generation will he Hikvision AI Cloud for cities forum, traffic aube the engine was developed to solve thorities from different parts – Yangzhong Hu real-world challenges across of China shared successful CEO, Hikvision different vertical markets, AI applications, including
A
T 66
SecurityLink India ■ May 2019
International Updates
how e-police solutions help identify traffic violations and reduce the number of human injuries and fatalities. By merging video information with other systems and algorithms, traffic big data can be visualised on city maps to further guide traffic and improve urban commuting. At the finance forum, banks including China Construction Bank and the Industrial and Commercial Bank of China overviewed their digitised transformation with AI in banking security and management, showcasing how AI-powered big data was a key enabler in this process. The public services forum focused on how AI technology can support the improvement of public services management. Among other sessions, Hikvision partners introduced AI applications for distance learning, smart classrooms, campus safety and enhanced learning environments.
GlenBit Exchange Announces Integration with Blockpass KYC Connect
B
lockchain asset exchange platform GlenBit will integrate Blockpass’ KYC Connect solution to streamline its customer onboarding process, allowing for simplified onboarding to the platform. GlenBit is a blockchain assets exchange platform headquartered in Edinburgh, United Kingdom. Its technical and operational teams are spread over Europe and Asia Pacific region, with offices based in Tokyo, Beijing, Zhengzhou and Shenzhen. The birth of GlenBit is the convergence of advances in traditional commerce, financial technology and artificial intelligence. Blockpass is a leading RegTech and Compliance business which provides digital identity verification as a service. Through its vast network of partners, Blockpass is creating an ecosystem of pre-verified customers for easy and seamless customer onboarding for any regulated business and industry. After recently launching its KYC Connect service, Blockpass has already announced integrations with Ethfinex, ethecal, BBFTA, Tokenomica, Legacy Trust, Corporate Options and a number of others. “By integrating KYC Connect Plus into our onboarding process, we can dramatically reduce the amount of time it takes for customers to sign up to our platform, while knowing that we are still meeting global regulatory requirements for compliant verification,” said WenFei Xu, Operations Manager of GlenBit. “The great thing about Blockpass is the more merchants and exchanges that come on board, and the greater ecosystem of verified profiles that become available,” said Adam Vaziri, CEO of Blockpass, “Adding a global exchange like GlenBit to our roster of partners means that we can continue to expand our user-base and continue to pass on the savings from multi-use verification.” Blockpass KYC Connect provides low cost pre-verified compliance with shared regulatory and compliance services so merchants can onboard users without the expensive and duplicative identity verification process for the same user multiple times across different services. With a verified Blockpass digital identity, customers can simply scan a QR code and easily send verified profiles to merchants, reducing the time and the friction of onboarding. SecurityLink India ■ May 2019
67
International Updates
ASIS Europe 2019 Breaks Records in Rotterdam ASIS International, the world’s largest association of security management professionals, has just concluded its largest ever European event
A
SIS Europe 2019 Conference – ‘From Risk to Resilience’ recently took place in Rotterdam, the Netherlands, attracting over 900 registrants from more than 60 countries and 45 exhibitors. Attendees were senior security practitioners from multinational corporation including Amazon, Microsoft, Facebook, Google, Volkswagen, BNP Paribas, Boehringer Ingelheim, Daimler, Johnson & Johnson, Heineken, Mastercard, Coca-Cola, Lufthansa, SABIC, Zurich Insurance, and The Walt Disney Company. Conference Chair Eduard Emde, CPP stated, “To be part of our largest event to date is very exciting. However, for me, the numbers only tell part of the story – we have attracted an ex-
ceptional audience of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors. That quality, diversity and expertise onsite is what really makes the knowledge exchange and the networking experience so valuable. We wanted to provide a learning experience for both established and aspiring security leaders, and I’m delighted to see the response from my peers both investing the time to attend, and participating actively onsite.” Almost 70 educational sessions were spread across six tracks. Keynotes from Amsterdam and Rotterdam municipalities set the scene by sharing their visions for smart and resilient cities. These were followed by many of
ASIS has been working very hard over the past several years on a number of fronts including an inward look at operations, a review and improvement of member value, and taking a more future focused look at products, services, certification, and research all in an effort to better support and promote the Association and the profession. To see our flagship European event grow and set the bar so high in terms of educational quality is a great endorsement of our investments in making ASIS more global, and in making ESRM (Enterprise Security Risk Management) approaches central to creating value to a wide range of security professionals – Christina Duffey 2019 ASIS International President, CPP
68
SecurityLink India ■ May 2019
the most relevant and most challenging topics in emerging technology such as artificial intelligence, drones, mobile device security and industrial control systems – looking at technology as both a friend and foe for the security practitioner. Considerable time was also devoted to management challenges such as identifying essential skills, how to build teams and structures equipped to face complex challenges, and how to create security cultures that support innovation, diversity and inclusion. Plus, a dedicated career center track was free to attend and geared to helping professionals at all levels pick up tips and insights on how to advance their career path. At ASIS Europe 2019, attendees were helped to address today’s complex risk landscape by the technology and solutions offered on the show floor and the education in the innovation track. Showcased innovations ranged from the latest drone and counter-UAV systems, integrated access control and surveillance technology, to smart crowd sourced cyber security testing, crisis, risk management and intelligence platforms and mass communications applications. The closing plenary used a novel, interactive format with live polling and facilitated discussion to address one of today’s hottest topics – digital transformation. It provided an opportunity for leaders to benchmark their experiences and outlined a number of key challenges facing security teams.
International Updates
Bringing INTERPOL’s Key Players to the Forefront of International Policing Strengthening capacity in member countries for a stronger INTERPOL
I
NTERPOL has opened its annual conference for National Central Bureaus (NCB) to discuss ways to strengthen the crucial role of NCBs in global security. INTERPOL’s 15th Annual Heads of NCB meeting brings together 315 senior police officials from 150 countries who will work to develop collective strategies to ensure NCBs are an effective gateway between INTERPOL and police on the frontlines. During the three day conference (9 – 11 April), delegates were briefed on a range of initiatives aimed at supporting and modernizing NCBs in all regions, from operational and investigative support to enhancing database usage to expanding INTERPOL’s communications network to national police agencies and border control. Opening the conference, INTERPOL President Kim Jong Yang called on the law enforcement leaders in attendance to ‘be wise and build bridges’ in order to forge strong ties to combat all forms of transnational crime. Developing a cohesive global response to transnational organized crime, cybercrime and terrorism is high on the agenda, with regional tables tailoring discussions to both local and global issues. With recent meeting of Ministers of Interior of the G7 again highlighting the important role of INTERPOL in addressing global crime issues, Secretary
True global security can only be achieved when police officers worldwide work hand-in-hand with one another. INTERPOL’s bridges are its Heads of National Central Bureaus (NCBs) who are at the heart of INTERPOL’s global police network. NCBs are the essential nodes of our global early warning system, our foundation for operational impact and the stepping stones for INTERPOL’s response to the world’s security challenges Kim Jong Yang President – INTERPOL
General Jürgen Stock said NCBs were integral to these efforts. “What I heard in Paris and at other summits, is a huge demand for clear-cut, tangible law enforcement results on the ground,” said Kim. Preparing the world’s police to face the crime challenges of tomorrow, topics on the agenda included: ●● The deployment to NCBs of an INTERPOL criminal analysis platform, ●● Research, development and implementation of leading-edge solutions to global policing challenges, ●● Policing capabilities and best practices to combat crimes involving the darknet and cryptocurrencies. SecurityLink India ■ May 2019
Updates on I-Core, a key project which will impact how INTERPOL delivers future services to NCBs, was also presented. I-Core is an ongoing review of current services with a view to future policing needs, to ensure that new INTERPOL services are produced, integrated, managed and delivered coherently and in keeping with the needs of the global law enforcement community. At the end of the meeting, delegates endorsed a number of conclusions aimed at advancing efforts to improve NCB performance, particularly in the area of forensics and the increased use of INTERPOL’s forensic tools and databases. 69
International Updates
Global Business Value of Artificial Intelligence in Banking to Reach $300 Billion by 2030 Countries like China, Japan, South Korea, Hong Kong and Singapore are likely to drive the demand for AI within the banking sector over the next ten years
A
analyst at IHS Markit, “AI is poised to challenge and blur our concepts of computing and the ‘natural’ human. This sea change will require both businesses and governments to develop expansive foresight and critical understanding of the full effects of digitization and emerging technologies.” According to Artificial Intelligence in Banking Report by IHS Markit, North America is projected to be the largest market for AI in banking between 2018 and 2023. AI in the region will increase from a business value of $14.7 billion in 2018 to nearly $79 billion by 2030. However, the proportional importance of the North American region is likely to decline between 2024 and 2030 as Asia Pacific, Europe and other global regions
70
SecurityLink India ■ May 2019
rtificial intelligence (AI) is revolutionizing the banking sector by detecting fraud in financial transactions on the basis of a pre-defined set of rules. In 2018 AI in banking business was estimated to be $41.1 billion, which includes the cost savings and efficiencies of introducing AI technology compared to keeping existing infrastructures and processes. With the projected increase in the number of AI projects that are launched and become commercially deployed, the business value of AI in banking is projected to reach $300 billion by 2030, according to global business information provider IHS Markit. “The innovative capabilities AI will bring to financial services will be transformative,” said Don Tait, principal
roll out more AI solutions in the banking sector. Asia Pacific is the second largest region employing AI in banking, increasing from a business value of $11.5 billion in 2018 and rising to become the leading region in 2024, with a business value of $50.6 billion. The Asia Pacific region for AI in banking is projected to reach $98.6 billion by 2030. “Countries like China, Japan, South Korea, Hong Kong and Singapore are likely to drive the demand for AI within the banking sector over the next ten years,” Tait said. The introduction of AI technology is not entirely good news for the banking industry, with job losses and job re-assignments expected as AI increases enterprise productivity. IHS Markit estimates that by 2030, around 500,000 bank workers in the United Kingdom and 1.3 million in the United States could be affected. If this is mirrored across all countries globally, then there will be tens of millions of banking and financial services jobs impacted by the introduction of AI technology in the coming decade. “Banking employees potentially impacted by the introduction of AI includes tellers, customer service reps, loan interviewers and clerks, financial managers, compliance officers and loan officers,” Tait said, “All in all, AI technology will reconfigure the financial industry’s structure, making the banking sector more humane and intelligent.”
