November 2018
Volume III • Issue 4 • Monthly • New Delhi (102 pages including 6 for cover) RNI No. DELENG/2016/68892
` 200/-
REDEFINING SECURITY (India’s Leading Monthly Magazine on Security, Safety & Fire)
Modernization of Homeland Security Staying Safe in a Smart World
8 Steps to Making Systems More Secure Four Ways to Offer False Alarm Filter to SMB Customers HDCVI 5.0 Brings New Insight into Surveillance to Service Fraud Solution That Incorporates Video is Worth Investment
Infinova Wins Recognition for Its Security Expertise Infinova was selected as a Smart City Project Recommended Brand. It received a Golden Tripod Award for its Facial Recognition and Analysis platform and VS210-P series Facial Recognition Camera.
VS Series Low Light Intelligent IP Box Camera and Minidome Camera ● ● ●
Smart face snapshot High resolution and multi-stream Starlight sensitivity
V2200 Network Video Management Software ● ● ● ● ● ●
Support a maximum of 100,000 video inputs Rich functions of video surveillance andmanagement Support real-time video browsing, search and playback Display real-time status of surveillance points and alarms Support E-maps and E-map zooming Support digital matrix functions such as tour, salvo and alarm management
World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com
From the Editor’s Desk
(102 pages including 6 for cover) Volume III • Issue 4 • November 2018
®
®
ISO 9001-2015 CERTIFIED
Dear Readers,
Editor-in-Chief Santosh Pathak
Greetings from SecurityLink India! Even though the private security industry in India is massive and has enormous potential to deliver, there is grossly inadequate practice of public-private partnership apropos homeland security. The practice, however, is widely encouraged and followed globally. This fact is substantiated by a knowledge paper recently released jointly by KPMG and ASSOCHAM, which the current issue of SecurityLink India also presents as an editorial. Given one of the lowest police public ratios of the world – nearly 150 police per lakh of populace in India – it is a sheer challenge for them to reverse, or hold back the rising curve of crimes. With technology and digitization on the rise, crimes have diversified and the crime graph in India is climbing incredibly fast – primarily due to this disproportionate count of police. Further, the rapid growth of private security industry is a reflection of both the inability of government security agencies to provide adequate security to private entities, and the growing sophistication of the requirements of the private sector. Private security industry in India has ample capability to complement the law enforcement shortage and fill the gap. It comprises a work force of more than 8 million individuals, which is 5 times more than the police and exceeds the combined sum of the three wings of defense and the police force of the country. It is expanding at an annual rate of more than 20%. Though a large section of industry is unorganized owing to various reasons including the partially implemented PSARA 2005, which demands urgent review and upgrading, it is competent enough to perfect the government counterpart. In the context of current policy and regulatory developments, the private security industry can play a significant role in steering the crime line down. There is also a conspicuous absence of public-private partnership between the homeland security department of India and the private security systems, equipment and solution providers for indigenous innovations. Defence Research and Development Organisation (DRDO) does undertake some of the innovation jobs, but majority of equipment requirements for homeland security are fulfilled through import. This modus operandi is neither conducive nor forward looking; it restricts Indian companies from required innovations and evolving indigenous equipment. Homeland security is no longer limited to the border security and internal policing in today’s ‘smart’ world. It encompasses varied newly emerged and emerging threats including cyber and IT ones. At this critical juncture, exploiting the right strengths of private security sector, including technology providers, towards the national goal of safe and smart India is prudent and highly advisable. It will help shape the security practices and standards in India. The pertinent policy makers and departments must consider employing them, of course, post appropriate training and qualification. Team SecurityLink India wishes you all a cracker-free, safe and happy Diwali! With warm regards,
10
Santosh Pathak Mob: +91 9968172237
Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Vibha Dixit Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
National Roundup
november 2018
CONTENTS WHITE PAPER Modernization of Homeland Security Staying Safe in a ‘Smart’ World
44
NATIONAL ROUNDUP 22
CAPSI Demands for Directorate of Private Security Services
33
Hikvision Presents HLS Solutions at IISE 2018
23
Skybox Signs RAH as National Distributor in India
34
Axis, Citilog and Genetec at TrafficInfraTech Expo 2018
25
Videonetics Celebrates 10 Years of Growth
35
Matrix SATATYA CIBR20FL36CWS
26
Hikvision Channel Partner Meet in Udaipur
36
Dahua Dazzles at Infocomm India 2018
37
NETGEAR Unveils Insight Management Solution
27
F-Secure Appoints Country Manager for India & SAARC
38
28
Dahua Participates in TrafficInfraTech Expo 2018
Hikvision Announces Technology Integration with Videonetics
39
29
Synology Offers Storage Scalability
Fortinet Cautions Users in India to Fortify Cyber Security
30
Fortinet Expands Security Fabric Offerings
40
Vizag Fintech Festival 2018
42
GCR Announces Strategic Alliance
32
ForeScout and Belden Form Strategic Alliance
FEATURE ARTICLEs
12
8 Steps to Making Systems More Secure
68
Fraud Solution That Incorporates Video is Worth Investment
69
Police Body-Worn Cameras for Digital Evidence Market Evolution
71
Four Ways to Offer False Alarm Filter to SMB Customers
72
HDCVI 5.0 Brings New Insight into Surveillance to Service
84
SecurityLink India ■ November 2018
National Roundup
SecurityLink India â– November 2018
13
National Roundup
november 2018
CONTENTS Application/ case studies 54
HID Combats Counterfeiting with IoT Based Solution
61
Fermax DUOX System Used on Major Nottingham Retrofit
55
Bosch Delivers Future-Proof Security
56
Trawling for Great Surveillance Coverage with Hikvision
62
• The Integration of SpotterRF and Videotec’s Systems • Nedap’s !D for Nordic Retail Market
57
FLIR Awarded with US Coast Guard Contract
64
Infineon TPM for Cybersecurity in Connected Car
58
March Networks Searchlight for Banking
65
HID Expands Government Options for Offering Mobile IDs
60
360 Vision’s Invictus Onboard Robot Jack
66
Wisenet Cameras Watch Over Torbole Casaglia
International updates Product showcase
14
74-83 86-97
SecurityLink India ■ November 2018
National Roundup
SecurityLink SecurityLink India India■ ■November August 2018 2018
15
500 MANAGING DIRECTORS OF PSAs 200 CORPORATE SECURITY & INTELLIGENCE PROFESSIONALS WILL EVOLVE A JOINT STRATEGY TO SECURE PEOPLE AND PROPERTIES
13th Annual Conference of CAPSI & APDI 15-16 November 2018
PHD House August Kranti Marg, Hauz Khas, New Delhi For Registration & Queries Please Contact: Regd. Office: 276, Sultan Sadan, West End Marg, Saidullajab, New Delhi – 110030, INDIA Mob. : 9871103074, 9582333948 Landline: +91-11-40820070, 40820071 Email: registration@capsi.in
w w w. c a p s i . i n
w w w. a p d i . i n
We are Guardsmen to the Nation. Media Partner
Store performance analysis
Op al er er at ts io n
al
Peo Co ple un tin g
r me sto ior Cu hav be
What is your store showing you? Gain valuable customer insight. In a world of smart phones, TVs, watches, and so on, why not work more efficiently, gain more insight, and improve the customer experience with innovations that create the “Smart Store” of the future? With Axis surveillance technologies in place, just add-on the right analytics to take your store from good to great. Let video surveillance and access control solutions monitor your store layout, shelf inventory and queues as well as teach you about your customer and employee behavior. Embrace your store’s IQ. See what it’s showing you.
www.axis.com/retail
National Roundup
CAPSI Demands Formation of Directorate of Private Security Services Marked a Letter to the Prime Minister of India
C
entral Association of Private Security Industry (CAPSI) has recently written a letter to the Prime Minister of India and requisitioned for the formation of Directorate of Private Security Services for better controlling and governance of the industry. The Association, through the letter, submitted that the private security industry is controlled and regulated by the hurriedly enacted Private Security Agencies Regulation Act (PSARA) 2007 which leaves many areas of governance unaddressed. The Act delegates the governance authority of the industry in a state to the Controlling Officer who is normally an IGP or ADGP (L&O) of that particular state. These officials are immensely pre-occupied with local law & order obligations and therefore hardly avail adequate time to address the issues of the private secu-
22
rity agencies. Besides, there is no separate or additional staff sanctioned and/ or budgetary allocation made for the cause. Thus the Controlling Authorities consume excessively long time to complete licensing and renewal of license processes. There is hardly any dialogue and positive interaction between the Authorities and the security entrepreneurs, and that is seriously impacting the existence and growth of the industry. CAPSI added that despite various efforts made by the police department and the Association, only nearly 30% agencies could be brought into the license regime so far; 70% of them are yet operating without any legislative controls which results in rampant violations of laws and provisions enshrined therein. The license seekers are virtually put under prolonged, tiring proceSecurityLink India ■ November 2018
dures that let their energy and wisdom slide to the negative state; and this is harmful for the industry. Though the private security enterprises, the Association further pointed out, are engaged in community services, they are put under the Home department just because the word ‘security’ is tagged to them, which is unjust. The industry works under the purview of about 10 legislations – 9 of them are related to the labour department, and the nature of the business correlates to the MSME. Under such circumstances, a separate Directorate for PSI would be more advisable than assigning police departments with these additional charges. The total strength of PSI is much more than the combined strength of Army, Navy, Airforce and Police. It is just not feasible for an already burdened sensitive department of state law & order to govern this huge industry, in addition. The Private Security Sector has gone through significant changes in its usability and operational management. The socio economic environment has enhanced its annual growth to 22% making this industry as the largest job generator, and the largest contributor to the national exchequer. The industry is presently a workforce of nearly 8 million personnel on duty all over the country who are assisting in creating safe and
National Roundup
secure environment for people and corporate to live, work and prosper. Most of these private security agencies are being run by the first generation entrepreneurs who have invested their skills and small savings to bring security assurance at the door steps of citizens – with rarely any institutional or financial assistance from outside. CAPSI, on behalf of the private security agencies, demands that the governance responsibility and methodology laid down in the present PSARA 2007 need to be reviewed so that the industry could grow and deliver efficiently. It is prudent that they are reviewed by a committee of security consultants and social management experts. There is a dire need to make course correction to ensure that the PSI is given due recognition, priority and governmental patronage. CAPSI suggests that a Directorate of Private Security Services is
Our demand for the formation of Directorate of Private Security Ser-
vices is genuine. The industry which is one of the largest employment generators and leading revenue contributors of the country has been narrowly recognized and attended. The over-burdened controlling authorities are not able to adequately deliver on the front of PSI issues. A separate entity to control and regulate the affairs of private security agencies is must and inevitable. Establishment of a distinct Directorate of Private Security Services under MHA or MSME will prove a game changer for the industry. It will bring efficiency and effective implementation of PSARA. A workforce of 8 million security personnel, and 22 thousand guarding companies surely need well-structured governance system under the concept of ‘Ease of Doing Business,’ as promoted by the Hon’ble Prime Minister, Narendra Modi – Kunwar Vikram Singh Chairman, CAPSI
established under the Ministry of Home Affairs or MSME so that due attention
is accorded to this essential service by professionals and bureaucrats.