International Updates
Alvium Camera Series Honored by
Vision Systems Design 2019 Innovators Award Program
A
llied Vision was presented with two Silver level awards in the product categories of ‘Cameras – Visible’ and ‘Embedded Vision – Cameras’ at the fifth Annual Vision Systems Design Innovators Awards presentation, held during Automate 2019 in Chicago, Illinois. Alvium was recognized by a panel of esteemed experts from system integrator and end-user companies. The Alvium camera series is Allied Vision’s next generation camera solution built on an innovative camera platform. It was designed to bridge the worlds of industrial machine vision and embedded vision, and provide a full range of cameras that offers system designers a previously unknown level of freedom. Equipped with either USB3 or MIPI CSI-2, the popular embedded interface, Alvium can be used in both worlds. At the heart of the Alvium camera series, is the proprietary System on Chip (SoC), ALVIUM® technology, that combines an image signal processor (ISP) with a powerful image processing library (IPL). This enables image corrections and preprocessing to be completed in the camera rather than the host system. Furthermore, ALVIUM® Technology was developed with intelligent power management where only the used functionality draws power. The idea of simple and easy integration was fundamental in Alvium’s design. It comes available in three housing options – bare board, open housing, or closed housing (USB3 models only). Alvium’s small footprint allows system designers maximum flexibility with space constrained system designs. Also,
The 1500 Series and 1800 Series will be the first series to have models available. The table below offers a quick comparison between the two: Model
Alvium 1500
Alvium 1800
Interface
MIPI CSI-2
MIPI CSI-2; USB3
Feature Set
Basic feature set
Advanced feature set
Camera Control
Video4Linux2 (V4L2), Direct Register Access (DRA)
GenICam, Video4Linux2 (V4L2), Direct Register Access (DRA)
Housing Options
Bare board, Open housing
Bare board, Open housing, Closed housing (USB3 only)
software integration is straightforward. ALVIUM® technology supports various embedded boards such as the NXP i.MX6/8 and NVIDIA Jetson platforms. One driver is needed for each platform to operate all Alvium camera models. Designers can control the camera via Video4Linux (V4L2), Direct Register Access or GenICam, the machine vision standard programming interface. Alvium offers resolutions ranging from VGA to 21 Megapixels. The ALVIUM® SoC supports all common sensor interfaces allowing for quick integration of current and new sensors, therefore, making it future-proof.
Focusing on what counts
“
This prestigious program allows Vision Systems Design to celebrate and recognize the most innovative products and services in the vision and image processing industry,” said Alan Bergstein, Publisher of Vision Systems Design, “Our 2019 Honorees are an outstanding example of companies who are making an impact in the industry.” “We are very proud to have Alvium receive two awards from Vision Systems SecurityLink India ■ May 2019
Design’s Innovators Award Program,” said Andreas Gerk, President & CEO of Allied Vision, “We’d like to thank Vision Systems Design and the judges for this honor. This recognition further validates our direction for future camera solutions. The versatility of Alvium allows us to focus on what counts – our customers and their applications.” 71
International Updates
Honeywell Integrates Intel® Vision Products Adding AI Capabilities to Video Security and Surveillance
H
The integration of Intel Vision Products into the Honeywell MAXPRO NVR and VMS products will result in solutions that enhance site security and operator productivity. These integrated, customizable products will accelerate the processing time of each video stream and increase the number of cameras that can stream in real time through a single device. The adoption of Intel® vision accelerator design products will provide Honeywell’s security offerings with advanced AI capabilities with computational efficiency, allowing them to analyze video data with improved detection accuracy. “With rapid advances in AI technology fueled by the influx of enormous amounts of visual data, our customers are presented with powerful new opportunities in multiple areas including edge video analytics and security,” said Jonathan Ballon, Vice President, Intel Internet of Things Group, “The Honeywell MAXPRO solution, powered by Intel Vision Products, allows customers to process and analyze visual data in near real-time to make decisions faster, drive faster time to results and help ensure secure buildings, campus environments and banking institutions.” Beyond the software and hardware integrations, the partnership will also leverage the Intel® distribution of OpenVINO™ toolkit, which fast tracks the development of computer vision and deep learning inference into vision applications. Through the toolkit, end users can accelerate computer vi-
72
SecurityLink India ■ May 2019
oneywell has recently announced a first-of-its-kind technology integration with Intel that will enable new artificial intelligence (AI) capabilities in its MAXPRO® connected security platform. The new security platform, which will support MAXPRO network video recorders (NVR) and video management systems (VMS), will incorporate Intel® Vision products that enable advanced analytics, deep learning and facial recognition capabilities. These greatly enhanced security solutions will drive cost and time savings by significantly reducing false alarms and will meet compliance requirements such as General Data Protection Regulation (GDPR) through identity anonymization. “Ensuring the security of commercial buildings and the safety of those within them has always been Honeywell’s top priority,” said Pete Lau, President, Commercial Security, Honeywell, “With emerging technology like analytics, facial recognition and deep learning, Honeywell and Intel are connecting buildings and protecting people like never before.” Advances in security and surveillance technology have increased demand for high-definition video and imaging offered by Internet Protocol (IP) cameras. The video surveillance global market is estimated to exceed $68 billion by 2023. At the same time, the technology to properly process the surge in vision data has lagged. End users require a solution that combines both building security and IT systems to address the challenge.
sion performance, shorten vision solution development, and streamline deep learning inference and deployment. The toolkit’s deep learning capabilities will support Honeywell’s face recognition analytics, providing another layer of detail in the software that allows it to learn faces of known entities in an organization. The software is also capable of removing face recognition data it doesn’t recognize in compliance with GDPR requirements. Honeywell will join the Intel IoT Solutions Alliance (ISA) and participate in Intel IoT RFP Ready Kits. A global organization comprising more than 250 technology companies, ISA is dedicated to the development of scalable IoT and machine internet solutions. Intel IoT RFP Ready Kits are focused technology offerings that solve a class of market problems, have been deployed and tested in the field, and provide bundled hardware, software and support. The technology is designed to grow with customer requirements. Honeywell MAXPRO and Face Recognition are among a suite of vision security solutions alongside Xtralis LoiterTrace, an image analysis tool that identifies and tracks suspicious activity, and Xtralis IntrusionTrace, a video analytics program for real-time intrusion detection. The solutions suite is ideal for high traffic, sensitive environments including enterprise campuses, pharmaceutical companies, and banking and financial institutions.
International Updates
Achieves
Top-5 Global Market Share Ranking For ANPR Surveillance Technologies & Rises to 2nd Place in the Americas Recent IHS ANPR report highlights importance of privacy and unification with other security systems
G
enetec, a leading technology provider of unified security, public safety, operations, and business intelligence solutions has become one of the world’s leading and fastest growing providers of automatic number plate recognition (ANPR) technology, according to a recently released report by IHS Markit. According to the report ‘ANPR and Detector Sensors Report – 2018,’ Genetec has now become a top 5 global provider of ANPR technology for surveillance applications (which includes ANPR for access control, travel time information, parking time management, tolling and law enforcement), climbing from 10th place in 2016 to 4th place in this $453m market. In the Americas region – a market estimated to be worth $196.4m in 2018 for all ANPR solutions – Genetec has jumped to second place with a 9.1% market share (moving from 7th place in 2016). This includes both sales of enforcement ANPR technology (for red light, speed and bus lane enforcement applications) and ANPR technology for surveillance. Genetec also gained the most share of the market for ANPR surveillance equipment in the Americas, climbing to second position with an 11.5% market share of this $154.3m industry. “Over the last few years, Genetec has put a lot of effort into growing
its global ANPR business through substantial R&D investment and in increased commercial focus. This has resulted in our Security Center AutoVu™ system becoming one of the most advanced ANPR solutions on the market,” said Stephan Kaiser, General Manager, AutoVu at Genetec. “The global market revenues from sales of intelligent ANPR devices are forecast to reach $800 million by 2022, at a compound annual growth rate (CAGR) of 16.4%. Some of the key factors that will affect market growth include the need for increased privacy and strong data protection, and an increased demand for ANPR solutions that integrate with access control technology,” said Anna Sliwon, Research Analyst at IHS. Genetec is well poised to meet these market challenges. The company takes privacy extremely seriously and follows privacy-by-design principles, an engineering approach that calls for privacy to be taken into account throughout the whole engineering process. Security Center AutoVu is designed to help end users enforce local privacy laws as a default, helping protect the identities of all monitored vehicles and persons in live and recorded video – with data being immediately encrypted or deleted, as SecurityLink India ■ May 2019
mandated by law. Security Center AutoVu is also designed to be used as part of a unified security system including access control and video surveillance, allowing customers to use ANPR events to trigger actions and alarms across their entire security system. The Security Center platform allows them to investigate events across systems and provides unparalleled reporting capabilities. According to IHS Markit (2017 Video Surveillance Market Share Database, 2017 Access Control Intelligence Database, and 2018 ANPR & Detection Sensors Report) Genetec is the only security and public safety solutions developer to hold a top 10 global rankings across all physical security industry sectors including video management software (VMS), access control software, and automatic license plate recognition (ALPR) software. 73
International Updates
EZVIZ Cloud Platform Receives CSA STAR Certification E
ZVIZ Cloud Platform has recently achieved CSA STAR certification for its information security management systems (ISMS). The CSA STAR certification is a rigorous third party independent assessment of the security of a cloud service provider. It is an international certification program established by the founders of global standards – the British Standards Institution (BSI) and the international Cloud Security Alliance (CSA), which are the world’s leading organizations dedicated to defining best practices that help ensure secure cloud computing environments. TM
a
company
The CSA STAR certification was issued by DNV GL for the information security management of EZVIZ Cloud services, and design and development, operation and maintenance services for overseas cloud platform of EZVIZ. “We are proud of obtaining the globally recognized CSA STAR certification. It demonstrates our dedication to security management and control systems, which are essential for the security of our computing environment and the trust of our customers of EZVIZ Cloud,” said Li Xingbo, Vice President of Hangzhou Ezviz Software Co., Ltd. EZVIZ is committed to the utmost quality and safety of its products and actively improves security compliance through professional qualification certifications. Previously, EZVIZ Cloud successfully obtained the ISO9000, ISO14000, and OHSAS18000 qualifications. In 2017, EZVIZ Cloud was also awarded the ISO27001: 2013 certification in the field of international authoritative information security, becoming the leading company to obtain this certification in the domestic home IPC (IP camera) field. EZVIZ, a global smart home security brand, is the consumer and residentially focused subsidiary of Hikvision. EZVIZ creates a safe, convenient and smart life for users through its intelligent devices and cloud-based platform. EZVIZ empowers partners to share their unique cloud services and build a thriving IoT ecosystem together. 74
SecurityLink India ■ May 2019
Nine out of Ten Critical Infrastructure Security Professionals Say Their Environments Have Been Damaged by a Cyberattack in the Last Two Years Report by Ponemon Institute for Tenable finds 62% of respondents said their organizations have suffered multiple attacks
T
enable, the Cyber Exposure company, has recently released the ‘Cybersecurity in Operational Technology: 7 Insights You Need to Know’ report, an independent study by the Ponemon Institute. The study identifies the true extent of cyberattacks experienced by critical infrastructure operators – professionals in industries using industrial control systems (ICS) and operational technology (OT). It found that 90% of respondents stated their environments had been damaged by at least one cyberattack over the past two years, with 62% experiencing two or more attacks. Key highlights from the study include: ●● Insufficient visibility into the
International Updates
attack surface: 80% of respondents cited lack of visibility into the attack surface, knowing what systems are part of their IT environments, as the number one issue in their inability to prevent business-impacting cyberattacks. ●● Inadequate staffing and manual processes limit vulnerability management: Lack of personnel and a reliance on manual processes were cited by 61% and 55% of respondents respectively as major obstacles in their ability to assess and remediate vulnerabilities. ●● C-suite buy-in is key: 70% of respondents view increasing communication with executives and board members as one of their governance priorities for 2019. The convergence of IT and OT is a reality in today’s digital era. But this convergence has connected once-isolated OT systems to a variety of attack paths. This Ponemon study, based entirely on the self-reported experiences and observations of ICS and OT experts themselves, confirms that the threats to critical infrastructure are real, severe and ongoing. “OT professionals have spoken to the people who manage critical systems such as manufacturing plants and transportation who almost unanimously stated that they are fighting-off cyberattacks on a regular basis,” said Eitan Goldstein, Senior Director of Strategic Initiatives, Tenable, “Organizations need visibility into their converged IT/ OT environments to not only identify where vulnerabilities exist but also prioritize which to remediate first. The converged IT/ OT cyber problem is one that cybersecurity and critical infrastructure teams must face together.”