Skybox Security Signs RAH Infotech as National Distributor in India S
kybox® Security, a leading global cybersecurity management provider has recently signed an agreement with RAH Infotech, one of India’s fastest growing value-added technology distributors, to appoint the company national distributor. The software company experienced 433 percent year-over-year growth in APAC for 2017 – including 350 percent growth in India. With security initiatives becoming increasingly difficult to manage, CISOs are seeking solutions like Skybox’s that are integrated and address multiple challenges. The Skybox® Security Suite integrates with more than 120 networking and security technologies that companies are already using to provide the comprehensive attack surface visibility and intelligence in one solution, covering on-premise, multi cloud and OT networks. The Suite also automates many core security processes in vulnerability and threat management, and firewall and security policy management such as network path analysis, attack simulation and change management. The Skybox APAC channel program enables value-added distributors (VADs), managed security service providers (MSSPs), resellers and system integrators to meet the needs of the market by deploying and offering services that leverage the Skybox Security Suite. By adding the Suite to their offerings, local partners can continue to serve as trusted cybersecurity advisors to India businesses. SecurityLink India ■ November 2018
23
National Roundup
Gerry Sillars, VP of APAC for Skybox Security said, broadest cybersecurity management platform to address security challenges within large, complex networks. By inte“We’re looking forward to working with them as we continue grating with over 120 networking and security technologies, to focus on the expansion of our footprint in the region, as the Skybox® Security Suite gives comprehensive attack surwell as evolving the company’s channel business. Our solution continues to be a proven differentiator for our distribuface visibility and the context needed for informed action. tors and resellers, and so we’ve been able to quickly grow our Their analytics, automation and intelligence improve the efficiency and performance of security operations in vulnerabilpartner ecosystem in rapidly expanding markets like India ity and threat management, and firewall and security policy and SAARC.” management for the world’s largest organisations. “The Skybox platform successfully serves a huge market need across the globe and now it will be more accessible RAH Infotech is India’s leading tech distribution major to the Indian market. These are excitand solutions provider in the network ing times for us at RAH Infotech to be and security domain, specializing in partnering with Skybox,” said Ashok enterprise & App security and application delivery. Founded in the year 2005 Kumar, CEO, RAH Infotech, “As a and headquartered in Gurgaon, RAH VAD focused on adding value to our Infotech has been providing world class partners and customers, we are constantly studying and introducing new IT solutions to a large number of channel partners and enterprises in India and advanced cutting-edge technologies in India which help our customers and SAARC countries. RAH Infotech We are excited to partembrace digital transformation in an works in close knit with its channel ner with RAH Infotech effective manner. Today with networks partners, offering solutions that cover who have demonstrable increasing exponentially in size and information security solutions, telephony and video collaboration, server getting more complex, we need new knowledge of the India and and storage management, backup and and dynamic solutions that simplify SAARC market place with disaster recovery management, BCP and automate day-to-day cybersecurity a great track record of exservices, data center solutions and data workflows and processes. The solution ecution for their vendor and protection. RAH Infotech is committed that Skybox offers gives companies a reseller partners to helping its partners choose, configsingle view to their hybrid networks, ure, and deliver the industry’s premium and a way to easily manage and quickly Gerry Sillars products across almost every vertical address risks.” VP of APAC for Skybox Security market in India. Skybox provides the industry’s 24
SecurityLink India ■ November 2018
National Roundup
Celebrating 10 Years of Innovation & Growth V
ideonetics, the world-leading visual computing platform development company, has reached an exciting milestone as the company celebrates 10 years of business success in visual computing technology. In 2008, the company was founded by Dr. Tinku Acharya, an internationally acclaimed inventor and technologist, with a mission to develop indigenous technologies which are best-suited for tough environmental conditions. Today, Videonetics has grown to become a global company that designs, develops, and deploys new age artificial intelligence and deep learning based solutions for a wide range of verticals such as safe and smart cities, aviation and transportation, petroleum and gas, critical infrastructure, financial and legal, and healthcare and education industries.
A decade of innovation & excellence
G
lobally, Videonetics has been securing 100+ cities, 80+ airports, 100+ large enterprises, and over 7500 traffic lanes by using its video computing platform. In this journey of 10 years, Videonetics innovations and technologies were widely recognized by way of numerous awards and recognitions from prestigious institutions, bodies and organizations worldwide. Videonetics is proud to have secured patents from USA, UK, Israel, Canada, Singapore, and many more are in pipeline. “Videonetics has been at the vanguard of visual computing innovation
It’s a very satisfying feeling
that Videonetics is celebrating its 10th anniversary. I feel humbled and proud that I could launch Videonetics to do my duty as a patriotic scientist and technologist to achieve this mission in my way. Innovation is in our blood and it is guiding principle of Videonetics. We are extremely excited and proud as we celebrate 10th anniversary in the industry. We are committed to keep innovating and invest in our R&D towards generation of intellectual properties resulting in cutting-edge products and solutions which could solve real life challenges and problems –Dr. Tinku Acharya Fellow IEEE, MD & Founder, Videonetics SecurityLink India ■ November 2018
for over a decade. Our innovation journey has pioneered the move from first generation of IVMS and ITMS to AI & deep learning enabled visual computing platform, thereby retaining leadership position in the market. I take this opportunity to thank my deeply committed research and development and technology team for their invaluable contribution,” said Tuhin Bose, VP & CTO, Videonetics. Avinash J Trivedi, VP – Business Development, Videonetics stated, “The journey of 10 years would not have been possible without the trust and support that the system integrators, consultants, strategic partners, esteemed customers have vested in us. We are honored and thankful for their contribution to Videonetics growth and looking forward to working with them in future.” Videonetics will celebrate its 10th anniversary throughout 2018 with its anniversary theme – ‘Honouring the Past and Envisioning the Future.’ 25
National Roundup
Overwhelming Response to
Hikvision Channel Partner Meet in Udaipur T
o impart the latest security product knowledge and updates, Hikvision in association with IT Pulse has recently organized Hikvision Channel Partner Meet at Hotel Radisson Green in Udaipur. A comprehensive product introduction, live demos and training program were the key highlights of the event. The event got overwhelming response from the security professionals, dealers and distributors. It was an en-
riching experience for Hikvision team to meet with potential partners and system integrators. This was instrumental in building trust and confidence in partners for the quality and services offered by Hikvision. The event was presided by Police Superintendent Kunvar Rashtradeep, and Raj Surana, President, TiE – Udaipur, Mr. Rashtradeep said, “CCTV has a lot of important implications for police. We have created a command and control center for monitoring the city. We appreciate Hikvision for their long term vi26
sion. There is a need for creating public awareness about security so that policing can be done more efficiently. There is a need to enhance the knowledge about functions of security cameras.” Mr. Surana said, “People are still lacking in the security awareness. They build houses worth crores of rupees but don’t install cameras for security, which are must for their security. If they decide to make a small investment for the cameras, then a lot of losses can be prevented.” In his introductory note, Ashish P. Dhakan, CEO and MD, Prama Hikvision India Pvt. Ltd. said, “Hikvision is the world’s leading provider of innovative video surveillance products and solutions. Today Hikvision is leading with artificial Intelligence (AI) enabled solutions in the security industry. We have the most comprehensive products and security solutions in video surveillance, access control, intrusion system, smart home and storage categories.” He further added, “The future of the security market in India is very bright due to robust growth prospects. We at Hikvision are offering the latest products and innovative technologies, including artificial intelligence (AI) and deep learning, big data, IoT (Internet of things). The Hikvision channel partner meet is our initiative to impart SecurityLink India ■ November 2018
the product knowledge to our channel partner community.” Deepak Wadkar, Regional Sales Manager, Prama Hikvision India Pvt. Ltd. said, “Today, CCTV cameras have become the need of the nation. When a person installs a CCTV camera to secure his premises, he secures himself and helps securing others while providing evidence to nab criminals.” Ashish Gujarathi, AVP, Non-CCTV Products, Prama Hikvision India Pvt. Ltd. said, “The latest security cameras by Hikvision has the face recognition function for entry into office or home.” The Hikvision channel partner meet started with the lamp lighting ceremony. A product introduction session covering Hikvision’s latest HD and IP cameras, including the latest TURBO HD 5.0, Turbo HD 4.0 and Easy IP 3.0 cameras was conducted by Vinit Narvekar, Manager – Customer Trainings, Prama Hikvision India Pvt. Ltd. This session provided the update on HD and IP surveillance trends. It was followed by a technology update on Artificial Intelligence (AI), Hikvision’s Deep Learning Products Range, Face Capture and Face Recognition, UVSS and Machine Vision Technologies. This session was conducted by Mr. Ashish Gujarathi, AVP, Non-CCTV Products, Prama Hikvision India Pvt. Ltd. In the next session Hikvision’s Team introduced EZVIZ smart home products. It was followed by Pyronix intrusion alarm system and its applications across the verticals.
National Roundup
After the lunch break training session continued further with an interactive session about the latest range of Video Door Phone (VDP) by Hikvision and its smart applications. S. Chandrasekhar, Manager Technical Support, Prama Hikvision India Pvt. Ltd. conducted a special session on video door phone and access control trends to provide update on evolving technology landscape.
Appoints
New Country Manager for India & SAARC F
-Secure has appointed Rahul Kumar as the Country Manager for India & SAARC. Rahul is an industry veteran with over a decade of experience in driving teams across large and diverse sales organizations. During his 11 years’ rich and dynamic experience in sales and marketing, he worked closely with companies such as Dassault Systems, Sutherland Global Services, WNS Global Services and more. In his most recent role, he was the Country Manager and Director of data security provider WinMagic, where he spearheaded the sales, pre-sales, marketing, and postsales support for WinMagic in India. “F-Secure is making rapid advances in the realm of cyber security with its forward-looking product innovations and ground-breaking research,” said Kumar, “Cyber security has a great role to play in India as the nation witnesses unprecedented digitization. I am excited to take up the baton at this crucial juncture and am confident that by working together, we will bring about the desired results.” “Rahul has a proven track record in sales management and comes equipped with a profound understanding of the cyber security industry, as well as the broader Indian market. His outgoing and friendly nature further makes him stand
out from the crowd,” said Keith Martin, Regional Director for Asia Pacific and Japan, F-Secure, “We are delighted to welcome Rahul to the F-Secure team and believe he will further enhance our expanding business footprint.” In his new role, Kumar will spearhead the growth of F-Secure’s business in India and SAARC, and reinforce FSecure’s leadership position as a strong, channel-driven cyber security company in the region. Rahul will report to Keith Martin. Nobody knows cyber security like F-Secure. For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber-attacks and data breaches to widespread ransomware infections. FSecure’s sophisticated technology combines the power of machine learning with the human expertise of its world-renowned security labs for a singular approach called Live Security. FSecure’s security experts have participated in more European cybercrime scene investigations than any other company in the market, and its products are sold all over the world by over 200 broadband and mobile operators and thousands of resellers.
SecurityLink India ■ November 2018
27
National Roundup
Participates in TrafficInfraTech Expo 2018 Huge traffic inflow of customers & visitors
D
ahua Technology participated in the recently held seventh edition of ‘TrafficInfraTech Expo 2018,’ an International Trade Fair for Road Construction and Infrastructure Management, in Mumbai, in association with their national partner M/s. Aditya Infotech Ltd. The Expo also conducted conferences on smart and safe mobility during the three days. Over 150 companies including companies from abroad displayed their latest innovations and solutions in traffic management, traffic information and control systems, communication systems, telematics and smart card technology, and others. Speaking on Dahua’s success at the exhibition, Robbin Shen, Managing Director, Dahua Technology India Pvt. Ltd. commented, “We are proud to participate in this important exhibition. The response is indeed heartening.
We displayed traffic and transportation specific solutions. Many security professionals and traffic constables who visited us appreciated our products. The exhibition has given a big boost to our intelligent transportation and mobile surveillance solutions which form critical parts in the mobility ecosystem.”
Solutions showcased
D
ahua Technology showcased its state-of-the-art solutions in intelligent transportation and mobile surveillance. Dahua booth attracted a large number of visitors on all the three days, where their technical team explained the salient features of the products displayed.
Intelligent transportation
D
ahua intelligent transportation solutions deliver crystal clear real-time and recorded images. The latest technologies like ANPR and face recognition work to improve traffic and operational efficiency. Panoramic and thermal cameras also allow for more effective monitoring. Dahua’s rich industry experience brings true value for customers in the form of its latest 4K, panoramic and thermal technology to enable a safer environment, and ANPR, face recognition and intelligent analytics to improve overall operation efficiency. Dahua’s intelligent transportation system (ITS) offers real-time information about traffic flow to passengers/ 28
SecurityLink India ■ November 2018
National Roundup
commuters. It helps monitor traffic, avert road accidents, divert congestion, reduce vehicle emission and so on. It also provides precise navigation for vehicles and saves fuel consumption.
●● Showcases cutting-edge solutions. ●● Traffic cops & security professionals commend Dahua’s initiatives. ●● Registers large footfall.
Mobile surveillance
D
ahua’s advanced mobile surveillance enables drivers, customers, and taxi and bus companies to deal
with safety threats and poor user experience. The solution is able to save time and energy, and also to deliver a
more effective and efficient service. The end-to-end solution uses a reliable video recorder, integrated platform and intelligent technologies to ensure buses and taxis are well guarded and efficiently run. Using advanced technology, the Dahua mobile surveillance provides automatic video storage and smart detection under almost any circumstances.
RackStation RS1219+ Offers Storage Scalability Compact and economical 2U 8-bay Rackmount, a perfect fit for medium-sized businesses
S
ynology Inc. launched RackStation RS1219+, a brand new Synology 2U 8-bay NAS featuring storage scalability and M.2 SSD support to supercharge its performance. With its compact chassis design, RS1219+ is capable of fitting in a Rackstation RS1219+ 2-post or wall mount rack, and is perfect for small as well as medium-sized businesses to jump-start their businesses without a substantial investment in building a data center. Since the total cost of ownership (TCO) is a critical factor and needs to be considered when starting a business, the storage solution one buys not only needs to be comprehensive but also economical as well. Featuring the capability to fit in a 2-post rack due to its 12-inch depth, RS1219+ allows running a business from limited space without unnecessary investment in rail kits or server facilities. “We see the demand for creating mini data centers when available space is limited, especially for the growing businesses,” said Katarina Shao, Product Manager at Synology Inc., “The storage capacity of RS1219+ can be upgraded to 144 TB when connected to one RX418 expansion unit, providing growing companies with a data storage solution that scales with their business. It can be upgraded to enhance performance and reduce latency by using M.2 SATA SSD caching with a dual M.2 SSD adapter card via the PCIe slot without occupying the front drive bay.” RS1219+ runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with quality applications offered to enhance data security and work efficiency. Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget’s storage solution survey and winning PC Mag Readers’ Choice seven years in a row. Synology’s Extended Warranty add-on service (EW202) can be purchased together with RS1219+, available in select regions worldwide, to provide up to five years of hardware warranty coverage. Rackstation RS1219+ back SecurityLink India ■ November 2018
29
National Roundup
Fortinet Expands Security Fabric Offerings on Microsoft Azure with Sandbox and CASB Solutions
F
ortinet® has recently announced the expansion of its Security Fabric offerings on Microsoft Azure, supporting customers with enhanced protection of the expanded attack surface of their hybrid cloud environments. The broad portfolio of Fortinet security offerings on Azure includs FortiGate next-generation Firewall, FortiWeb, FortiMail, FortiManager and FortiAnalyzer. To further expand the portfolio, Fortinet also offers FortiSandbox for Azure, and supports FortiCASB for Azure IaaS and Microsoft Office 365 SaaS solutions. It has also added powerful auto-scaling functionality to the FortiGate next-generation Firewall and extended its Office 365 security solution to Azure. With this announcement, Fortinet is one of the security vendors to offer the combination of multi-layer NGFW, WAF, email security, sandbox and CASB solutions on Azure, providing one of the most comprehensive approaches to multi-cloud security for enterprise deployments available. As organizations migrate their workloads to one or more public cloud infrastructures, they are also expanding their digital attack surface. Securing today’s extended networks requires security solutions that easily span multiple environments without introducing additional complexity. At the same time, the elasticity of the cloud that enables organiza30
tions to adapt as traffic volumes and workflows change also makes it necessary to deploy security solutions that can scale in sync with the cloud infrastructure. Fortinet brought about this expansion to help customers keep pace with these changes without compromising security. The extension of FortiCASB into Azure provides visibility, compliance, data security and threat protection for its IaaS services. FortiCASB provides insights into resources, users, behaviors and data stored in the cloud, while its advanced controls extend security policies from within the network perimeter out to Azure’s IaaS resources and SaaS applications. FortiSandbox for Azure offers a powerful combination of advanced detection, automated mitigation, actionable insight and flexible deployment to identify and stop known and unknown targeted attacks. Its crossplatform functionality also provides seamless security detection and response across the entire distributed enterprise network.FortiMail, FortiCASB and FortiSandbox together offer enterprise organizations a robust solution to secure their Office 365 SaaS applications without requiring traffic to ever leave the Microsoft cloud infrastructure, ensuring better compliance with regulatory requirements by means of increased security. Tightening the integration relationship even further, Azure is also a SecurityLink India ■ November 2018
member of the Fortinet Fabric-Ready Partner program, a premium category of Fortinet’s technology alliance partnerships and a vital part of the Fortinet security fabric. This program enables Fortinet and partner products to better integrate their respective solutions in order to provide more consistent and effective end-to-end security. Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet said, “Expanding network infrastructures and workflows to the cloud requires security controls, policy enforcement and visibility that can span traditional on-premises networks as well as hybrid cloud environments. Fortinet provides Microsoft Azure customers with seamless access to the Fortinet Security Fabric, giving security architects the flexibility they need to deploy consistent security controls where and when they are needed.” “Our mutual customers rely on streamlined and consistent security management to secure web applications and help prevent zero day threats while managing global infrastructures from the cloud. We are pleased Fortinet continues to support Microsoft customers by extending its security fabric platform in Microsoft Azure and make their security expertise available to provide integrated solutions that span on-premises and hybrid cloud environments,” said Ryan McGee, Director, Microsoft Security Marketing at Microsoft Corp.
National Roundup
With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.
Soft Facility Management
Hard Facility Management
Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.
Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.
Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.
www.sisindia.com A 5000 crore Indian multinational company
SecurityLink India ■ November 2018
31
National Roundup
ForeScout and Belden Form Strategic Alliance to Secure Industrial Environments Companies execute on joint strategy to address IT/ OT convergence by providing visibility and automated access controls to secure mission critical networks
F
oreScout Technologies, Inc., a leading Internet of Things (IoT) security company, has teamed up with Belden, a global leader in industrial networking and cybersecurity, to help organizations mitigate detrimental impacts to safety, quality and productivity in their industrial automation and control networks caused by cyber events. Through this strategic partnership ForeScout and Belden deliver secure network access, comprehensive device visibility and dynamic network segmentation capabilities in industrial environments powered by Belden infrastructure. ForeScout formed a strategic alliance with Belden companies, Tripwire, a leading provider of industrial control system (ICS) security-focused technologies featuring the Tripwire Industrial Suite, and Hirschmann, one of the technology and market leaders in industrial networking, to offer a best-of-breed solution for operational technology (OT) security. Research indicates that cybersecurity incidents in industrial control environments originate from multiple vectors such as system vulnerabilities, network architecture loopholes, lack of network segmentation, and unsecured hardware and software configuration . “The convergence of IT and OT is shepherding unforeseen levels of interconnectivity among business networks and industrial automation environments,” said Pedro Abreu, Chief Strategy Officer, ForeScout, “Because OT 32
networks may no longer be air-gapped, threats such as WannaCry and NotPetya targeting traditional IT devices have caused immense collateral damage to OT and industrial environments. Through our strategic alliance and integrations with Belden and others, ForeScout is helping organizations elevate their security posture in critical infrastructure networks.” Given the criticality of uptime and safety for industrial devices, they can be taken down for maintenance or patching only during finite maintenance windows, and it is not always possible to install security software or agents which can impact real-time performance. Belden customers can now leverage ForeScout’s active and passive discovery and profiling techniques in industrial environments to gain device insight without needing to take devices offline. They can also build and maintain an asset inventory of devices across ICS layers, ensure compliance with industry regulations and security standards, and make dynamic, policy-based decisions for network access control within industrial control networks. “Industrial security continues to be a top priority and asset visibility is the first line of defense to prevent intrusions into the network,” said Dhrupad Trivedi, Executive Vice President and Chief Technology Officer of Belden and President of Tripwire, “By partnering, we further strengthen our industrial cybersecurity SecurityLink India ■ November 2018
suite to expand our asset detection and system hardening capabilities while introducing ForeScout’s industry leading network access control and segmentation capabilities to our IT and OT customers.”
Additional benefits include
●● Discover, profile and monitor industrial devices connected to Hirschmann network infrastructure and create a consolidated asset inventory of devices across ICS layers. ●● Gain asset intelligence for devices such as human machine interfaces (HMIs), programmable logic controllers (PLCs), remote terminal units (RTUs), engineering workstations, historians and more. ●● Identify rogue or improperly connected devices on the network to mitigate system risk and avoid accidental downtime and unintended operational disruption. ●● Provide secure network access and minimize security exposure by limiting service personnel and maintenance equipment access to required sub-systems only. ●● Segment assets and sub-systems that share common security requirements into security zones based on factors such as criticality and consequence. ●● Control access to sensitive and confidential data by making network access and dynamic authorization
National Roundup
decisions based on device and user profiles, connectivity location, device integrity and security posture. ●● Orchestrate information sharing and policy-based security workflows with leading IT security and management products including Tripwire IP360 to assess compliance and accelerate incident response. ForeScout Technologies, Inc. helps
make the invisible visible. The company provides Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network. Their technology integrates with disparate security tools to help organizations accelerate incident response, break down silos, automate workflows and optimize existing investments.
Belden Inc. delivers a comprehensive product portfolio designed to meet the mission-critical network infrastructure needs of industrial and enterprise markets. With innovative solutions targeted at reliable and secure transmission of rapidly growing amounts of data, audio and video needed for today’s applications, Belden is at the center of the global transformation to a connected world.
Presents
Latest Homeland Security Solutions at India International Security Expo (IISE) 2018
H
ikvision, the world’s leading provider of innovative security products and solutions, participated in the recently held India International Security Expo (IISE), in New Delhi, and presented its wide range of Homeland Security products and solutions. IISE is India’s leading goods, products and services expo related to the homeland security, fire, law enforcement, and safety industries. The 21st Annual Indian International Security expo was inaugurated by Hansraj Gangaram Ahir, Union Minister of State for Home Affairs, in presence of Vivek Bharadwaj, Secretary, Government of India; L.C. Goel, President and Joint Director, India Trade Promotion Organisation (ITPO); Deepak Kumar, Executive Director, India Trade Promotion Organisation (ITPO); Ajay Kumar Vashist, General Manager – Security, India Trade Promotion Organisation (ITPO); and AP Maheshwari, IPS, Director General, Bureau of Police Research & Development (BPR&D). Mr. Ahir said, “These kinds of security exhibitions are very useful. The modern security systems are necessary for improving the security management. It has to be upgraded from time to time.” Commenting on the occasion Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. said, “India International Security Expo is an important event for the homeland security and government vertical. It presents a good opportunity to showcase security solutions to government representatives and project heads. We participated in IISE with Hikvision’s latest security products and solutions related to homeland security and law enforcement agencies.” He further added, “As the world leading provider of security products and solutions, Hikvision is committed to offer best-inclass technology and innovations for government’s homeland security requirements and customized solutions.” Hikvision booth at the expo showcased the latest products and solutions including intelligent traffic management software system, mobile network recorder, high performance number plate recognition (ANPR) camera, network IR speed dome camera, smart network video recorder, smart IP camera and face recognition camera etc. The event had over 80 companies showcasing their products and services related to the homeland security, fire, law enforcement, and safety industries. India International Security Expo 2018 had representation from surveillance, explosive detection and disposal, fire extinguishers, access control, radio communication, home and automotive security systems segments. Hikvision booth got good response from the government representatives and visitors. SecurityLink India ■ November 2018
33
National Roundup
Axis, Citilog and Genetec
Showcase Best-in-Class Traffic Management Solutions at TrafficInfraTech Expo 2018 The integrated suite of technologies present solutions for effective traffic management, incident detection and support analytics to make roads safer and smarter
A
xis Communications, the market’s leading provider of network video; Citilog, Axis’s arm for intelligent realtime video monitoring for traffic and transportation; and Genetec, a leading technology provider of physical IP security, law enforcement, and analytics solutions, converged at Traffic Infra Tech Expo 2018 to demonstrate their nextgeneration smart and integrated technology offerings. The event brought to fore Axis, Citilog and Genetec integrated end to end solutions for incident detection and management, and effective traffic control mechanism.
Axis is one of the pioneers to promote open protocol, as a part of which, Axis works with many open source software globally and locally. With Citilog in Axis portfolio, Axis has expanded its offering in the traffic segment. The solutions further integrated with Genetec’s unified platform with surveillance and audio capabilities offers city administrators and highway authorities a complete platform for their traffic and city-based needs. Video surveillance has seen a paradigm shift in India with security becoming a priority for both the Government
Axis Communications, Citilog and Genetec at Traffic Infra Tech Expo 2018
34
SecurityLink India ■ November 2018
and enterprises. With an increase in the number of traffic violations and accidents, keeping a track and identifying incident becomes a challenge. Owing to this, the Indian Government is making huge strides to implement smart solutions for making roads smarter and safer. “India’s digital transformation has opened the door of opportunities for the security and surveillance industry. Initiatives like smart cities will lead to convergence of security and operations in the coming days. India is scheduled to take a huge leap in its infrastructural growth with 92 billion dollars being allocated for the development of Traffic & Transportation in the country. Genetec develops innovations that help protect people and physical assets. We aim to aid in the growth of smart cities by providing solutions backed by analytics to make communities feel protected,” said Daniel Lee, Managing Director for Genetec APAC, “At Security Expo 2018, Genetec is showing how our solutions can incorporate data science to correlate information and convert unstructured data into actionable insights that help organisations make data-driven decisions.” The joint association of the Genetec audio surveillance integration, Citilog’s traffic management analytics and Axis’ high frame video cameras will focus on solving some of the real-time press-
National Roundup
ing issues of traffic management. For instance, the complete integrated solution can provide the authorities to automatically play a prerecorded message or make an audio announcement without any human intervention when the platform detects any traffic violation. Another important highlight of Axis and Citilog combination demonstrated at the Expo was the adaptive traffic control system that communicates with the traffic controller and helps managing the timings and relieves traffic congestions at busiest locations across the city. Axis carries a rich lineage of over 35 years in India and understands the pulse of the India market. With an estimation of 15-16% rise in the initial installation, as opposed to the low-cost offering for
The concept of intelligent traffic management is new to India. The journey of video analytics has seen a rapid shift from replaying post-mortem video to adopting pre-emptive solutions. Traffic Infra Expo is a one-of-a-kind vertical specific event that highlights the innovations in the space and demonstrates the impact of its use. At Axis, we are constantly innovating to offer segment specific solutions for the evolving market. The coming together of Axis, Citilog and Genetec has given us a platform to spread awareness on uses of deployment of complete end to end solutions to help the customer make an informed decision in terms of total cost of ownership, reliability and cybersecurity – Sudhindra Holla Sales Director, India and SAARC, Axis Communications smart city programmes by the Government, Axis is upbeat that high-end sur-
veillance solutions will be the need of the hour.