Eagle Eye Networks and IONODES Announce
Integration of Eagle Eye Cloud VMS with IONODES Secure Display Stations Users can display security camera live video on digital monitors without the cost, complexity and security risk of client workstations
E
agle Eye Networks, a leading company in cloud video surveillance worldwide, and IONODES, a market innovator in dedicated IP video appliances, has recently announced the integration of Secure Display Stations with the Eagle Eye Cloud VMS. The IONODES Secure Display Stations offers a comprehensive video wall and spot monitor solution for Eagle Eye Cloud VMS. This partnership will deliver Eagle Eye Cloud VMS users seamless live video wall displays, spot monitors, and public view monitors with a greater number of configuration options and features than possible before. IONODES Secure Display Stations have been designed to promote more secure environments by making live video more pervasive. The Eagle Eye Cloud VMS provides 100% cloud management, 100% mobile or web browser viewing, cloud video recording, and some local display options. The IONODES display appliance accesses video streams directly from the cameras providing low latency live viewing and many more local display options. The ION-R100S and ION-R200 Secure Display Stations can display up to 32 IP video streams, on one or two HD monitors, and can be managed directly through the Eagle Eye Cloud VMS. “The integration between Eagle Eye and IONODES delivers customers a much more complete local display solution that can support large numbers of monitors at very reasonable costs. Customers still get the benefits of cloud management and cloud recording, but can now have large video walls if they need,” stated Dean Drako, CEO of Eagle Eye Networks. IONODES Secure Display Stations limit cyber security threats and cannot be tampered by general staff or the public. This ensures that video is delivered reliably, securely and efficiently, around the clock. “IONODES is committed to using video display to increase safety through awareness. This integration gives Eagle Eye Cloud VMS customers another means to dynamically display live video at their facilities and enhance safety and improve business processes.” said Eric Tasso CEO of IONODES. SecurityLink India ■ May 2019
75
International Updates
Outdoor Video Protection Services Made Easy with
SightLogix & CHeKT Partnership C
heKT and SightLogix have announced the integration between CHeKT’s video monitoring platform The Bridge and SightLogix’s SightSensor HD thermal detection cameras. With this partnership, users gain an easy-to-deploy, highly reliable detection solution for monitoring outdoor assets. The SightSensor HD is a dual-video smart thermal camera that detects intruders with great accuracy in the outdoors, using a thermal sensor for detection and visible color imager for alarm assessment. CHeKT’s flagship product The Bridge is a revolutionary video verification device that offers plug-and-play connectivity between detection cameras and central station automation software. With this integration, when an outdoor intruder is detected by a SightSensor, the alarm is sent along with pre, post and live video to the CHeKT Bridge, which immediately forwards the details directly to the central station. Security personnel can quickly and intuitively acknowledge alarms, view video details and proactively manage threats in real time. As a result, dealers, monitoring firms and central stations can add robust and highly reliable outdoor intruder detection to existing platforms in an efficient, immediate and reliable way. By leveraging CHeKT’s extensive software compatibility, the new partnership offers seamless connectivity into leading automation platforms including Bold stages™ and Manitou®, Dice Corporation, MASterMind Monitoring, Microkey, and Monitor Computer Systems’ Sentinel. “Deploying a successful outdoor protection service starts on a foundation of intruder detection you can count on,” said John Romanowich, SightLogix President and CEO, “Our collaboration with CHeKT empowers our remote video monitoring partners and their customers with a streamlined, proactive solution for protecting outdoor facilities.” “By combining the power and simplicity of CHeKT’s visual verification platform with SightLogix’s excellent detection,” said John Milliron, Vice President of CHeKT, “Our integration gives dealers, central stations, remote guard firms and end users a comprehensive tool that provides actionable information about threats that occur over outdoor areas.” 76
SecurityLink India ■ May 2019
Faster Security Investigations Unveiled as Part of IndigoVision’s New Product Innovations at America’s Largest Security Event
S
ecurity innovator IndigoVision has introduced a range of new features that would lead to faster security investigations and drive down industry storage costs as part of its presence at ISC West 2019 in Las Vegas. Trusted in installations across the world, and with 25 years of experience in developing complete end-to-end security surveillance solutions, IndigoVision’s latest innovations were unveiled as part of an array of new features being introduced to Control Center, its intuitive security management solution. Focusing on advanced analytics, cyber-security and ease of use, Control Center v16.0 will offer operators a powerful new line-up of features to help combat security threats. ●● Faster security investigations: Users will be able to save time and instantly zero in on specific events
Faster security investigations unveiled as part of IndigoVision’s new product innovations at America’s largest security event
International Updates
with the introduction of timeline preview, which provides a thumbnail of the recorded video timeline. ●● Lower storage costs: Users will benefit from improved compression and longer retention times thanks to Control Center’s support for the latest video compression standard, H.265. ●● Reduced eyestrain for users: Control Center v16.0 now adds to its core grey/ white view with a new dark mode, which has been specifically designed to reduce eyestrain in darker control room environments. IndigoVision added to its Ultra and BX camera ranges with the introduction of an exciting new line-up which offers users multiple form factors, low light sensitivity, augmented analytics and wide dynamic range (WDR) giving operators improved image clarity. The new HD Ultra X cameras will deliver enhanced performance through the company’s ground breaking SMART, core™ and CyberVigilant® in-camera technology which give users the ability to detect and respond quickly to potential cyber-threats. NDAA compliance also means these cameras are pre-approved for installation in government sites within the United States and other areas of the world where this legislation has been adopted. Operators will also be able to access next level detection and cyber-security with IndigoVision further expanding its advanced analytics metadata and its award-winning CyberVigilant® technology to select cameras from its BX camera range. The BX420 4K Minidome, BX430 4MP microdome and BX630 HD/ 4K bullet and fixed cameras will now have an enhanced intruder detection enabling Control Center to safeguard against an increased range of threats.
Number of LEGIC Connect Users Rises by 1.3 Million in Just Six Months
I
n November 2018, LEGIC’s software service Connect crossed the magic threshold of 1 million users. Only six months later, LEGIC Connect has reached a new milestone, chalking up 2.3 million users. This growth underscores the importance of mobile identification media and is an indicator of LEGIC Connect’s immense popularity and market success.
Over two million people across the globe now use LEGIC Connect, benefiting from its simple and secure method for distributing virtual keys. It’s a compelling system, taking only a few seconds to assign or withdraw access or usage authorizations for a wide variety of applications without having to use a physical media. It is a centrally managed, global service that is available at all times. Whether used in corporate access, hospitality, mobility, IoT or any other application areas, LEGIC Connect enables trendsetting, highly flexible service models worldwide. LEGIC Connect is a 24/7 software service comprising the LEGIC mobile software development kit (SDK) and the LEGIC trusted service. It boasts high levels of security and ease of integration. Any kind of mobile authorization data are encrypted and sent to smart devices. With genuine end-to-end security between the back-end system and the reader, LEGIC Connect has a security mechanism that is unrivaled in the world. The mobile authorization data is encrypted in the LEGIC trusted service. No critical keys are stored in the customer’s app, with the mobile SDK alone ensuring secure communications with the LEGIC trusted service and the LEGIC reader IC. The latter decrypts the mobile authorization data, and the user obtains the access rights for the respective desired application. Proven cryptographic security mechanisms are used in redundant hardware security modules to ensure reliable security. SecurityLink India ■ May 2019
77
International Updates
Milestone Community Days 2019 Highlighting Need for Responsible Use of Technology A record number of nearly 2,000 participants gathered at Milestone Systems’ annual community events in Nashville, Copenhagen and Bali to explore the intelligent world of video technology
M
ilestone Systems, a leading global industry provider of open platform IP video management software, recently hosted the regional partner and customer events MIPS (Milestone Integration Platform Symposium) in Nashville, Copenhagen and Bali. The three events attracted nearly 2,000 attendees and 124 exhibitors to discuss industry relevant themes such as the impact of disrupting innovation, blending human and machine intelligence, and how the power of the platform economy is a game-changer for players who build intelligent video technology and security solutions. On stage, C-level Executive Advisor and author Sangeet Paul Choudary spoke about the platform revolution within the security industry and the transition from pipelines to platforms, examining the core interaction between consumer and producer. As a true platform based business and business community orchestrator, Milestone Systems unveiled their new digital platform Milestone Marketplace, which helps unleash the innovation power of the Milestone Systems partner community and makes it easier for them to explore new business opportunities outside their existing partner network and customer base.
market comes a need to advocate responsible use of software and technology. This was the overarching theme of all three regional events. Milestone Systems has taken an active role in creating the Copenhagen Letter, a technology declaration developed by 150 people from all industries and signed by more than 5,000 individuals. The core message in the Copenhagen Letter is that we must ensure that technology is used in a balanced manner. This message was well received by the partners, end-customers and industry professionals present at MIPS. Other highlights of the three regional events include a presentation of the Milestone Systems platform roadmap, cloud strategy, a new Technology Partner program, a new driver framework, and the status on the company’s Accelerate Innovation program in Research & Development. External industry professionals included Futurist Brian Solis, who talked about innovation in the era of Darwinism, entrepreneur Ola Ahlvarsson, who discussed exponential technologies and industry transformation entrepreneurship, and IHS Markit, elaborating on the development in the surveillance industry.