SATATYA CIBR20FL36CWS 2MP IR Bullet Camera with 3.6mm Lens
I
deal for low light conditions, Matrix project series IP cameras are built using superior components such as Sony STARVIS sensor to offer unmatched image quality. This 2MP IR bullet camera with 3.6mm lens is Powered by True WDR to offer consistent image quality withbuilt in intelligent analytics including intrusion detection, trip wire etc., to ensure real-time security. Additionally, it also provides features like H.265 compression technique and automatic motion based frame rate reduction to save bandwidth and storage up to 50%.
Features • The Dark Observer (Sony STARVIS series sensor) – Crystal clear night vision, color images at 0.08lux. • High efficiency video coding (H.265 compression technology) – Saves up to 50% of storage space. • Vision Adaptive (True WDR 120db) – Best image quality even in varying light conditions. • Capture More (Wider Field of View) – 90° horizontal field of view. • Versatility (Adaptive Streaming) – Record more frames during motion, less during no motion. • Analytics – Intrusion, motion detection, no motion, trip wire, real-time security. • Certification – BIS, IP66 CE, FCC, IK10. SecurityLink India ■ November 2018
35
National Roundup
Dahua Technology Dazzles at Infocomm India 2018 D
ahua Technology, in association with its national partner M/s. Aditya Infotech Ltd., participated in the recently held sixth edition of Infocomm India 2018 at Bombay Convention and Exhibition Center, Mumbai. The company received overwhelming response during the show. Infocomm India is one of the nation’s foremost professional audio-visual and information communications technology shows where industry players and experts showcase, share and incubate their ideas, and influencers and
We were happy to see a large number of visi-
tors and prospects on all the three days. We always bring in and display the latest technologies and solutions to our growing customer base in India. The exhibition further demonstrated the interest of Indian customers to our quality and effective products
– Robbin Shen Managing Director, Dahua Technology India Pvt. Ltd. decision-makers seek and find solutions to meet the challenges and demands of the industry.
36
Dahua Technology showcased its state-of-the-art security solutions such as clothing store solution, food store solution, poster display and public view monitor, rental indoor LED wall, MCU Server Plus T552A0, USB camera, and whiteboard and auxiliary site. Dahua Technical team was on hand explaining the operations and usefulness of these important solutions to the visitors. Visitors to Dahua booth were delighted to see its latSecurityLink India ■ November 2018
est products range. “We were thoroughly impressed by what we saw and experienced at Dahua booth. We found each product incredible, relevant and essential. We look forward to seeing more of Dahua products in the near future,” said a group of IT students from a suburban college in Mumbai. More than 200 companies from over 20 countries displayed their latest innovations and solutions in professional audio-visual (Pro-AV) and integrated experience. This year, InfoComm India partnered with All India Institute of Local Self Government, Computer Society of India (Mumbai Chapter), Digital Signage Multimedia Alliance, ICT Academy, and Institute of Indian Interior Designers, Mumbai Regional Chapter. Infocomm India 2018 was organized by the Singapore based InfoComm Asia Pte Ltd, a subsidiary of AVIXA (Audiovisual and Integrated Experience Association™), and was inaugurated by David Labuskes, CEO, AVIXA.
National Roundup
NETGEAR Unveils Insight Management Solution to Augment the Remote Capabilities of Network The solution delivers unified remote monitoring and management for NETGEAR switches, wireless access points and ReadyNAS storage
N
ETGEAR® Inc., a leading provider of networking equipment for homes and small to medium-sized businesses (SMBs), has introduced the new IT revolution for SMB’s with the launch of NETGEAR Insight Pro. The NETGEAR Insight Management Solution is a progressive way to instantly discover, configure, and continuously monitor and manage the selected network of NETGEAR Wi-Fi access points, switches and storage devices. It offers plug-and-play setup and management of the small business network, using an easy-to-use mobile App or a cloud web portal. Custombuilt from the ground up to meet the specific needs of small businesses, the Insight platform allows any business owner or IT professional to discover and setup their NETGEAR devices, as well as update firmware on their Insight managed devices directly from the cloud, from anywhere in the world. The NETGEAR Insight Pro provides a unified, single-pane-of-glass view of the NETGEAR Insight network devices with easy access to both product information and support. It is the answer to the once tedious setup and configuration of devices either in individual device GUI silos or via overwhelming device management tools created for complex enterprise networks. Insight changes the paradigm
Our Insight Pro solutions helps SMEs and the customers build a better relationship. The Insight solution provides businesses a platform where they can manage numerous customers remotely which makes it possible for the SMEs to seamlessly access all information to ensure the business is running smoothly – Marthesh Nagendra Country Manager, India & SAARC, NETGEAR
with its simple multi-device configuration and cloud-based remote access to empower small businesses to manage devices from anywhere. “Businesses benefit from plug-andplay setup and management without the cost of an additional network management device or contracted IT service. Our Insight solutions provides partners and resellers with the tools to make their businesses more efficient with day to day networking tasks and are much more profitable in the long run,” commented John McHugh, Senior Vice President & General Manager, CBU, Product Marketing, NETGEAR Inc.
Key features
●● Unified wired/ wireless network management with data usage monitoring and logs. ●● Remote access with 24/7 visibility and control of all Insight managed SecurityLink India ■ November 2018
●●
●●
●●
●● ●●
●●
●●
devices in your network. Instant automated discovery of select NETGEAR devices and all Insight managed devices. One-tap device registration to simplify and streamline access to NETGEAR support options. Easy-to-use network configuration across devices using the mobile device. Firmware updates across all Insight managed devices in the network. Full remote/ cloud network monitoring and management with no additional cloud controller, appliance, or PC/ server necessary. Email and instant push notifications and warnings on the network and device connectivity and network health. Easy click-through to NETGEAR support for your registered devices. 37
National Roundup
Hikvision Announces
Technology Integration with Videonetics The integration enables Videonetics’ Intelligent Video Management Software (IVMS) to efficiently handle Hikvision H.265+ compressed video streams delivered by Hikvision network cameras
H
ikvision, the world’s leading provider of innovative security products and solutions, has entered into technology partnership with Videonetics, a world-leading visual computing platform development company. The partnership includes integration of Hikvision network cameras with Videonetics’ Intelligent Video Management Software (IVMS), which will enable customers to view, record and analyse Hikvision H.265+ compressed video streams from Hikvision network cameras, both in real-time preview and playback. Customers will also benefit from reduced cost of ownership due to low storage and bandwidth requirements without compromising the video quality.
Working together on intelligent video management
T
he integration will enable advanced video management features and video analytics applications. For example,
38
through Videonetics IVMS, users will be able to view real-time video feeds, recorded video, and navigate quickly from one camera view to another. Moreover, they can also export videos or video image snapshots from integrated Hikvision cameras for advanced video analysis such as object classification, crowd monitoring, perimeter protection, object of interest, smart urban video analytics and traffic monitoring etc.
Boosted by Hikvision smart codec technology
I
mportantly, all video streams will be compressed by Hikvision’s self-developed H.265+ smart codec technology. H.265+ significantly reduces bandwidth consumption and storage requirements. Field tests have shown that Hikvision H.265+ radically decreases the bitrate of ultra-high definition surveillance video
SecurityLink India ■ November 2018
by up to 67% compared to H.265. This is especially valuable when network conditions are unstable, bandwidth is limited, or when customers are required to store data for extended periods of time. “We are glad to be on board with Hikvision as technology partner. I am sure that our IVMS integration with Hikvision’s H.265+ compression technology will help our customers to design highly efficient surveillance solutions for both public and private sectors across the world,” said Avinash J. Trivedi, VP – Business Development of Videonetics. “Hikvision offers a Technology Partner Platform for partners to jointly develop versatile solutions needed by end-users,” said Adler Wu, Global Technology Alliance Manager at Hikvision, “Our H.265+ codec technology provides a more effective compression solution that allows our customers to achieve unhindered video transmission under limited bandwidth conditions and great savings on storage without compromising image quality.”
National Roundup
Beware of ‘Cryptojackers’ Infiltrating Consumer Devices to Mine Virtual Currencies Fortinet cautions users in India to fortify cyber security for computers, media devices and Internet enabled appliances at home
F
ortinet, a leading global player in broad, integrated and automated cybersecurity solutions, has recently issued a security alert that cybercriminals are now targeting media devices and unsecured IoT devices for cryptomining as many of them use powerful GPUs to decode and transcode content in highresolution formats. Media devices are especially attractive targets due to their use of powerful GPUs combined with lax home security, and because they tend to always be powered on, there is a lot of downtime that can be exploited without detection. Cryptojacking is a new technique where cybercriminals sneak malware into computers and other media devices, and then hijack the computer’s processing power to perform crypto-mining. The number of reported cases is rising and cybersecurity experts are warning individuals and businesses about the danger. “Cryptojacking has become a growing concern. Cybercriminals aren’t satisfied with the available supply of vulnerable servers and PCs to hijack in order to mine their favorite cryptocurrency. So, they have added another rich source of computational horsepower to their arsenal – IoT devices,” said David Maciejak, Director of Security Research, Fortinet. Due to the explosion in Internet of Things (IoT), which is projected to con-
nect up to 20.4 billion devices globally by 2020, more and more electronic devices in homes are being connected to a network or Internet. According to Fortinet’s FortiGuard Labs, Hide ‘N Seek (HNS) could be the first in-the-wild malware to actively target vulnerabilities in home automation solutions. HNS is an IoT botnet which targets routers, IP cameras, DVRs, as well as cross-platform database solutions and smart home devices. “As our work and social networks expands and the potential threat footprint in our homes continues to grow, it is critical that we take a fresh look at how we could protect from growing number of networks we interact with. With the prevalence of BYOD (Bring Your Own Device), work devices brought home are also subject to greater risk of cyberattacks,” said Maciejak. Fortinet recommends 3 cybersecurity strategies to protect home networks from cybercriminals:
1. Learn & discover home network
W
ith the increasing number of portable IoT and other devices being installed or used by family members and friends visiting your home, it may be difficult to know exactly what is on the home network at any given time. Even harder is controlling what they are allowed to do. SecurityLink India ■ November 2018
There are a number of security tools on the market today designed for the home that can identify devices looking to connect to the Internet through WiFi network. Many of them can be easily configured to provide them with access to guest network, while restricting and monitoring the kind of traffic they are generating, the applications and home resources they are able to access, the amount of time they can be connected online, and the places on the Internet they are allowed to connect to.
2. Implement a segmented network
●● Ensure that visitors and unauthorized devices are connected to a guest network while critical resources such as financial data should be isolated from the rest of the network. ●● Buy separate wireless access points to separate things like gaming systems and IoT devices from PCs and laptops. ●● Set up a wireless guest network for visitors or new devices. Most access points allow the user to restrict access, set up things like firewalls, and monitor guest behavior. ●● To protect critical resources, consider purchasing a separate dedicated device that is only used for things like online banking. You could also set up a separate virtual device on laptop or PC for banking online. 39
National Roundup
●● As much as possible, keep the work and personal devices separated. Set up a separate connection for work, only connect through a VPN tunnel, and consider encrypting sensitive data traveling back and forth between home and corporate networks.
3. Protect all critical devices & perform regular updates
K
eep a list of all devices and critical applications on the network, including the manufacturer. Set up a weekly routine to check for updates for physical and virtual devices, operating systems, applications, and browsers.
Get antivirus and anti-malware software, keep it updated, and run it regularly. Remember that no software is 100% effective, so set up a regular schedule, say once a month, to use a second or third security solution to scan the device or network. Get a firewall. Most home security packages include a firewall option. Turn it on. Even the default settings are better than doing nothing. Use good password hygiene. Change passwords every three to six months. Use an encrypted password locker to store passwords. Use different passwords for different kinds of things. Don’t mix the personal and work passwords.
Vizag Fintech Festival 2018 A New Story on the Growth Path T
he inaugural edition of Vizag Fintech Festival 2018, an initiative by the Government of Andhra Pradesh and organized by Fintech Valley Vizag was held from 22 to 26 October 2018 at Ho-
tel Novotel, Vizag. Vizag Fintech was one-of-its-kind, and one of the most comprehensive and reputed global platforms in the fintech domain, where India’s key industry
N. Chandrababu Naidu, Hon’ble Chief Minister, Andhra Pradesh (L) and K. Vijayanand, IAS, Principal Secretary ITE&C Dept., AP during the event
40
SecurityLink India ■ November 2018
players of the financial and startup ecosystem came together to discuss industry trends, challenges and market insights including the Indian regulatory framework. The event also showcased product launches, innovations, and augmented the forethought through the exhibition and conference platform. The Vizag Fintech Festival was a 5 day event which saw more than 75 start-ups as exhibitors, and over 2,500 delegates and visitors from around 20 countries. The festival saw the presence of dignitaries like N. Chandrababu Naidu, Hon’ble Chief Minister, Andhra Pradesh; Nara Lokesh, IT Minister, Andhra Pradesh; Ganta Srinivasa Rao, Minister of Human Resources Development of Andhra Pradesh; J. A. Chaudhary, IT Advisor to Govt. of Andhra Pradesh; K. Vijayanand, IAS,
National Roundup
Principal Secretary ITE&C Dept., Andhra Pradesh; and Anoop Singh, IFS, Special Secretary – ITE&C Dept., Andhra Pradesh. Vizag Fintech Festival 2018 also featured a series of exciting events including CXO golf tournament, CXO roundtable, networking reception, comic relief, re-imagine tour, demo day and awards, and site tours. The VFF 2018 conference program included various industry discussions, new insights pertaining to the sector and industry best practices. The conference themes included ankTech, InsurTech, GovTech, Financial Inclusion and EmergeTech. A few topics for the speaker sessions and panel discussions included ‘Future of banking,’ ‘Social impact through Fintech,’ ‘Fintech landscape in India and rest of the world,’ and ‘InsureTech trends.’ VFF 2018 hosted eight keynotes along with panel discussions, case study presentation & fireside chats that brought together stakeholders of the industry on a single platform, allowing exchange of ideas that added value to Indian Fintech ecosystem at large. VFF 2018 also launched a white paper on KPMG Blockchain – Thought Leadership. The white paper was launched by Kunal Pandey, Head – Financial Services in Risk Consulting, KPMG; K. Vijayanand; and J. A. Chowdary. The third day witnessed the unveiling of the world’s first humanoid citizen robot, Sophia. Sophia is a highly soughtafter speaker in business and has showed her prowess and great potential across many industries. She has appeared on stage as a panel member and a presenter in high level conferences, covering how robotics and artificial intelligence will become a prevalent part of peo-
ple’s lives. Her reputation extends beyond business into the global and social arena. She was named the world’s first United Nation Innovation Champion by United Nations Development Program (UNDP), and will have an official role in working with UNDP to promote sustainable development and safeguard human rights and equality. The following day saw the most exciting session of the festival with Sophia engaging in an intriguing interaction with Mr. Lokesh, and the audience. The US$1 million Challenge was being conducted worldwide enabling startups to showcase their products and solutions. With roadshows in 8 major cities (Chicago, New York, San Francisco, Tel Aviv, Paris, London, Hong Kong and Bangalore) around the globe, the challenge culminated in Vizag with 37 finalists from around the world pitching on demo Day. The Government of Andhra Pradesh, in strategic collaboration with its challenge SecurityLink India ■ November 2018
partners, DCF Ventures and Bizofit selected two startups each from Fintech, Agritech and Emergetech, as winners of the first ever US$1 million global startup challenge as the grand finale of the 5 day festival. All the 37 startups had an opportunity to exhibit at the Vizag Fintech Festival 2018 to more than 1500 global delegates comprising VCs, angel investors and corporate partners. All the winners and finalists were awarded prizes by Nara Lokesh. Vizag, with its remarkable technology ecosystem, is now the most attractive destination for innovation driven Fintech players. Not only Indian marquee companies but also several foreign companies have pledged to invest in the city, generating jobs in the near future. Vishakhapatnam is being developed as the most preferred global destination for Fintech and other emerging technology companies around the world, to start their operations and to drive innovation. 41
National Roundup
Announcing Strategic Alliance with Technology Partner for
Field Force Management and Asset Tracking Solutions Industry verticals like BFSI, Education, Retail, Hospitality and Manufacturing will see splurge through these advance solutions
G
lobal Channel Resources India Pvt. Ltd. (GCR), a leading global online B2B ‘partners platform,’ well known for its SaaS connected IoT and networking infrastructure solutions, announced its strategic alliance with one more technology partner for two new tracking solutions – field force management and asset tracking on its partners platform. The alliance is aimed to provide its technology partner a platform to showcase and position field force management and asset tracking solutions, and enable them to offer these to various verticals like education, retail, hospitality, BFSI, manufacturing, and many more. Elated with the strategic alliance, Tony Tsao, Founder & CEO, GCR commented, “Offering the just right experience to the customer is increasingly becoming vital in the industry. Gauging the customer’s preferences continually is the crux to success. These two tracking softwares will certainly create a wave in the market that will build an improved customer service experience along with strong and collaborative alliance of MSPs/ ISVs/ Sis on our partner’s platform.” There is a need of a certain sense of discipline and streamlining of field operations; and this is one of the reasons for why it is important to automate certain tasks with field personnel and operations. GCR’s Field Force Management software comes with web-based access for command center and administration, and also a smartphone based user-friendly application for field personnel. This is a 42
The latest solution is a tool
for field force management and is an advantage to any of the industry or organization for greater collaboration among the field service staff, simplifying the core field scheduling and ensuring productivity – Amod Phadke Director, Sales & Marketing, GCR solution to manage field force effectively and increase their productivity. With various authentication mechanisms such as geo-tagging, location time and input validation and assigning tasks, expenses, approval process and performance of the team can be measured on real-time basis against pre-defined KPIs/ KRAs. The software further helps in reducing errors in data gathering from remote sites. While managers/ admin can track individual or team’s performance through numerous reports and dashboards available in the web application, it also enables a field employee to track his/ her own performance through various reports, dashboards and assigned tasks status features available in the mobile app. It enables to keep a record of all SecurityLink India ■ November 2018
interactions and important data within a database, without a person having to manually go through sales receipts, complaint slips, and other such details. “The feature rich field force management solution empowers you to be connected and in control all the time. It automates what can be automated and leaves only the most human-human interactions for your staff,” said Amod Phadke, Director, Sales & Marketing, GCR. GCR’s IoT based Asset Tracking SaaS-enabled solution using BLE (Bluetooth Low Energy), a new approach and implementation of new technology, enables industry/ enterprise for their step towards digital transformation. This tracking solution provides key features like asset trace log on a periodic basis and geo-fence breach alerts. It also allows reports to be transformed into actionable insights in real-time which further helps drive the operational efficiencies. “We are excited to be partnered with GCR. They have an incredible team and a strong partner relationship to understand our objectives. They can find not only the right channel friendly vendors more efficiently, but also can minimise our time to go-to-market. The key factor of GCR is that they have a revolutionary online partners’ platform where integration partners can find our SaaS enabled products, and in turn, lead us to the faster penetration in to their respective end-customers,” said Vijay Mysore, Technology Partner of GCR for Field Force Management and Asset Tracking Solutions.
National Roundup
For Exhibiting and more information please contact: Jay Sheth / jay.sheth@nm-india.com / +91 9967971606 I Renu Saldanha / renu@fsai.in / +91 98440 05709 Supported For Exhibiting and more information please contact : By
Official Publication
Media Partners
SecurityLink India â– November 2018
43
white paper
ModerniZation of Homeland Security Staying Safe in a ‘Smart’ World T
he term Homeland Security denotes ensuring the safety and security of the nation and its citizens. In today’s rapidly changing world, this translates to providing protection against a wide range of vulnerabilities – from terrorist attacks and cyber threats to natural disasters. The various aspects of homeland security can be broadly categorised as follows: ●● ●● ●● ●● ●● ●● ●●
Law and Order, Border Management and Port Security, Supply Chain Security, Cybersecurity, Critical Infrastructure Protection, Emergency Management, Threat from External Elements.
Since its independence in 1947, India’s approach to homeland security has predominantly been centred on border protection and ensuring law and order. The country’s long-standing focus on these aspects can be attributed to its strategic location, volatile neighbourhood, and periodic communal instability. This narrow view is rapidly proving to be insufficient for coping with new security challenges created due to technological advances. While modernisation and the use of ‘smart’ technologies is bringing the world closer and stimulating global economy, it has also led to an increase in the number and variety of security threats faced by nations. To address these new and old challenges alike, there is an urgent need to upgrade India’s Homeland Security apparatus, and to develop a robust network within the country. 44
SecurityLink India ■ November 2018
white paper
With a nation at war against terrorism, insurgency and crime, our men and women on the front line
defending our homeland need to be provided with all necessary resources on priority.
At the all India conference of DGPs and other top security and police officers, the Hon’ble Prime Minister spoke about ‘SMART’ policing where ‘S’ meant strict but sensitive, ‘M’ meant modern and Mobile, ‘A’ meant alert and accountable, ‘R’ meant reliable and responsive, and ‘T’ meant techno-savvy and trained. Considerable thought would have gone into his new acronym in which he has two meanings for each letter, which certainly addresses most of the responsibilities and expectations from today’s police force across the country. Hon’ble Home Minister Shri Rajnath Singh has repeatedly proclaimed, “More investments are needed for the modernization programme. Homeland Security is one of the important areas for the nation’s economic development. If border management is proper, only then is internal security ensured.” Developing a comprehensive security plan requires methodical and deliberate analysis. Man and machine together only can ensure such security of institutions and the national borders. Selection of the right personnel, their effective training and providing them with all that is necessary for their effective performance are of highest priority. Safety measures will include electronic security systems, physical barriers, security personnel, intelligence gathering, policies and procedures. D. R. Kaarthikeyan Chairman – National Council on Homeland Security, ASSOCHAM
Overview of Homeland Security Sector in India
omeland security in India ments which fall under the state government agencies such as the central armed police forces (CAPF), state police forces, anti-terrorism squads, intelligence bureau (IB), island development agency (IDA), central bureau of investigation (CBI), narcotics control board (NCB) etc. Capital expenditure for these agencies by the central and state governments is the primary driver of the homeland security market in India, which represents a potential USD 2.73 billion for the year 2018-2019. Some opportunities are also present in the private sector and export markets. Much of this potential is created due to police modernisation, critical infrastructure protection and counter terrorism efforts of the government. In 2018, the budgetary allocation to the Minis-
current infrastructure.
187 629
USD Mn
H
try of Home Affairs (MHA) was around USD15.8 billion, a
In 2018, the budgetary allocation to Ministry Home Affairs (MHA) was around 15.8 growth of 10% over theof previous year. Around 8% USD (USD1.3 billion, a growth of 10% over the previous year. Around 8% (USD 1.3 billion) of the total budget comprises numerous has elebillion) the total budget hasSecurity been allocated towards been allocated towardsof modernisation of Homeland forces and up gradationmodof jurisdiction of centralcurrent and infrastructure. ernisation of homeland security forces and upgradation of
132 257
0
100
200
300
400
500
600
Capital outlay for CAPF
Development of Police Infrastructure
Modernisation of Police Force
Development of Border infrastructure
1 1: Selectofbeneficiaries of the budget allocation Figure 1:Figure Select beneficiaries budget allocation by MHA (2018-2019)
700
by the MHA (2018-2019) The total budget earmarked by state governments for modernization of state police forces, and up gradation of state police infrastructure is USD 132 million. An additional provision for Security Related Expenditure (SRE) of2018 USD 332 million has been made for Left Wing Extremism (LWE) SecurityLink India ■ November 45 affected areas.