Partner achievements honored With power comes responsibility
W
ith the innovation power and reach that Milestone Systems and its partner community bring to the 78
W
ith the Milestone Systems community events in Nashville, Copenhagen and Bali, Milestone Systems celebrated its all-important foundation SecurityLink India ■ May 2019
of the business model, namely the partner community. Partners were officially recognized with awards saluting top performances in sales, marketing, technology, collaboration and innovation for camera partners, solution partners, technology partners, distribution partners, channel partners and installations of 2018. “Once again, the interest, engagement and commitment from our community of partners have been overwhelming. MIPS is no longer a Milestone Systems event, it is truly a partner event. It shows the strength and the opportunities that lie within our platform and within our community. I’m very excited to see where the future brings us and how we can create new innovations within video technology in new and even more responsible ways,” said Kenneth Hune Petersen, Chief Sales & Marketing Officer, Milestone Systems. Milestone Systems is a leading provider of open platform video management software; technology that helps the world see how to ensure safety, protect assets and increase business efficiency. Milestone enables an open platform community that drives collaboration and innovation in the development and use of network video technology, with reliable and scalable solutions that are proven in more than 150,000 sites worldwide. Founded in 1998, Milestone is a stand-alone company in the Canon Group.
International Updates
Nearly 90 Percent of Companies are Adopting Transformative Technologies Yet Few Companies Believe They Will Realize the Full Benefits IHS Markit Digital Orbit assesses transformative technology readiness and impacts
T
he new ‘Digital Orbit’ from business information provider IHS Markit reveals the readiness and global business impact of the following six transformative technologies – video everywhere, the internet of things (IoT), artificial intelligence (AI), 5G, blockchain and the cloud. A survey done in conjunction with this publication revealed nearly all (87 percent) of companies are adopting at least one transformative technology in their businesses, however, just 26 percent of those surveyed believe appropriate business models are in place to capture full value from these technologies. “Despite considerable momentum, challenges still remain and the pace of adoption of these technologies will vary considerably,” said Joshua Builta, Senior Principal Analyst, IHS Markit. AI, cloud and virtualization and IoT – bolstered by technical maturity and wide range of established use cases – were the three transformative technologies most ready for adoption by industries today. At the other end of the spectrum were blockchain and 5G, which were assessed as far less ready for widescale adoption at this time. “Though the hype around blockchain and 5G is considerable, they are at far earlier point in their development cycles and a variety of technical and business hurdles must still be overcome,” Builta said, “However, the readiness scores in ‘Digital Orbit’ are fluid and technologies at the lower end of the scale are most likely to see the greatest upsurge in the immediate future.” The Digital Orbit impact scores indicate that AI will be the most impactful technology over the next three years. Advancements in the technology itself, along with an explosion of analyzable data, is expected to dramatically increase the technology’s transformative effect on a variety of industries,” Builta commented, “Similar to how the impact of cellular technology developed as it evolved from analog to LTE, projected advancements in AI will
Digital Orbit Readiness Scores
dramatically increase the technology’s influence in the coming years.” Cloud and virtualization, IoT, blockchain and 5G will all follow closely behind in the Digital Orbit impact assessment. Video came in at the other end of the spectrum. It was rated as having the least impact, compared to the other technologies examined by IHS Markit. “Outside of individual and societal changes, all of these transformative technologies will eventually alter industries and businesses forever, by shifting competitive dynamics, enabling new products and services, and rendering previous business models obsolete,” Builta said, “Given what’s at stake, businesses leaders need to understand when and how these technologies will affect their industries, to effectively plan for the future.”
SecurityLink India ■ May 2019
79
International Updates
Urban-X Announced as a Finalist in the Benchmark Innovation Awards
R
aytec new URBAN-X range has been selected as a finalist in the 2019 Benchmark Innovation Awards. The URBAN-X, which includes the powerful URBAN-X Pro and the more compact URBAN-X Mini, is a range of high-performance, general area luminaires. They are designed for perimeter, fence line, pathway and industrial lighting applications. URBAN-X illuminators deliver extreme levels of reliability, toughness and performance for the most demanding applications. They are environmentally protected (IP66) with a temperature rating of -30°C to +60°c (-22° to 140°F), making it perfect for even the most demanding environments. An intelligent driver allows URBAN-X luminaire to be pre-programmed to give a tailored solution for any application. With the lightest product weighing in at just 2kg, installation is safer and easier, while an integrated spigot mount with adjustable rotation, provides greater flexibility. The arrival of the URBAN-X range gives security specifiers a complete range of products to meet all the lighting requirements of any site. “We are delighted to have URBAN-X selected as a finalist in this innovation award. The URBAN-X range provides security professionals with a tough, high quality solution for general area lighting applications and broadens the scope of work they can provide. We expect specifiers and installers to recommend Urban-X when customers demand the best possible lighting solutions throughout a site,” comments David Lambert, Managing Director, Raytec. 80
Specialized in Deep Learning
MOBOTIX and Konica Minolta Develop New Camera Platform M
OBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies. The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in their camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensors and devices in the network to enable ‘Beyond Human Vision’ solutions. These solutions include the reliable detection of threats through the combination of different sensor technologies as well as the independent initiation of measures to counter such threats. The state-of-the-art analysis methods located on the camera itself help users increase process efficiency and develop new business and revenue models. Future software updates will enable completely new functions based on deep learning methods such as the recognition of human behavior, moods or voices. In order to make this possible, a so-called ‘plug-in concept’ is being further developed that goes far beyond what is available on competing products. This allows customers to easily create new features similar to developing apps for mobile devices while taking full advantage of the system’s performance, including full CPU and GPU power and programmable logic. Examples could be analysing customer behaviour in retail situations and detect emergency situations in elderly homes and hospitals or analyse quality in production lines. The first products based on the new camera platform will be launched in the first quarter of their financial year 2019-20.
SecurityLink India ■ May 2019
International Updates
Tenable Integrates with Google Cloud Security Command Center T
enable®, Inc., the Cyber Exposure company, has announced the integration of Tenable.io® – for vulnerability management in the Cloud – with Google Cloud Security Command Center (Cloud SCC). This provides organizations with enhanced visibility into their cloud assets, both public and private, delivered via a single dashboard. Cloud-focused organizations can now confidently manage cyber exposure across the entire modern attack surface and reduce cyber risk in their environments. Cloud SCC is a security management and data risk platform for Google Cloud Platform (GCP), that helps security professionals gain visibility and control over their cloud resources, and detect and respond to threats. Data collected by Tenable.io is fed into Cloud SCC via Tenable’s GCP asset connector, giving security teams a unified view of all cloudbased assets in their environments. Security teams can now mitigate threats to cloud resources by effectively identifying ephemeral assets with the connector and feeding that information into the platform to assess for vulnerabilities. “Tenable is committed to helping organizations embrace the benefits of the cloud in a secure fashion,” said Ray Komar, Vice President of Technical Alliances, Tenable, “Our expanded partnership with Google Cloud will provide security teams with holistic visibility that reflects live changes in digital workloads. This is a critical first step in practicing cyber exposure and a cornerstone of modern business.” Tenable.io is a core component of the Tenable Cyber Exposure platform, which uniquely provides the breadth of visibility into cyber risk across IT, cloud, IoT and OT environments, and the depth of analytics to measure and communicate cyber risk in business terms to make better strategic decisions. Tenable.io has won a number of industry awards, including Best Vulnerability Management Solution at the 2019 SC Awards, Best Vulnerability Management Solution at the 2018 SC Awards Europe, Best Security Software and Most Innovative Security Product from the Info Security Product Guide’s 2018 Global Excellence Awards.
Announces New Partnership to Deliver State-of-the-Art Facial Recognition Integration
C
ustomers of IndigoVision will now be able to access advanced facial recognition technology following the announcement of a new partnership with AnyVision. The new partnership will see AnyVision’s renowned Better Tomorrow software being integrated with IndigoVision’s Control Center, its innovative security management solution. Trusted by customers around the world for over 25 years, IndigoVision is committed to keeping customers at the forefront of security innovations, and the new integration with Tel Aviv-based AnyVision is a powerful new addition to its portfolio of cutting edge solutions. The new integration will see data records from AnyVision’s facial recognition functionality being seamlessly sent into Control Center, enabling the fast and accurate identification of missing or wanted persons, even in large crowds. Pedro Simoes, Chief Executive of IndigoVision, said, “Our goal is to help our customers utilise and enjoy the benefits of the very latest security innovations and so we’re delighted to be working with AnyVision which is at the forefront of self-learning AI-based person recognition software. “Ideal for government, police, casino and airport sites, their facial recognition software overcomes challenges around poor light conditions and different angles of view to deliver incredible accuracy and detection rates for our customers.” “IndigoVision and AnyVision share a partnership built on true innovation in the security sector,” said Eylon Etshtein, CEO of AnyVision, “We value both their position and reputation in the marketplace and look forward to creating solutions that will bring about a better tomorrow.”
SecurityLink India ■ May 2019
81
product showcase
to quickly and efficiently confirm system events through HD video verification.
USPs of AXHUB
‘AX-HUB’ NexGen Wireless Intrusion ALARM Panel Complete Security Package (Alarms +CCTV)
T
he AX-Hub is the latest innovation in intruder alarm systems. Part of the Hikvision AX series is designed for catering residential and small commercial applications. The AX-Hub connects security peripherals such as motion detectors and displacement sensors, alongside safety devices like smoke and gas sensors to keep people safe. Hikvision cameras and the AX-Hub alarm systems work seamlessly together to instantly provide a recorded video clip or live HD video footage, directly through Hik-Connect, iVMS, or to monitoring stations. This allows active decisions to be made faster and more reliably in the event of an activation.