US
132
white paper 0
100
257
200
300
400
500
600
700
Development Police Infrastructure The total budget earmarked by ofstate governments for Development of Border infrastructure modernization of state police forces, and upgradation of state infrastructure USD132 million. An1 additional Figurepolice 1: Select beneficiaries of budget is allocation by the MHA (2018-2019) The total budget earmarkedfor by state governments forexpenditure modernization of state police forces, and up provision security related (SRE) of USD332 gradation of state police infrastructure is USD 132 million. An additional provision for Security million has been made for left wing extremism (LWE) afRelated Expenditure (SRE) of USD 332 million has been made for Left Wing Extremism (LWE) affected areas.fected areas. Capital outlay for CAPF
Modernisation of Police Force
162 96
USD Mn
88 86 63 63 62 60 51 41 0
20
40
60
80
100
120
140
160
Telangana
Maharashtra
Andhra Pradesh
Uttar Pradesh
Tamil Nadu
West Bengal
J&K
Haryana
Bihar
Karnataka
180
2 Figure Figure 2: Top2: 10 capital outlay for Homeland Security Top states 10 states by by capital outlay for Homeland Security (2018-2019) (2018-2019)
urce: Ministry of Home Affairs, KPMG Analysis urce: State budget speeches, KPMG analysis
Need for modernisation of Homeland Security
I
ncreased government spending on infrastructure development and modernisation is much needed, with state and central police forces facing multiple challenges. With increased allocation of funds to homeland security, there is a pressing need for overhauling its physical, procedural and technological architecture, to address new and emerging threats. Some of the most pressing issues are:
New security threats due to use of ‘smart’ technologies
N
ew technologies such as crypto-currency, artificial intelligence (AI), cloud computing, Internet of Things (IoT) etc., remain vulnerable to being accessed by cybercriminals. AI is one of the fastest growing segments in technology and as it gets increasingly adopted across industries, manufacturing and service sectors, it exposes more and more corporations, entities and government agencies to being accessed by remote hackers. These hackers could be state sponsored or may have tacit backing of governments with dubious designs. As AI enhances along with the adoption of technologies such as drones and manufacturing robotics, their share of participation in numerous tasks is expected to increase. This includes medical/ radiological diagnosis, driving vehicles, writing specific types of news reports, and others. 46
Critical infrastructure such as computers at power plants, nuclear reactors, space launch centres and even sewage plants are some of the vulnerable targets for a country. Countries such as Israel have stepped up to address this increasing threat of AI and associated cyber warfare. The Israeli Defence Forces’ Unit 8200 has been developed to not only engage in targeting critical cyber infrastructure of perceived threats, but also coordinate with other internal and external security agencies to address risks posed by cyber-attacks on Israel. The use of crypto-currencies is another new area, which is associated with the use of ‘deep web’ or ‘dark net.’ According to the Interpol, the dark net is a large section of the internet which cannot be detected by search engines. This dark net can be used to conceal identity, assure anonymity and therefore, allow criminal organisations or even terror networks to conduct their illegal enterprise with impunity. This may include activities such as selling drugs or weapons, illicit gambling, and trading in counterfeit identity documents or child abuse material. Since crypto-currencies are not backed or monitored by any national or central banks, these can be and are often utilised in transactions of questionable nature, especially through the dark net.
Greater exposure to threat of terrorism
T
errorism continues to be the biggest threat for India’s homeland security, due to its strategically sensitive location. India faces an array of threats from organisations from over 35 terrorist groups within its borders which are banned, or are under the government watch list. Terrorism in the past used to be restricted to border areas and far away conflict zones, but today it has reached urban centres and is designed to cause maximum casualties (unlike the hostage crisis situations of the past). Whether it was the Mumbai attack on Taj Hotel in 2008 or the April 2010 attack on a central reserve police force (CRPF) camp in Chhattisgarh, these attacks are executed with the idea that the attacker would not be able to survive. Along side, the presence of sleeper cells (disgruntled individuals who have no backing but can be made to work against the state) gives a completely new dimension to terrorism, both home-grown and external.
Inconsistent information collection and sharing
T
he homeland security apparatus in India remains highly fragmented and is faced with technological obsoles-
SecurityLink India ■ November 2018
white paper
cence which limits the speed of inter-agency coordination and impact of joint operations. Much of the criminal and threat database has remained disconnected across the country, allowing slippage and inefficiency. Currently, there is a lack of a fully-developed, inter-agency accessible, common platform unlike that of those available in the United States, United Kingdom and other developed countries. Given the presence of over 12 different internal security agencies distributed across customs, ministry of finance, ministry of home affairs and other departments – both state and central government backed – there is a need to establish a homogenous homeland security database which is accessible to all law enforcement agencies.
Poorly equipped and trained state security forces
W
hile major internal security counter-terror services such as the CRPF, the central industrial security force (CISF) and national security guard (NSG) are adequately trained and equipped to handle internal and external threats, the standards across state-managed ap-
paratus of the internal security remains highly scattered and uneven. Factors such as threat perception, political limitations, budgetary allocations etc., have played a major role in the uneven equipping and training standards of the police forces of different states in India. There is an urgent need to develop a system to ensure that all state police forces meet minimum equipment and civil training standards. This includes training in the use of modern equipment such as radio communication devices, use of law enforcement technologies available on smartphones, and even training to use unmanned aerial vehicles to conduct surveillance, disaster management, public relief and so on. Modernisation of India’s homeland security apparatus is required in four key areas: ●● Modernisation of physical assets of the police forces. ●● Adoption of technologies in gathering criminal investigation, forensics and information management. ●● Cybersecurity. ●● Training and continuous evaluation.
Security and peace are the prerequisites and essence of good governance for the civilized existence of a society. They will be achievable only with everyone’s cooperation, an intelligent policy, and consistent practices. As so rightly said by Ajit Doval, National Security Advisor – “The fourth generation warfare is more about being prepared to tackle internal security challenges by the police than facing external aggression by the Army” – which reflects the importance of homeland security. It is very encouraging that Government of India through its umbrella scheme of Modernization of Police Forces (MPF) has approved financial outlay of INR25,060 crore for over three years period (2017-18 to 201920), out of which the Central government’s share is INR18,636 crore and the States’ INR6,424 crore. Special provisions have been made under the schemes for internal security, law and order, women’s security, availability of modern weapons, mobility of police forces, logistical support, and hiring of helicopters and e-prison, amongst others. Sandeep Jajodia President, ASSOCHAM
SecurityLink India ■ November 2018
47
white paper
Most security experts today believe that challenges for homeland security are not only ever changing but
they have become a different sort of conflict between the criminals and the stakeholders. Every new security incident brings a new face of terror that is totally unexpected and based on the spirit of creating complete disaster. Although it temporally demoralizes the spirit of our security forces but never defeats their main objective of winning over these challenges. One incident leads to one counter preparedness, and it starts giving a feel of a viscious unending circle with an undue edge to the criminals and terrorists on account of the loss of human life and assets. The authorities often find themselves at back foot in spite of their best devotion towards their duties and planning. The experts rightly feel that the edge of winning this battle lies in the effectiveness of the mitigating process that involves advance technology based security equipment and conceptual planning. Anil Dhawan CO-Chairman, Homeland Security Committee, ASSOCHAM
Given the various threats faced by the country, the Indian Government has already taken several key initiatives to upgrade the nation’s security apparatus: ●● In line with promoting e-governance and digitisation, the government’s National Crime Records Bureau (NCRB) has taken the initiative to develop Crime and Criminal Tracking Networks and Systems (CCTNS) to create a comprehensive and integrated system for effective policing in the country. One of its key features include nationwide tracking by integrating over 14,000 police stations across India. ●● Efforts are also underway to form India’s first National Counter Terrorism Centre (NCTC), which will act as a multi-agency coordination centre, under the ambit of the Intelligence Bureau. ●● In addition to formation of tangible agencies, the government is developing an inter-agency database for domestic intelligence data known as National Intelligence Grid or NATGRID, which will comprise information from databases of 11 agencies in India. In spite of these measures, a significant gap still exists between the current capabilities of India’s homeland security agencies and the capabilities required to effectively counter rising threats in today’s ‘smart’ world. In order to bridge this gap, the country’s security forces need to absorb learnings from the technological applications and innovative solutions being developed globally. 48
Innovation for Homeland Security: Recent trends
W
hile technological advancements present significant new risks for homeland security, cutting-edge technology can also be leveraged in order to mitigate rising security challenges and to ensure greater public safety. The following examples are indicative of recent trends in technological innovation for homeland security:
Policing using social media analytics
V
arious government agencies have commenced experimenting with social media analytics for surveillance, profiling and predictive analytics with the help of start-ups offering data analytics solutions tailored to law enforcement needs. In 2017, the government set up India’s first National Media Analytics Centre (NMAC), which is formed as a special cell under Indian National Security Council Secretariat, which in turn is under the Prime Minister’s Office (PMO). This was established as a measure to assess any form of threat in blogs, media channels, news outlets and social media platforms. The tracking algorithm used by NMAC is expected to generate tags to classify post and comments on social media into negative, positive and neutral categories, paying special attention to ‘belligerent’ comments, and also look at the past patterns of posts.
SecurityLink India ■ November 2018
white paper
A major project under the government has been developed by the Defence Research Development Organisation (DRDO)’s Center for Artificial Intelligence & Robotics (CAIR), designed to intercept and analyse internet traffic using pre-defined filters. The project, while being implemented in bits and phases, will be installed at the ISP (Internet Service Provider) level in over a thousand locations across India. The basic idea behind NETRA is to enable real-time detection of suspicious ‘keywords’ and ‘key phrases’ in social media, e-mails, blogs, tweets, instant messaging services, and in other types of internet content. This form of technology is already being used by the Maharashtra Police. Known as the ‘Social Media Lab’ the software is designed by a Delhi-based private technology firm and was launched in 2015. The software algorithm used by the lab is designed to track and analyse conversations on social media platforms and also detect specific patterns of keywords. The software is capable of monitoring 18 social media platforms and 100 websites in real-time, supporting over 32 Indian and 25 international languages. The main objective of the software is to track and provide sentiment analysis, identify behavioural patterns, influencers, track increase in chatter and generate alerts in real-time on social media platforms.
Biometric passenger screening at airports
E
nhancing security while easing the passenger screening process is a prime concern for authorities world over. Biometric identification systems are being explored by multiple airports towards the creation of ‘trusted traveller’ programmes. The United States has a comprehensive trusted traveller programme, which is directly under the Department of Homeland security. These programmes provide optimised screening for pre-approved members, which in turn, helps in improving security by being more efficient during passenger screenings and facilitation of legitimate trade and travel. In India, a similar pilot project has been successfully tested at Bengaluru and Hyderabad airports, where the government is enabling the concept of ‘digiyatra’ through the use of Aadhar card as boarding pass for passengers. While the linking of the air ticket to Aadhar card is not mandatory, those passengers who do, in a way will be able to create a digital data trend of travel for the government agencies.
Use of unmanned surveillance aircraft
T
he US Customs and Border Protection has begun using unmanned surveillance aircraft to help provide aerial
The Hon’ble Prime Minister’s concept of smart policing is lauded and widely appreciated by the industry
as we believe that our nation’s homeland security needs to be improved a lot, and further modernized to face the emerging threats in the current scenario.
In today’s ‘smart’ world, homeland security is limited not only to the traditional aspects of border security and internal policing, but encompasses new challenges such as cyber threats, loss of classified information etc. At this critical juncture, private entities can play a crucial role in shaping the security practices and standards in India. However, in order to do so, it is imperative that the industry receives adequate hand holding from the government in terms of conducive policies, processes and incentives. Uday Kumar Varma Secretary General, ASSOCHAM
SecurityLink India ■ November 2018
49
white paper
India aspires to become a net exporter of security equipment by 2025. To address this, the government
is looking at harnessing the country’s strengths in specialised areas such as IT technologies for more serious security threats. Some of the pressing areas of internal security include developing seamless inter-agency connectivity, digitalization of police, paramilitary, anti-narcotics and enforcement agencies’ records, developing a national level crime-monitoring database, usage of e-police stations and digitizing police processes. Enhancing homeland security therefore, becomes not just the responsibility of a single agency or ministry, but a collaborative effort across the government ecosystem. This, when done hand-in-hand with the innovative private technology sector, can deliver optimal results through securing the nation’s interests, and creating India’s first internal security market, which will address the long-term issue of imports of security equipment. KPMG is committed to making a contribution towards this goal by enabling and encouraging the government to look into all aspects of India’s defence manufacturing sector. Amber Dubey Head – Aerospace and Defence, KPMG in India surveillance footage. Other private and government agencies are attempting to develop smaller surveillance drones for use in urban areas. With the release of government’s remotely piloted aircraft systems (RPAS) policy in August 2018, state and central security agencies can now be cleared to utilise drones in security monitoring. The Government of India has approved the use of micro-drones by CRPF to be used in conflict zones such as Jammu & Kashmir and the LWE affected areas for surveillance and monitoring activities.
into neutron resonance fluorescence imaging, which can scan large amounts of cargo or luggage down to an atomic level, and quickly detect the presence of hazardous materials. While primarily aimed at utilisation by government agencies, private enterprises play a significant role in the development of these technologies and devices. Apart from technological research, the private sector is also heavily involved in a multitude of activities and services related to homeland security throughout the world.
Computerised behavioural pattern recognition
Private participation in enhancing public safety
he practice of behavioural pattern recognition (BPR), developed in Israel, uses highly trained airport screeners who can detect passenger behaviours such as facial expressions, that may indicate malicious intent. The success of this program has led to research being conducted into computerised systems that could perform the same task. Additionally, such a computer program could use sensors to analyse a person’s vital signs, like blood pressure, pulse rate, and perspiration.
he private sector possesses a wide range of capabilities and assets that can be harnessed to enhance preparedness against security threats. In general, private industry contributes to various countries’ security apparatus in the following ways:
T
Advanced detection devices
B
iotechnological research is being conducted by Tetrahertz radiation (T-ray) imaging devices that can detect an object’s chemical composition. Research is also being conducted 50
T
Manned security services
A
sizeable portion of any nation’s critical infrastructure is privately owned. Thus, private industry has a large stake in minimising direct financial impact on infrastructure or operations due to security threats. Today, the private security industry is involved in a wide range of security functions including protection of property and critical infrastructure, protection of intellectual property and protection of sensitive information.