Simple to install and use, the AX-Hub provides voice prompts locally to assist during installation, as well as alert the end user to any events. It is also compatible with the Hik-Connect smart device app, in addition to a wide range of communication pathways and multiport IP communications via either the Cloud or CMS for added peace of mind. The Cloud connectivity allows full control of the system from anywhere via Hik-Connect, to easily and remotely arm, disarm and monitor the system. The Cloud also enables the use of revolutionary IVaaS (Intruder Verification as a Service), which allows end users and monitoring stations 82
●● Wireless intrusion panel with CCTV integration +mobile app. ●● Voice guiding for ease of operations. ●● Ease of programming via web/ app. ●● Two-way wireless communication. ●● 32 wireless inputs, 8 key fobs, 2 wireless sirens. ●● In-built GPRS +SMS +voice dialing facility. ●● Supports two Hikvision IP cameras for video verification. ●● Supports viewing events video via mobile App. ●● Transmission distance 800m in open area. ●● 128 bit data encryption. ●● In-built battery backup up to 12hrs. ●● Hik-Connect Mobile App. ●● 3rd party CMS software compatibility.
System architecture AX-Hub package provides for: ●● Built-in IoT modules. ●● AX-Hub with in-built GPRS module & Lan module. ●● Pet immune motion sensor. ●● Magnetic contact. ●● Key fob – a small security device with built-in authentication used to control and secure access to network services and data. ●● Hik-Connect mobile app +SMS +Auto dialing voice call. ●● Supports web browser for integrating Hikvision IP cameras with AX-Hub. IP cameras to be purchased separately.
Benefits
●● Web configuration: The AXHub has a built-in web server which enables the device to be configured through a web browser over the local IP network. This offers more flexibility and time saving on site, as setup can be done quickly and efficiently using a laptop or compatible smart device. ●● Easy setup and installation: Setting up the system could not be simpler, with an intuitive and easy to use interface. Connect to the panel directly via the web-browser or with iVMS-4200 on a laptop for on-site setup, or alternatively, program the system using the Hik-Connect
SecurityLink India ■ May 2019
product showcase
be linked to the AXHub, which incorporates a rolling video buffer. Where other video verification methods rely on sending low-quality static images to confirm events, IVaaS utilises Cloud technology alongside the buffer to link previously separated video and intruder systems to one platform. This provides a 7 second clip in the event of an alarm, 5 seconds pre-alarm and 2 seconds post-alarm.
●●
●●
●●
●●
●●
app. Learning devices and sensors to the system are also easy using the one-push-to-learn feature on all Hikvision wireless intrusion devices, to save time and money. Multiple communication paths: The variety of communication pathways available with the AX-Hub is unmatched. It offers LAN, Wi-Fi, GPRS and 3G/ 4G connections with on-board communication modules and connectors for a simpler and more cost-effective installation. With multiport IP communications, the AX-Hub can also communicate simultaneously with multiple devices, to ensure alarm messages are sent to all that need them. The AX-Hub can also notify up to six phone numbers in the event of an alarm through voice calls, offering greater flexibility in the way that end users are notified about events on the system. Arc linkage: If ARC connectivity is required, the AXHub can communicate alarms and other messages in contact ID format for a rapid and efficient response. Two-way wireless devices: AX-Hub can help add up to 32 two-way wireless devices. This provides a system which is secure and flexible – allowing even larger premises to be secured with a wide range of indoor and outdoor Hikvision peripherals. HIK-Connect: The end user app, Hik-Connect, brings together intrusion and video like never before. It links detectors and sensors to cameras for video verification as well as to provide the end user with the ability to monitor the system from anywhere in the world. It helps users in checking system status remotely, receiving alerts, arming and disarming, HD video monitoring and more, to remain informed and keep the system under complete control at all times. IVAAS (Intruder Verification as a Service): This revolutionary service provides video verification (from any Hikvision or ONVIF IP camera in the premises) for users to quickly and efficiently confirm an alarm event on the system. During the configuration of the panel, 2 cameras can
ACT Enterprise Rules Mapping Helps Deliver Both Access Control and Convenience
T
ime-strapped customers will like the sound of this. ACT Enterprise’s rules mapping engine enables advanced configurations of triggers based on actions such as system input and card swipe outcomes. This feature can lead to very creative examples. For instance, Thomas Risager, Vanderbilt Sales Manager for Denmark, Finland, and Iceland, uses the rules mapping engine to send a pizza collection order when he badges out of the office every Friday evening. This is just one of many creatives instances that ACT Enterprise’s rules mapping engine can be used for. When the new feature was first demonstrated at IFSEC London in June 2018, customers set rules for instances such as badging in at the front gate every morning mean the coffee pot in their office would automatically switch on. Others wanted push notifications every time an employee entered the office after hours, and a follow-up notification when they then left. This was to help with health and safety purposes.
SecurityLink India ■ May 2019
83
product showcase
The USP of the existing ACT system has been that it possesses all the features one would expect in a modern-day access control system, and the rules mapping engine is a crucial ingredient in this. Essentially, ACT Enterprise’s rules mapping engine helps deliver an advanced feature set to customers that hones in on convenience.
ACT Enterprise: Simple drag-and-drop
“
The ACT Enterprise rules mapping engine offers the customer an intuitive method to create rules based on access control events and Boolean logic,” stated Michael Moyna, Technical Product Marketing Manager at Vanderbilt, “It does this by permitting the creation of logical relationships between system elements through a drag-and-drop interface. “For the end user,” illustrated Moyna, “The addition of rules mapping ensures that system interactions can be seamlessly introduced on a system-wide basis, thereby enabling a higher level of added value to be realized, both for security and business-based functionalities.”
ACT Enterprise Rules Mapping Engine: Easy-to-use
C
hristopher O’Reilly, of O’Reilly Alarms in Ireland, has found great benefit in using ACT Enterprise’s rules mapping feature: “ACT Enterprise is very easy-to-use. I would describe it as excellent. My favorite feature is the rules mapping engine. Through this feature, ACT Enterprise has helped me solve monitoring backup generators on site for faults using the rules mapping engine to send alarms and trip alarm sounders,” stated O’Reilly.
7th Generation of ARTPEC Chip Bringing Powerful Capabilities to Cameras
aging, enhanced security features, powerful compression and a possibility to run impressive analytics on the edge. Moreover, since the chip is fully developed by Axis, it provides a layer of control that is crucial for effective cybersecurity. Going forward, the new chip will be the basis for the vast majority of Axis network video products. One of the first cameras to include this chip is the AXIS P1375. “In the current market situation, we believe Axis has a strong competitive advantage as one of only a few manufacturers with our own system-on-chip,” says Johan Paulsson, Chief Technology Officer, “We have complete control over every single transistor, which is very good from a trust and cybersecurity perspective. Plus, unlike other chips, it’s not a generic all-purpose design; rather, it’s 100% optimized for creating high-quality Axis network video solutions.”
Even better imaging under any conditions in any mode
T
hanks to a completely redesigned image processing pipeline, the chip further improves all the signature Axis technologies that have been created to address difficult light conditions. For example, LightFinder 2.0 will deliver more saturated and realistic colors than ever in low light, along with the sharpest images of moving objects even in the darkest areas. Likewise, forensic WDR will provide clearer images of moving objects as well as enhanced detail in backlit scenes, or scenes with big differences between the lightest and darkest areas. Increased sensitivity to light also significantly extends the range of illumination for Axis cameras with IR.
Enhanced security features xis announces the 7th generation of its own ARTPEC chip, optimized for network video. The new chip will power an array of new capabilities and features coming to Axis network cameras. These features include even better im-
A 84
A
RTPEC-7 enables ‘built-in’ security features for Axis cameras including signed firmware so only secure authorized firmware can be installed and secure boot, which prevents booting of unauthorized firmware.
SecurityLink India ■ May 2019
product showcase
Powerful compression
F
uture Axis cameras will also let users choose between H.264 and H.265 video encoding depending on what best suits their system and surveillance needs. Either encoding standard in combination with Axis Zipstream technology will now require even lower bandwidth and storage space without sacrificing image quality. In addition, users are free to re-evaluate their choice of codec at any time if their requirements should change.
Impressive analytics on-the-edge
F
inally, this chip features a real-time object detection engine that will make it possible for Axis and Axis partners to develop powerful analytics to automatically detect and differentiate between people, faces and objects.
New Illustra Pro Cameras with Smart Wide Dynamic Range New Illustra Pro Mini-Dome automatically optimizes video quality while minimizing configuration time
J
ohnson Controls has updated its popular Illustra Pro camera family with the Illustra Pro Mini-Dome, featuring new smart wide dynamic range that optimizes video quality while minimizing configuration time. Available in a complete range of image resolutions and lens options, the Pro Mini-Dome is ideal for a wide variety of deployments in both medium and large sized facilities. Smart wide dynamic range
available in the Pro Gen3 mini-dome reduces configuration time while greatly improving the quality of the video stream in varying lighting environments. By effectively reading the scene, the mini-dome can adjust contrasting and overall scene balance without operator intervention. Setup times are also reduced with the addition of configuration profiles such as retail, gaming and indoor/ outdoor scenes, where camera settings are automatically adjusted based on the environment, with a simple click of a button. The Pro Gen3 mini-dome also automatically adjusts settings to the desired mount for ceiling or wall for additional labor savings. “The smart technology embedded in our latest generation of Illustra Pro cameras automates picture tuning and ensures that what you see is always dynamically optimized even in changing scenes and lighting conditions. We are aiming to reduce operator setup and management costs while always delivering a perfectly configured picture,” said Ric Wilton, Director of Product Management for Illustra, “Adding intelligent, automated capabilities to our solutions is core to our product design and the illustra portfolio.” Building off the previous generation of cameras, the mini-dome improves on important features such as wide dynamic range, Illustra® IntelliZip bandwidth management, effective failover redundancy, cybersecurity and video intelligence analytics. Mini-domes are available in three and eight MP options as well in wide field of view and narrow field of view options, and are not impeded by physical barriers such as a bubble housing. Users can offload analytic streaming from network video recorders to the edge on Illustra cameras, saving time and resources. This feature, video intelligence analytics, provides real-time, user-customizable event alarms that allow for quick reaction to incidents. By gathering transformative data instantly, users can better allocate human resources elsewhere. As part of the Tyco Cyber Protection Product Security Program, the new generation of Illustra Pro cameras will also have enhanced safeguards against cyber attacks. With cyber-threat resilience in mind, the solution includes ‘secure boot’ which prompts the installer to change passwords upon installation. Additional safeguard controls include an enhanced security mode which forces the use of complex, non-default passwords and encrypted communications.