SecurityLink India ■ November 2018
In many countries, these agencies are also contracted by various public sector clients and government departments for provision of security services, ranging from prison security and beat patrolling, to private railway and port police forces. Given that private security manpower outnumbers police forces in a number of countries, this diversion of resources is efficient and much-needed. 2,700,000
China 1,400,000
India
United States
800,000 1,100,000
Brazil
687,684
Russia
601,000 800,000
1,700,000
5,000,000
7,000,000
white paper
ment of various high-tech security solutions, such as cybersecurity applications, advanced detection systems and integrated, computerised systems for building safety and security. The global security systems market is expected to grow to approx. USD125 billion by the end of 2018.
Public private partnerships
T
he following efforts are being made by various government agencies towards improv245,072 Germany ing private sector participation to address home247,000 land security challenges: 0 1,000,000 2,000,000 3,000,000 4,000,000 5,000,000 6,000,000 7,000,000 8,000,000 a. Creation of a government body Police officers Private security workers specifically for the promotion of Public-Private Partnerships in Homeland Figure3: Estimated number of privateofsecurity workers and police officers for police select countries 7 Figure3: Estimated number private security workers and Security: The office of public private partofficers for select The global manned security services marketcountries is dominated by large players such as Securitas nerships, Department of Homeland SecuAB (Sweden), U.S. Security Associates, Inc. (U.S.), and G4S plc (U.K). In 2017, the global Manned Security Services market size was approx. USD 42 billion, and it is expected to In many countries, these agencies are also contracted by rity Science & Technology (DHS S&T), grow at a CAGR of 9.5% to reach approx. USD 86 billion by the end of 2025 8. various public sector clients and government departments for USA engages the private security industry and 5.2 Security systems, solutions and equipment provision of security services, ranging from prison security facilitates collaboration to develop commerAs crime rates increase, the need for security systems and equipment is also increasing. cial technological solutions for national security. and beat patrolling, to private railway and port police forces. Governments, corporations, residential complexes and private individuals alike are investing Given that security outnumbers police protection of Programs of significance that are supervised by this substantially intoprivate smarter systems andmanpower solutions towards ensuring adequate people, and information. body include S&T’s long range broad agency anforcesproperty, in a number of countries, this diversion of resources is Access control systems or biometric security systems are installed in all public and private nouncement (S&T LRBAA) which invites technolefficient and much-needed. organisations to safeguard against the risk of unauthorised access. Buildings and structures ogy related proposals to solve security challenges In 2017, the global manned security services market size are fitted with various safety systems such as fire protection systems, alarm systems, surveillance systems, scanning equipment andisITexpected security systems. on a standing basis. The operational experimentation was approx. USD42 billion, and it to grow at a program allows for coordination between homeland CAGR of 9.5% to reach approx. USD86 billion by the end 7 Source: Statistica 8 security end users and private technology innovators of 2025. Source: Media reports, KPMG Analysis to evaluate cutting technology in operational settings Security systems, solutions and and facilitate demonstrations for security operators. equipment b. Facilitation of interactions with private industry: Varis crime rates increase, the need for security systems ous government agencies facilitates coordination beand equipment is also increasing. Governments, corpotween public and private entities towards integrating rations, residential complexes and private individuals alike efforts in a wide range of homeland security related acare investing substantially into smarter systems and solutions tivities such as disaster response and relief, cybersecutowards ensuring adequate protection of people, property, rity, infrastructure protection etc. and information. c. Employing private agencies to carry out security Access control systems or biometric security sysfunctions typically performed by government agentems are installed in all public and private organisations cies: Private companies that meet certain threshold to safeguard against the risk of unauthorised access. criteria are qualified to carry out public security funcBuildings and structures are fitted with various safety tions typically managed by government agencies. For systems such as fire protection systems, alarm systems, example, under the screening partnership program surveillance systems, scanning equipment and IT secu(SPP), customs duties at US airports can be carried rity systems. out by screening companies that meet certain threshThe advent of ‘smart’ technology has led to the developold criteria. Japan
246,800 459,305
A
SecurityLink India ■ November 2018
51
white paper
Leveraging private industry for Homeland Security in India Current scenario
I
n comparison to the global situation, the contribution of the private industry in India to homeland security is fairly limited. The private homeland security market in India is still at its nascent stages. It has been dominated by unorganised players, and characterised by low-cost operations, missing corporate governance, low wages, no statutory compliances and lack of employee welfare. The private security industry in India has witnessed more than 20% growth in the recent past owing to rapid infrastructural and economic development. However, this growth is largely driven by the private manned security industry, which, with nearly 8.5 million people employed and the potential to employ 12 million people by 2020, is one of the largest employers in India and is continuously growing. Currently, the unorganised sector dominates the market with 60% of market share, however, by 2020 the organised sector will catch up with the unorganised sector with equal market share. Significant growth has also been achieved by the security systems, solutions and equipment industry in India. Over the last few years, the security systems and solutions market in India has witnessed a strong CAGR of 25% and is expected to grow at 18% in coming years. Security and Surveillance is one of the fastest growing industry in India, the market size of the industry from the current $1Bn is likely to grow 2.5 to 3 folds by end of 2021.
Opportunities and challenges
T
he private security industry has multiple avenues for growth, especially for solutions involving integrated and automated security and hi-tech electronic systems. Integrated solutions such as CCTVs, intrusion detection, fire alarms, glass break detectors, panic buttons, access control with systems such as HVAC, lighting control and D2H have witnessed an increased demand. On the other hand, automated fire alarm system including smoke detectors, gas, flame and heat detectors and indication panel for fire will drive demand in commercial complexes. However, the industry in India has little involvement when it comes to innovation, research and development for homeland security. Some key challenges faced by private players, which prevent them from playing a more active role in the country’s homeland security, are as follows: 52
●● Limited scope for partnerships and technology transfer: Most of the country’s solution and equipment requirements for Homeland security are fulfilled through import, thus limiting opportunities for the indigenous industry to absorb technology development capabilities. Some amount of domestic innovation for homeland security is undertaken by the Defence Research and Development Organisation (DRDO). However, this public entity rarely solicits partnerships with private entities for research and development towards finding solutions to challenges in homeland security. ●● Lack of information on procurement process: The state and central home ministries in India currently procure homeland security equipment and solutions based on independent requirements and processes. This creates a very fragmented market, with low visibility of future requirements for private entities. ●● Competition from unorganised sector of manned security providers: Low prices of services, coupled with noncompliance with regulations, have been the operational mode for some unorganised players. This results in lower quotes from the unorganised sector players. The quality of such players is not up to the mark. All these factors have posed a challenge to market players which are known to deliver quality services compliant with sector regulations.
Way forward
I
n the face of rising security threats, the need for upgradation and modernisation of the homeland security apparatus in India is apparent and urgent. The government can consider taking the following steps to develop systems, technologies and methodologies within the country’s homeland security ecosystem:
Develop a continuous improvement database system
W
ith the evolution of digital technology, data-driven decision-making will become a key approach in deciding matters pertaining to national and internal security. Therefore, all agencies responsible for homeland security need to plan and develop a data flow system, with a centralised server system, which would enable easy accessibility through a single interface of all records. This access of data may be classified and assigned on the basis of the rank of the accessing official. This information system would need to be placed under
SecurityLink India ■ November 2018
white paper
an autonomous inter-agency coordinating body, which sits between the Ministry of Home Affairs and Ministry of Defence. This would be to ensure easier information access and exchange without any procedural complexities.
Greater access within central and state home ministries
A
special body, with functions similar to those of the office of public private partnerships, US Department of Homeland Security can be set up within the Ministry of Home Affairs (MHA). The MHA could also encourage individual state governments to set up similar bodies within their home ministries. The creation of such an entity would ensure greater interaction and better engagement between public and private homeland security agencies.
Develop specialised intelligence team for future technology threats
A
dedicated cell consisting of technical experts must be formed to employ big data analytics, behavioural pattern recognition, and media monitoring and detecting automated or AI-based attacks. While cyberwarfare has been an existential threat, elements such as cryptocurrencies, AI and self-replicating artificial agents pose a threat like never before, especially to national strategic assets such as power plants, drainage systems, space industry etc.
Employment of private security agencies by public entities
G
iven that the strength of private manpower is 5x more than police forces in India, it would be prudent for homeland security policy makers and government departments of the country to consider employment of private security providers for public safety functions, post appropriate training and qualification.
Strict enforcement of regulations in manned security services industry
T
he quality of manned security services in the country can be significantly improved through better regulation. Minimising the involvement of the unorganised sector in provision of security services will not only improve the overall private security standards in India, but will also lead to better employment conditions for workers in this industry.
Promotion of indigenous capabilities for development of HLS solutions
I
ndia’s modernisation requirements in homeland security have created significant opportunities for suppliers of security solutions and equipment. However, given the nascent state of domestic capabilities in research and development for security, most of the requirements for security equipment are fulfilled through imports. The government can intervene and encourage the development of indigenous solutions to address the country’s requirements. This can be achieved through policy initiatives that incentivise partnership with and transfer of technology to Indian solution providers by foreign developers and manufacturers.
Streamlining of procurement process
T
he creation of a streamlined, single-window process for all homeland security acquisitions in the country would create greater transparency, and would allow the private sector to strategise and plan their long-term investments.
Smart transportation and infrastructure planning
S
mart cities have been launched in India with the promise of enhanced community service, better public infrastructure management and enhanced safety mechanisms. A key component of this smart city system is the presence of intelligent transportation systems. With the ambitious aim of having over 100 smart cities in India, the government needs to start working on a security capability study to understand all possible systems which would be connected through digital networks. This could include public Wi-Fi services, public transportation modules on buses, taxis, integrated government payment systems such as BHIM, gas pipeline pressure and supply monitoring system, power regulation systems, and even private security monitoring and surveillance. All these systems when connected through a network, are susceptible to vulnerabilities of hacking and even industrial sabotage. With the development of smart cities, the government requires planning and implementation of right detection systems, analyse data patterns, identify vulnerable exposures and be able to make intelligent decisions leading to decrease in public spending costs, better tracking of possible threats and averting disasters. This planning would essentially be needed at individual state levels, with a defined process for centrestate coordination to address unforeseen complications.
SecurityLink India â– November 2018
53
application/ case study
Combating Counterfeiting and Creates VIP Experiences for Consumers with
IoT-based Brand Protection Solution
P
rotecting major brands against counterfeiting and grey market activities is a global challenge, which yields the same result regardless of the industry – i.e., lost sales and a poor customer experience that are damaging to the brand. HID Global® has responded to this escalating issue by increasing its investments in HID’s IoT-based brand protection services and expanding its community of partners who develop and deliver seamless front-end experiences to global brands and consumers. These initiatives are bringing peace of mind to both manufacturers seeking to safeguard their brands and consumers who want to verify the authenticity of their purchases in a trusted IoT environment. HID Trusted Tag® Services make this possible by securely authenticating products from the time of production, through every step of the distribution process, and at the point of consumer sale – all with a simple tap of an Android or iOS phone. “As a pioneer of brand protection, HID is able to quickly leverage Apple’s NFC read capabilities to drive mass adoption and help the average consumer avoid being duped by counterfeit products,” said Mark Robinton, Director, Business Development and Strategic Innovation at HID Global, “Our solution goes beyond adding trust to the global supply chain. It also opens a secure channel for brands to engage directly with consumers as part of their brand loyalty strategy.” HID trusted tag services enable brand protection and engagement around the world: In the United States: New York based partner Blue Bite has 54
launched an authentication suite, which uses HID trusted tag services for major European brands, in partnership with Italy based Temera. “Brands are adopting product authentication to help protect against the negative effects of counterfeiting,” said Mikhail Damiani, Blue Bite CEO, “We’ve developed a highly secure and scalable authentication solution that uses the power of NFC to empower both brands and customers alike in their fight against this growing issue.” In Canada: Toronto based partner Authentic or Not is working with HID to provide a secure brand authentication experience to major brands. Ahmer Beg, Founder and CEO of Authentic or Not added, “With our patented technology, we are in the business of adding intelligence to products and unlocking real-world engagement with consumers. HID trusted tag services provide the secure bridge between products and the digital world to make this possible. We see a future where counterfeit goods can be easily rooted out and brands can provide customers with VIP experiences through our platform.” In the United Kingdom: London based partner Skute is using HID trusted tag services to unlock realtime, hyper-personalized experiences for a new wave of fan engagement. “Our platform is shifting the paradigm in fan engagement by giving consumers secure, authentic and direct access to their favorite musical artist, athletes, teams and brands – all via a variety of creative form factors so organizations can facilitate exclusive direct marketing experiences. SecurityLink India ■ November 2018
This exclusivity translates to the younger market too in industries such as gaming, toys and music, where Skute gives parents peace of mind that their children can safely engage with various channels in a ‘ring fenced’ IoT ecosystem,” said Dan Lewis, CEO of Skute. In Australia: Tasmanian based partner AusNFC uses HID trusted tag services with their web application Old Kimpton Distillery and McHenry Distillery. “We believe that HID trusted tag services are changing the game for securely authenticating brands. Being able to stay connected and engage with their consumers as part of building brand loyalty was a deciding factor when Old Kimpton Distillery and McHenry Distillery chose HID for brand protection,” said Larry Hower, CEO of AusNFC.