SecurityLink India ■ May 2019
85
product showcase
Insight Hosted Service Delivers Unmatched Video Network Visibility and Performance arch Networks®, a global video security and video-based business intelligence provider, is pleased to introduce March Networks Insight. The new, hosted service provides March Networks customers with unmatched video network visibility, asset control, system health, and service level agreement (SLA) performance management. It offers a visual overview of an organization’s entire video network, and valuable reporting capabilities accessible via a secure, cloud-based platform. Leveraging the proven expertise of March Networks’ dedicated network operations center (NOC) team, which already provides daily managed services to more than 35,000 sites across North America, Insight leaves customers free to focus on their business while ensuring optimum video system performance. For March Networks certified solution partners (CSPs), Insight delivers the tools needed to serve customers more efficiently. It reduces costly truck rolls, and enables partners to easily document and track product warranty status, software versions and other information. The service is also an opportunity for CSPs to build a new recurring revenue stream, working together with March Networks’ professional services team. With Insight, customers enjoy complete, end-to-end support – from system monitoring, performance optimization and issue diagnosis, to remote resolution where possible. When onsite service is required, the NOC team generates a service ticket for customers or their certified partner along with valuable information on the likely issue, for faster, more efficient resolution. That complete support is just one of the benefits enabled by this industry first service. Insight offers unique features and reporting capabilities that save customers time and costs, including: ●● Easy, self-service access to the cloud-based management platform via a web browser, enabling customers
M
86
and/ or their certified partner to securely access critical video network information, create customized reports, and generate and track their own service tickets. ●● Comprehensive health reporting for at-a-glance views of a customer’s video network health, problematic areas and more. ●● Closed-loop field service workflows so customers know that escalated issues have been resolved successfully. ●● SLA reporting on items including outstanding service tickets and time to resolution, validating that SLA commitments are being met. ●● Scheduled software upgrades, ensuring timely updates that help protect the video network from possible security vulnerabilities and enable feature enhancements. ●● Inventory and product warranty reporting, providing an invaluable audit of a customer’s entire video network, including device configuration, model number, firmware version and warranty status. ●● Optional, third-party device health monitoring employing Simple Network Management Protocol (SNMP) scanning tools, leaving customers worry-free even when it comes to non-March Networks IP devices in the video network. ●● Optional field of view (FoV) reports, so customers and/ or their certified partner can move quickly to fix any camera FoV that’s been changed or obstructed. ●● Geographical and network topology views, for a more intuitive overview of a customer’s video deployment, as well as the ability to quickly spot trends by region or area. To ensure customer data is well protected, March Networks enforces strict security and management controls. The NOC runs on a dedicated network, has its own firewall, and uses sophisticated visibility rules to segregate customer data at multiple levels. It also incorporates state-of-the art physical access controls and restrictions including a retinal scanner and 24/7 video monitoring. March Networks conducts cybersecurity audits and penetration tests regularly, and mandates regular employee training so NOC staff are always current on cybersecurity best practices. In addition, the company backs up NOC data frequently and systematically, and has an established disaster recovery process and redundant power sources in place to mitigate power and system downtime.
SecurityLink India ■ May 2019
product showcase
powerful end-to-end storage capabilities for post-production houses, broadcasters, and other rich media environments.
Quantum F2000 hardware architecture
New F-Series NVMe Storage Platform For Cutting Edge Media Workflows
Q
uantum Corp. has recently introduced the F-Series, a new line of NVMe storage arrays designed for performance, availability and reliability. Using non-volatile memory express (NVMe) flash drives for ultra-fast reads and writes, it supports massive parallel processing and is designed for studio editing, rendering, and other performance
T
he first product in the F-Series is the Quantum F2000, a highly available and performant storage server, purpose built for NVMe. The F2000 is a 2U, dual node server with two hot-swappable compute canisters and up to 24 dual-ported NVMe drives. Each compute canister can access all 24 NVMe drives, and includes processing power, memory, and connectivity specifically designed for the highest performance and availability.
New software-defined architecture
T
he F-Series is based on the Quantum Cloud Storage Platform, a software defined block storage stack tuned specifically for video and video-like data. It offers a future proof and reliable platform, eliminating data services unrelated to video while enhancing critical capabilities such as enhanced data protection, flexible networking and block interfaces. The result is an efficient architecture that maximizes streaming performance.
Quantum Cloud Storage Platform Architecture
intensive workloads utilizing large unstructured datasets. Incorporating the latest remote direct memory access (RDMA) networking technology, the F-Series provides direct access between workstations and the NVMe storage devices, delivering predictable, fast network performance. By combining these hardware features with the new Quantum Cloud Storage Platform and the StorNext® file system the F-Series delivers
AI Blueprint To Simplify Enterprise Investment in AI Conversation analysis system determines precisely how companies can best leverage AI and accelerate automation return on investment erint® Systems Inc. the Customer Engagement Company™, has recently launched AI Blueprint™, a patent-protected conversation analysis system that identifies intelligent virtual assistant (IVA) use cases and accelerates automation. AI Blueprint unlocks the power of conversational data and returns specific insights for achieving an organization’s unique business goals. The system then delivers a ‘blueprint’ of precisely how and where businesses can get started with AI or continue to grow their AI capabilities, reducing risk and leading to improved operational efficiency and faster ROI.
V
Quantum F2000 All Flash Storage Hardware Architecture
SecurityLink India ■ May 2019
87
product showcase
“Businesses today need a well-defined roadmap of the resources required to implement an intelligent assistant successfully. AI Blueprint fills this need,” said analyst Dan Miller, Founder of Opus Research, “This unique conversation analysis system offers organizations a package of key elements and resources to speed the time to value today and in the future.” While AI adoption across the enterprise continues to grow, HFS Research projects that, by 2020, more than 50% of enterprise adopters will face AI fatigue. Making informed decisions about how to leverage AI effectively remains challenging, costly, and time consuming. Many businesses invest in AI systems that don’t serve their underlying business needs, and these systems are soon abandoned. “Understanding precisely how AI can be leveraged to support specific business goals is an ongoing industry challenge,” said Tracy Malingo, SVP of Product Strategy at Verint, “At Verint, our chief goal is enabling organizations to effectively automate areas in the business with the greatest potential for RoI. AI Blueprint helps businesses understand the right place to start when it comes to implementing AI.” The AI Blueprint contains a simple yet effective two-factor analysis: 1. Leveraging AI and machine learning for analysis, classification, and labeling of any company’s structured and unstructured conversational data. 2. Determining whether the organization could benefit from deploying AI. If AI Blueprint identifies that there is a business need for AI, the analysis system returns comprehensive and customized recommendations. It identifies which use cases will generate the most business value, develops a range of measurable key performance indicators adapted to the business goals, and generates a roadmap for implementing and/ or further developing AI-powered IVAs in ways that ensure long-term success. Thirty-one percent of business executives believe that IVAs are the AI-powered solutions likely to have the largest impact on their business. The results that AI Blueprint has seen with initial pilot customers further validates this finding. Through AI Blueprint’s unique two-factor analysis approach, enterprises have seen: ●● 83% deflection in live chat volume. ●● 44% cost reduction in the first year. ●● $1 million saved in customer service email costs in a single year. 88
●● 50% decrease in the amount of time it takes a customer to reset a password. ●● 27% reduction in live-chat costs. In total, these benefits can accelerate the RoI of the IVA platform from months to weeks. “IVAs are the future of customer engagement,” said Verint’s Michael Southworth, General Manager, Intelligent Self-Service, “Yet delivering exceptional customer experience is like hitting a moving target because every business is unique. AI Blueprint helps ensure that an IVA strategy is consistently delivering exceptional customer experiences and driving operational efficiencies.”
New Fingerprint Reader iCLASS SE® RB25F HID Global brings reliable biometrics authentication to the door ID Global® has recently introduced its new fingerprint reader that merges credential excellence with HID’s globally-patented multispectral imaging technology to address this issue and fuel broad adoption of biometrics at the door. The high-performance iCLASS SE® RB25F fingerprint reader provides an unrivalled experience by dramatically increasing image capture performance and fingerprint matching in under a second, significantly reducing delays that were previously symptomatic of biometric solutions. “Driven by increasing threats to an organization’s security, biometric authentication is one of the fastest growing segments in the access control market,” said Stephen Carney, Vice President of Product Marketing, Physical Access Control Solutions with HID Global, “The powerful combination of HID’s highly reliable Lumidigm multispectral technology and the reader’s robust construction with IP67 and anti-vandal IK09 ratings now enables customers to deploy fingerprint authentication across a wide range of real-life environments. The reader is also field-configurable over a network, and is designed to ease migration from traditional and existing fingerprint reader solutions.” HID’s multispectral imaging technology captures images
H
SecurityLink India ■ May 2019
product showcase
from both the surface and sub-surface of the skin so that all types of fingerprints, from people of any age, can be read quickly and reliably in cold, dry, dirty, wet and other challenging environmental conditions. This, coupled with trusted liveness detection for spoof prevention, enables the iCLASS SE RB25F reader to provide real-time validation that fingerprints are genuine and belong to a living person who is physically present at the authentication point. To maximize security, the reader includes built-in optical tamper protection, and it supports the open supervised device protocol (OSDP), as well as HID’s Seos® technology for multi-layered authentication between the reader and credentials. Security administrators can download the complimentary HID® Biometric Manager™, an on-premise software tool for configuring and managing one or many iCLASS SE RB25F readers. Built on a server- and browser-based client architecture, the HID Biometric Manager is ideal for enrolling users’ fingerprints (for both 1:1 verification and 1: N identification modes), assigning access rights and conducting many other functions. The comprehensive tool can also be used to securely log all door events where the readers have been installed and to upgrade readers in the field remotely over a TCP/ IP connection. Certified in several major geographies worldwide and available with multiple interface options for various system architectures, the new iCLASS SE RB25F can be used with all popular industry standard high frequency credential technologies (including HID Mobile Access® Mobile IDs, Seos, iCLASS SE, iCLASS®, MIFARE DESFire®, MIFARE® Classic).
6700 Video Entry Series With New Matt Black Monitors
T
he monitors, which feature a 7-inch-high resolution colour LCD screen are now available in both a matt black or satin white finish for a number of Videx popular door entry systems. Video door entry is a very popular access control choice because it enables a resident to see and talk to a caller prior
to opening the door which offers additional peace of mind and security as they have the option to deny access to a caller without having to open the door first. Our 6700 series of hands free monitors carry a number of advanced features such as entrance recall, door release, a do not disturb function and an optional video clip record facility while maintaining ease of use and installation.
The monitors are available with a video memory feature that can be used with or without a Micro SD card to capture an image or short video of a caller enabling the occupant to see any visitors they may have missed throughout the day. Without the Micro SD card installed, the 6700 series is able to store up to 100 still images of the caller, while with a Micro SD card it’s possible to store up to 4096 still images or up to 512 15 second video clips of callers. The facility can be used manually where the user can press a button to either take a picture of the caller, start recording a short video clip or it can be used in an automatic mode where the picture/ video clip will automatically be taken when a visitor calls – allowing the user to review any missed calls when they arrive home. The Micro SD card can also be removed allowing the images and video clips to be used in another device such as a mobile, tablet or PC. Due to popular demand, they are now able to offer the monitors in a matt black soft touch high end finish as well as the standard satin white finish, so that they complement any surrounding area or environment, as well as providing a great access control solution. With the video monitors, there’s also a number of programmable features such as ring tone, privacy time and number of rings allowing each apartment to be customised to the client’s needs. Currently the monitors are available for the full video kit range, VX2200 6 wire system for low and high rise apartments and the VX2300 2 wire system enabling these monitors to be used in one apartment systems through to systems with up to 1000 apartments.
SecurityLink India ■ May 2019
89
product showcase
4G/LTE Mobile Camera MC01 For Commercial Surveillance Applications The Eagle Eye mobile camera MC01 is an enhanced version of the 4G/LTE consumer NuboCam security camera, specifically aimed at commercial applications
E
agle Eye Networks has recently announced that the Eagle Eye Mobile Camera MC01 is available immediately via its reseller partners. The MC01 is a small 4G/ LTE camera for use in locations that have difficulty with standard internet access. Eagle Eye Networks is also making mobile data plans available so that channel partners can provide a complete solution to their customers. The Eagle Eye MC01 is designed specifically for remote applications, temporary installations, or changing environments where standard Internet connectivity is not easily available. The MC01 is ideal for temporary installations, which provides direct camera to cloud connectivity, plug and play installation, advanced person detection analytics and state-of-the-art cyber security. The MC01 is a 2 Megapixel camera that records directly to the cloud, provides alerts and notifications, and can be viewed from full featured mobile apps. “The Eagle Eye Mobile Camera MC01 is another step on the path of bringing all the security camera video that customers have and need, into a single secure cloud managed solution,” said Dean Drako, CEO of Eagle Eye Networks. MC01 will be fully integrated into the Eagle Eye Cloud VMS platform later this year, until then the new camera oper90
ates on a stand alone cloud recording system. It has the following specifications – indoor and outdoor capabilities, 2.43 megapixel resolution, 3G/ 4G and Wi-Fi connectivity, 2.8 mm lens, wide angle view (138º), night vision IR led with 10m range, waterproof, two way audio etc. The Eagle Eye Mobile Camera MC01 has been utilized in many applications including remote industrial sites, remote storage facilities, crop monitoring, temporary construction, garages, building stairwells, festivals, oil and gas pumping stations, remote water cleaning facilities, ship locks, and health and home care applications. The Eagle Eye Mobile Camera can be used indoors and outdoors on 4G, or on Wi-Fi and 4G combined. When combined, the 4G is used as a back-up to the Wi-Fi connectivity. The MC01 can function with a customer’s mobile data plan or with a data plan available from Eagle Eye Networks. It is a simple to install plug and play camera derived from the successful consumer focused NuboCam. NuboCam, launched in 2015 was the world’s first 4G/ LTE camera and remains available to consumer customers on the NuboCam website. The new commercial Eagle Eye Mobile Camera MC01, however, has additional capabilities, robustness, integrations, more flexible recording plans, and more comprehensive data plans. It has been upgraded and designed to meet the needs of commercial customers.
New Super Fisheye 5Mp Ir Compact The Compact Fisheye is the company’s latest addition to the DirectIP® Super Fisheye range, featuring heat mapping, industry-leading de-warping and Smart UX Controls
I
DIS has launched the DirectIP Super Fisheye 5MP Compact camera (DC-Y6513RX), further extending its popular Super Fisheye range. IDIS fisheye cameras are some of IDIS’s best-selling models thanks to their exceptional, dual-side de-warping and smart UX Controls, allowing for smooth and intuitive panning, tracking, and zooming with award-winning ease and accuracy.
SecurityLink India ■ May 2019
product showcase
The introduction of the DC-Y6513RX reflects IDIS’s continued commitment to market responsive innovation and meets installer and end-user requests for a more compact 360° camera that can capture high-definition images in all lighting conditions without blind spots. It also lets customers benefit from heat mapping without the hassle and cost of additional appliances or analytics software. A broad, high-specification camera in a compact form, the new Super Fisheye 5MP builds on the success of earlier IDIS’s Super Fisheye cameras, including the award-winning 12MP DC-Y3C14WRX. It meets industry demands for clear and accurate image capture, long-term performance and reliability, exceptional de-warping, and a low total cost of ownership. “The new Super Fisheye 5MP Compact is a great new choice for wide area surveillance and is already contributing to successful project wins for our integration partners in retail applications, eating-out sectors, education, healthcare and other environments where customers benefit from cost-effective and simple to use analytics. “Its high performance 360° capability means it can replace multiple fixed-lens cameras and provide complete and clear image capture in a variety of lighting conditions. For our integrator partners, IDIS’s value proposition, fast and seamless installations and performance guarantees have the potential to increase margins, while end-users benefit from savings in terms of lower upfront equipment and installation costs, with reduced maintenance expense and video storage burden,” said James Min, Managing Director, IDIS Europe.
●● Quick and simple installation with DirectIP NVRs and true plug-and-play functionality. ●● Reduced potential for cybersecurity loopholes with one-click configuration eliminating the need to manage individual passwords for multiple devices. ●● Heat-mapping to more easily identify hot-spots, dead zones and bottlenecks in retail and eating-out sectors. ●● Intelligent video and event trigger functions including motion detection, active tampering and trip zones. “The IDIS Super Fisheye 5MP Compact camera also scores highly on essential features including built-in LEDs for IR operation in full darkness (up to 15m), 8 zone privacy masking, true wide dynamic range, ONVIF support, built-in speakers and microphone allowing 2-way communications, and industry leading 5-year free warranty. All these factors come together to deliver a lower cost of ownership to our customers,” continued James Min. IDIS offers an end-to-end, single sourced video offering that delivers unrivalled plug-and-play simplicity, combined with highest-quality performance, compatibility and a low total cost of ownership, and features industry-leading warranties.
PowerSeries Pro
Features ●● IDIS Smart UX Controls for very high accuracy and ease-of-use, with intuitive ‘rubber-band’ style control to deliver a new level of operator experience. ●● Super smooth de-warping on the camera as well as on desktop applications and mobile devices for added convenience and out-of-hours monitoring. ●● Quick controls allowing operators to use the CTRL button with a combination of left, right, and wheel mouse clicks for easier and faster investigations. ●● Full protection against video loss thanks to built-in IDIS smart failover guaranteeing continued recording in the event of network instability, overload or failure. ●● IDIS intelligent codec that delivers H.264/ H.265 dual codec performance and significant bandwidth and storage savings, while eliminating the need to upgrade hardware.
Offers Commercial Grade Security with PowerG Technology
J
ohnson Controls PowerSeries Pro is one of the first ever commercial grade security systems to harness the longrange communication technology of PowerG, and is designed to handle large-scale installations. The system offers the highest level of cyber protection features and encryption technology without the need for a wired communication path. PowerSeries Pro is developed for commercial use and can support up to 248 zones, making it an ideal solution for warehouses, office buildings, factories, and healthcare facilities. “In the past, we have had systems that support commercial applications, but PowerSeries Pro is our first commercial intrusion security panel that can handle large commercial
SecurityLink India ■ May 2019
91
product showcase
installations while eliminating the need for wires on sensors or keypads,” said Jennifer Doctor, Senior Director of Product Management, Tyco Security Solutions, “We are excited to provide this new product to the commercial sector, and hope the increase in zones, coupled with secure encryption, will provide end users with the flexibility and reliability they need.” Tyco security solutions’ PowerSeries Pro includes builtin 128-bit AES encryption technology, supports multiple third-party integrations including building management software (BMS), as well as video and access control solutions to offer a versatile platform for holistic commercial security. In addition, Frequency Hopping Spread Spectrum technology repeatedly switches frequencies to minimize interference of radio signals and prevent interception and obstruction during transmission. This is especially useful in commercial integrations, where transmissions take place over longer distances, and in turn require more planning to combat potential interferences security threats. Requiring no drills, wires or repeaters, both residential and commercial installations are hassle-free and provide all the power and security of a wired connection, without the wires.
Comprehensive Online VAX Training Course On-Demand Platform Makes Learning Simple and Convenient
V
icon Industries, Inc. designer and manufacturer of video surveillance and access control software, hardware and components, has recently announced that train92
ing and certification for its VAX access control system is now available as a convenient online course. Following the same curriculum as Vicon’s popular in-person training program, the new online class provides in-depth instruction on all aspects of VAX, from setup and programming to operational capabilities and special features. Coursework includes hands-on learning and exercises that make use of the actual VAX software. In addition, participants are encouraged to connect to any standard ONVIF compliant camera to simulate the most realistic user experience. The new, online, on-demand format allows participants to schedule classes at their convenience, log-in from a location of their choice and learn at their own pace.
The VAX course is offered in two versions – both cover the same material. The VAX certification course is recommended for installing dealers. It takes approximately 10-12 hours to complete, including required testing. It must be completed within 60 days after starting the session. The VAX basic course does not include any exams, has no time limit for completion and does not confer ‘certified’ status. The basic course is intended for end-users and others seeking a greater understanding of the VAX platform. unlike the certification course, there is no fee for the basic version. “Vicon’s commitment to customer training has always been model for the industry, and we are proud to offer the same level of quality in our new online VAX training course. We believe that the most positive customer experiences begin with thorough training and a full appreciation of what our system can deliver,” said Bret McGowan, Senior V.P. of Sales and Marketing, Vicon.
SecurityLink India ■ May 2019
product showcase
4MP DarkFighterX With Even Higher Resolution & AI
H
ikvision has released its new 4MP network IR PTZ camera (DS-2DF9C435IH-DLW) by doubling the resolution of the previous model for even more clarity in dark places. Hikvision launched DarkFighter technology in 2017 – taking inspiration from the way human eyes work. It uses one lens to capture the colour of objects and the other to capture light details in particular. The camera then combines two images together to create one image with both colour and clarity. Now the technology has moved with a higher resolution, smarter event detection and a clear enough image to enable facial recognition in the future. The new DarkFighterX camera employs 1/1.8” sensors to raise resolution to 4 megapixels. This ‘beyond-HD’ image carries twice the amount of information as 2 MP models. The camera can also deliver full colour images at light levels down to 0.0005 Lux. This also means that, in the future, facial recognition could be possible, even in dim
light, thanks to powerful imaging ability and beyond-HD resolution. To detect suspected events effectively, intelligent cameras armed with deep learning technology, can now offer more than ever before. Since smart event detection has become prevalent throughout security systems – such as intrusion detection and line crossing detection – it is essential to make sure that cameras receive more details before triggering an automatic response; and all of the information depends on how many pixels the image can provide – therefore the more pixels, the better. The zoom on the new DarkFighterX camera has increased to 35x. This means the new camera is able to identify a one-metre-long object at 260 metres at a resolution of 250 pixels – enough to observe the object clearly. It has an optical zoom of 16x. The camera has been equipped with an auto wiper to guarantee a better image on rainy days. This function is secured by a rain-detecting sensor on the head of the surface. Other features include 120dB WDR, 3D DNR, chromatic defog, support to H.265+/ H.265 video compression, rapid focus, up to 250m IR distance with smart IR, and IP67. The DarkFighterX series cameras come into their own in exterior dimly lit environments that need 24/7 full-colour footage such as streets, rivers, forests, roads, railways, ports, squares and parks. “We know that night time surveillance can be a real challenge for security professionals, especially in large outside areas,” said Peter Guan, EU Channel Sales and Marketing Manager at Hikvision, “We have further developed our DarkFighterX series to include a more powerful camera to support them in their fight against the darkness.”
SecurityLink India ■ May 2019
93
HEAD - SECURITY (WEST ZONE)
SECURITY MANAGER
SECURITY EXECUTIVE
Company: Head - Security (West Zone)
Company: Ramada Plaza JHV Exp: 4-8
Company: Precision Metal products Pvt Ltd
Exp: 15-20
Location: Varanasi
Exp: 4-8
Location: Pune
Job Id: 030419003998
Location: Surat Job Id: 010419007698
Job Id: 050419001505
SECURITY OFFICER
HEAD OF SECURITY
SECURITY GUARD
Company: Ecom Express Private Limited
Company: SPR Construction Pvt. Ltd.
Company: Focus Imaging and Research Centre Pvt. Ltd.
Exp: 3-8
Exp: 15-25
Exp: 1-2
Location: Bhopal, Katni
Location: Chennai
Location: Delhi/NCR
Job Id: 061018003563
Job Id: 030419000290
Job Id: 300319005254
ASSISTANT SECURITY OFFICER
BRANCH HEAD
SECURITY OFFICER
Company: ASP Management Services Pvt. Ltd.
Company: Bombay Intelligence Security India Ltd.
Company: Express Infrastructure Pvt Ltd
Exp: 0-3
Exp: 5-10
Exp: 4-6
Location: Bengaluru/Bangalore
Location: Mumbai
Location: Chennai
Job Id: 230319001493
Job Id: 090219003359
Job Id: 280918001262
SECURITY MANAGER
ASSISTANT INSTRUCTOR IN GUNNY (AIG)
HEAD - SECURITY CHEMICAL/OIL & GAS FIRM
Company: Ansal Housing and Construction Ltd.
Company: Zen Technologies Limited
Company: The Giant HR
Exp: 2-7
Exp: 15-25
Exp: 12-15
Location: Hyderabad/Secunderabad
Location: Gurgaon
Location: Delhi/NCR
Job Id: 050419000332
Job Id: 030419900423
Job Id: 290818007602
SENIOR OFFICER - SECURITY SECURITY OFFICER Company: Cement Company:Orient PC group Exp: Exp:3-7 3-5 Location: Location:Jalgaon Gurgaon Job Id: 140716006901 Job Id: 030419004776
ASSISTANT SECURITY OFFICER SECURITY MANAGER
FRONT OFFICE EXECUTIVE - SECURITY
Company: Idea International Company: Golkonda Hospitality Exp: 5-10And Resorts Limited Services
Company: Defsys Solutions Pvt. Ltd.
Location: Exp: 5-7 Bengaluru/Bangalore
Location: Gurgaon
Job Id: 120716006216 Location: Hyderabad/Secunderabad Job Id: 080119007704
PLAN YOUR
NEXT CAREER MOVE Top Jobs. Top Companies @ Naukri.com
Exp: 5-7 Job Id: 070219001142
TOP TOP NAUKRI NAUKRI JOBS JOBS CHIEFCHIEF SECURITY & SECURITY & VIGILANCE OFFICER VIGILANCE OFFICER
SECURITY SUPERVISOR SECURITY SUPERVISOR
MANAGER MANAGER - OPERATIONS - OPERATIONS
Company: Company: SecureSecure 1 Security 1 Security ServiceService Company: Company: The Fern TheResidency Fern Residency Exp: 4-9 Exp: 4-9
Exp: 3-6 Exp: 3-6
Company: Company: Specialist Specialist HealthHealth Systems Systems Pvt. Ltd. Pvt. Ltd.
Location: Location: Mumbai Mumbai
Location: Location: Mumbai Mumbai
Exp: 10-15 Exp: 10-15
Job Id:Job 280319005089 Id: 280319005089
Job Id:Job 270319005897 Id: 270319005897
Location: Location: Bengaluru/Bangalore Bengaluru/Bangalore Job Id:Job 270319001874 Id: 270319001874
MANAGER - SECURITY - AIROLI MANAGER - SECURITY - AIROLI
SECUIRTY MANAGER SECUIRTY MANAGER
Company: Company: K Raheja K Raheja Corporate Corporate Services Services Pvt. Ltd. Pvt. Ltd.
Company: Company: VFS Global VFS Global Services Services PrivatePrivate Limited Limited
Exp: 8-13 Exp: 8-13
Exp: 3-5 Exp: 3-5
SECURITY GUARD SECURITY GUARD Company: Company: Hotel Saffron Hotel Saffron Kiran Kiran Exp: 4-9 Exp: 4-9
Location: Location: Mumbai Mumbai
Location: Location: Faridabad Faridabad Location: Location: Hyderabad/Secunderabad Hyderabad/Secunderabad Job Id:Job 260319001673 Id: 260319001673
Job Id:Job 010319000560 Id: 010319000560
Job Id:Job 270319005580 Id: 270319005580
SECURITY OFFICER SECURITY OFFICER
SECURITY (MIDDLE LEVELSECURITY (MIDDLE LEVELSENIOR LEVEL) SENIOR LEVEL)
SECURITY OFFICER SECURITY OFFICER
Company: Company: Jubilant Jubilant Generics Generics Limited Limited Company: Company: Torrent Torrent PowerPower Limited Limited Company: Company: JSW Steel JSWLtd Steel Ltd Exp: 5-10 Exp: 5-10
Exp: 10-20 Exp: 10-20
Exp: 5-10 Exp: 5-10
Location: Location: Mysore Mysore
Location: Location: ThaneThane
Location: Location: BellaryBellary
Job Id:Job 280319000600 Id: 280319000600
Job Id:Job 270319008127 Id: 270319008127
Job Id:Job 250319008160 Id: 250319008160
SECURITY MANAGER SECURITY MANAGER Company: Company: Rama Rama University University
SECURITY SECURITY SUPERVISOR SUPERVISOR
FIRE & FIRE SAFETY & SAFETY OFFICER OFFICER
Exp: 10-15 Exp: 10-15
Company: Company: Sap Holdings Sap Holdings and Leasing and Leasing Company: Company: Kokilaben Kokilaben Dhirubhai Dhirubhai PrivatePrivate LimitedLimited (Sharayu (Sharayu Group)Group) Ambani Ambani Hospital Hospital
Location: Location: Kanpur Kanpur
Exp: 7-12 Exp: 7-12
Exp: 5-10 Exp: 5-10
Job Id:Job 270319006030 Id: 270319006030
Location: Location: Mumbai Mumbai
Location: Location: Mumbai Mumbai
Job Id:Job 270319004997 Id: 270319004997
Job Id:Job 300319000792 Id: 300319000792
GLOBAL SAFETY, RISK AND GLOBAL SAFETY, RISK AND SECURITY MANAGER SECURITY MANAGER
SECURITY OFFICER SECURITY OFFICER
FACTORY FACTORY SUPERVISOR/ADMIN. SUPERVISOR/ADMIN. /SECURITY /SECURITY SUPERVISOR SUPERVISOR
Company: Company: Iron Mountain Iron Mountain India Pvt. India Pvt. Company: Company: BharatBharat Mumbai Mumbai Ltd. Ltd. Container Container Terminals Terminals Pvt. Ltd. Pvt. Ltd.
Company: Company: 7 Colours 7 Colours Placement Placement Consultant Consultant
Exp: 10-15 Exp: 10-15
Exp: 3-5 Exp: 3-5
Exp: 0-5 Exp: 0-5
Location: Location: Mumbai Mumbai
Location: Location: Navi Mumbai Navi Mumbai
Location: Location: JammuJammu
Job Id:Job 260219000565 Id: 260219000565
Job Id:Job 270319003013 Id: 270319003013
Job Id:Job 010419007286 Id: 010419007286
Apply Apply for these for these Jobs Jobs 1. Login 1. Login to www.naukri.com to www.naukri.com 2. Type 2. Type the Job theID Job in ID thein‘Search the ‘Search Jobs’ Jobs’ Box Box 3. Click 3. Click the ‘Search’ the ‘Search’ button button
5,00,000 5,00,000 JOBSJOBS NAUKRI NAUKRI ON MOBILE ON MOBILE
National Roundup
Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)
“Security Link India” payable at New Delhi dated__________
* Please subscribe through admin@securitylinkindia.com
WE ARE UPDATING OUR DATABASE For free listing in Database:
For
Advertisement Contact: editor@securitylinkindia.com
* Send your detail to admin@securitylinkindia.com
Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 96
SecurityLink India ■ May 2019