The power of HID Trusted Tag Services
H
ID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
application/ case study
Delivering Future-Proof Security Bosch equips Safer Runnymede with integrated video security system
L
ocated one hour outside of London, the borough of Runnymede is a local government district with over 80,000 residents in the county of Surrey. It is one of the most prosperous parts of the London commuter belt and home to some of the UK’s most expensive real estate. In order to enhance public safety, the borough council contracted service provider Safer Runnymede. Working with Nottinghamshire based systems integrator Central Security Systems, the experts installed a platform combining public safety technology with personal safety services such as care solutions for the elderly. Today, Safer Runnymede coordinates all connected solutions in a control room in the town of Addlestone, where a staff of three operators monitor security feeds from over 500 security cameras deployed around various boroughs within Surrey. Next to public streets in the area, the flexible system also monitors schools, hospitals and other public buildings around the clock. Every year, the team responds to 20,000 incidents from cameras, and the video security system has proven an asset in monitoring traffic, preventing crime, as well as providing evidence and following suspects after incidents. But achieving this level of integration was a challenge. Initially, the video security system consisted of hardware from several different manufacturers including Bosch – making updates or replacements a timeconsuming process – that was networked on a Bosch video recording management (VRM) solution. Looking for a future-proof and scalable system built
on an integrated software platform, the officials in Runnymede tasked Bosch to design a fully IP-based security camera architecture. Since the Safer Runnymede system already included a Bosch monitor wall plus encoders, cameras, VRM and storage devices, system integrators could leverage the initial investment into a
replacing the complete existing analogue video security infrastructure; all in a resilient and easily expandable system at a reduced total cost of ownership (TCO). What’s more, the customer has used the flexibility of Bosch solutions in a deployable video surveillance camera at remote locations. Installed in a custom-built enclosure provided by Central
full suite of Bosch solutions. The system now combines new high-resolution AUTODOME IP 4000, AUTODOME IP 7000, MIC IP 7000 moving cameras, and FLEXIDOME IP 7000 fixed cameras, plus older Bosch and third-party analog cameras paired with encoders, decoders, and DIVAR IP 3000, 5000, 6000, and 7000 recorders. Connecting these solutions via the Bosch video management system (BVMS) allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure. As a result, Safer Runnymede has benefited from superior image quality delivered by the added network video security cameras, without the need of
Security Systems, it streams video data from an AUTODOME IP 4000 camera via 4G and sends alerts via SMS to the control room upon detecting activity such as illegal waste dumping. Migrating from a fragmented, analog system to an integrated IP network managed via BVMS (Bosch video management system) has proven a forwardfacing decision. “The flexible system design and management has provided an integrated approach to our business delivery, allowing us to make better operational decisions and become more dynamic and competitive in the video surveillance marketplace,” says Les Bygrave at Safer Runnymede.
SecurityLink India ■ November 2018
55
application/ case study
Trawling for Great Surveillance Coverage with Hikvision S
hrimp fishing is one of Greenland’s biggest exports, with an estimate of 36,000 tons caught in 2016. Like all valuable resources, this also needed security and protection, and Hikvision products were used in the build of the latest new freezer trawler – Greenland’s largest at 82m in length, which was commissioned by Sikauk Trawl. Danish security expert Vodanet was brought on board from the beginning of the trawler’s build to advise on and install the security elements.
ing factory onboard, which needed to be monitored and secured. The factory layout includes two 600 ton freezer units to keep the seafood fresh. The project had two focuses – the main one was to ensure the safety of the crew on the ship, and the second to monitor and protect production. The sea is a powerful force, and the solution needed to be strong enough to withstand the challenges thrown at it. The first of these is salt air and freezing temperatures. The chosen products needed to be anti-corrosive, and they could work within low temperature ranges. The second challenge is the constant movement of a ship at sea. Another unexpected challenge that shipping companies face is unauthorized people coming aboard when the ship is docked at a port. There can be problems of theft or various others of the kind in these situations and surveillance can also prevent these. All of this needed to be coordinated through a central point – both for monitoring and recording purposes.
Challenge
T
he Svend C trawler has a complete shrimp process-
Solution
V
odanet worked with the builders from the beginning, putting a solution together to enable effective security monitoring for the relevant areas of the trawler. They used stain-
56
SecurityLink India ■ November 2018
application/ case study
less steel cameras, certified to IP67, to counter the corrosive environment (DS-2CD6626DS-IZHS). The use of 2MP ultra low light dome cameras (DS-2CD4526FWD-IZHS) covered the main areas of the ‘factory’ including the freezing units. These cameras also perform very well in the ‘rolling’ sea scenarios. For flexibility of monitoring, a PTZ camera (DS-2DT6223-AELY) was installed, giving operators the possibility to zoom in to an area of interest. They were installed using special mounts to counter the movement of the ship. Finally, all of the camera footages from multiple locations on the
ship were brought together in a new Super 4K NVR (DS-96128NI-I16/H) located in the security centre on the bridge. The inclusion of a decoder in the solution means that the Captain can also view the footages from his own cabin. Svend Christensen, Owner of Sikuaq Trawl, was delighted with the results. He said, “This was a great solution from Hikvision and Vodanet. We were very impressed with the camera installation – they’re working in every condition the harsh environment throws at them.” He went on to give an example of why the crew was grateful for the cameras, “We were able to
watch the tow rope without one of our crew members having to stay outside in sub-zero temperatures – believe me that guy was grateful.” The project was so successful that six more Hikvision stainless steel cameras are being installed to make the solution even more effective and flexible to the needs of Sikauq Trawl. Hikvision prides itself on its ability to tailor a solution to exactly what the customer wants. This is another example of the flexibility derived from a mixture of cutting-edge technology, an understanding of the customers’ need and excellence in integration with third-party partners.
US Coast Guard Contract Awarded With Value of $9.9M to Support Encrypted Automatic Identification Systems
F
LIR Systems, Inc. has been awarded a contract from the United States (U.S.) Department of Homeland Security (DHS) in support of the U.S. Coast Guard’s (USCG) Second Generation Automatic Identification System (AIS-2) program. The indefinite delivery indefinite quantity (IDIQ) contract has a ceiling value of $9.9 million to provide second generation automatic identification system (AIS) transponders, associated peripherals, and spare parts for nearly 1,774 boats and 282 cutters in the USCG’s active fleet. The government anticipates the purchase of vessel class-specific kits and spare parts to equip all USCG vessels with AIS-2 over the next five years. “We are pleased to provide AIS hardware and software technology to support the US Coast Guard’s mission,” said Jim Cannon, President and CEO at FLIR, “Our technology will provide enhanced levels of secure communication and coordination between Coast Guard boats, cutters, and shore stations. This award further extends our technology partnership with the Coast Guard, providing next-generation communication capabilities to complement their Raymarine SINS-2 navigation systems.” The contract will be managed and executed by the FLIR commercial business unit in the Nashua, New Hampshire facility. SecurityLink India ■ November 2018
57
application/ case study
Bank of Hawaii Invests in Video Data March Networks Searchlight for Banking delivers operational, compliance and marketing related insights
B
rian Ishikawa has always kept tight control over his video surveillance system, allowing only authorized personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorized staff from the bank’s branch division being able to review video for operational, compliance and marketing-related pur-
currently using March Networks Searchlight for Banking software to gather business intelligence at its branches. Searchlight’s mix of surveillance video, teller/ ATM transaction data and analytics delivers valuable insights into the bank’s operations, as well as helping to enhance security and uncover fraud. “Our branch division folks look at the data to get ideas on how we should do our branch operations or staffing differently,” he said.
poses. The insights collected from the video are helping the bank make more strategic decisions about staffing, customer service and even future branch design. “Our March Networks surveillance platform is providing us with some significant business and non-security related uses,” Ishikawa explained. Bank of Hawaii, which operates 69 branches and 373 ATMs across Hawaii, American Samoa and the West Pacific, is
People counting data – collected by FLIR Brickstream 3D sensors integrated with the Searchlight software – tells them which entrances and exits are most used so they can place marketing materials in high-traffic areas. The information is also being used to help determine future branch layouts. Queue length and dwell time data, meanwhile, help them understand their busiest time of day, and day of the week, so they can staff branches appropriately.
58
SecurityLink India ■ November 2018
“It’s a huge plus for us,” said Ishikawa, “Our executive management team can see the benefits of the video solution, and the future possibilities for this data.”
Engineered for banking environments
A
forward-thinking bank that’s keen to try new technology, Bank of Hawaii began exploring Searchlight after its success with March Networks’ other video surveillance products. The bank first started using March Networks systems in 2015, when it was time to upgrade its legacy DVRs. At the time, Bank of Hawaii was relying on two different video platforms, and it wasn’t happy with their performance. After enlisting the help of a consultant, and doing his own research at security tradeshows, Ishikawa says the decision to go with March Networks was clear. “I remember asking some of my banking counterparts, ‘Hey what are you guys using?’ And they strongly recommended March Networks,” he recalled. The consultant came to a similar conclusion. He said, “March Networks’ products are really engineered for the banking environment so that helped us make the decision.” Bank of Hawaii is currently using March Networks 8000 series hybrid network video recorders (NVRs) in about half of its banking branches. The Linux-based devices provide reliable video surveillance recording and man-
agement, and are also easy to service, which is a huge bonus for Ishikawa and his team. In addition, the 8000 series rack mount units feature an innovative ‘dock and lock’ station that allows technicians to easily remove and service the recorder while leaving all rear connections clean and organized in place. “With other companies, you have to power down the recorder for several minutes to service it, and that means unplugging and re-plugging all the inputs. You miss a number of minutes of recording during that time. With March Networks, we’re able to just pull out the hard drive and pop in another one without taking the NVR offline,” he said, “That’s huge for us.”
Rapidly locating video evidence
A
ccording to Ishikawa, Bank of Hawaii also appreciates the 8000 Series’ hybrid support, which allowed the bank to continue using its existing analog cameras, and the motion histograms in March Networks Command video management software, which show Ishikawa and his team where motion occurred and helps them rapidly locate video evidence. “Command’s modern interface is really user-friendly, and it’s very easy to find video,” said Ishikawa, “When someone is telling you, ‘Hey we had a problem at this branch this morning, I don’t know what happened, but it must have been around this time’, we’re able to find that video much more quickly on a March Networks platform.” The bank’s high-resolution cameras also make it easy to discern important details. In its newer branches, Bank of Hawaii is using March Networks ME4 Series IP cameras, which
Searchlight for Banking is a huge plus for us. Our executive management team can see the benefits of the video solution, and the future possibilities for this data capture 4MP images and feature high dynamic range technology to optimize image quality in both low and bright light. The bank is also using Oncam 360° cameras for high-resolution panoramic views. For security at its bank machines, Bank of Hawaii has installed MegaPX ATM cameras, which are purpose-built for ATMs. Video is integrated with the bank’s ATM transaction data in the Searchlight software for rapid investigations into customer complaints and potential fraud. “It’s so easy to search,” said Ishikawa, “It takes us exactly to that transaction and the associated video so we can figure out what transpired.”
Comprehensive oversight
T
he bank is also integrating its teller transaction data with video in Searchlight for more comprehensive oversight of its branches. The combination of video, transactions and analytics helps it get a more holistic view of its services. “Transaction data is not always indicative of how busy a branch is,” Ishikawa said, “Noting that lengthier conversations at the teller counter often create value because the customer returns later to access another bank product or service. Having video and analytics is an added layer of information.” Being able to remotely access video also helps Ishikawa’s security team conSecurityLink India ■ November 2018
application/ case study
duct virtual patrols. This saves them both time and money. “In the past, whenever there was an issue, we had a uniformed security member head out and physically check the branch. But with virtual patrols, we can do fewer physical visits, and when we do visit, it’s a more meaningful visit.” The security team, for example, can keep an eye on issues with vagrancy and loitering by simply logging into the Command software. March Networks video has helped the bank successfully address some of these issues. In one case, a person was routinely visiting a branch and causing disruptions by yelling and throwing deposit slips on the floor. “We don’t always know the situation, but if a person is yelling or displaying erratic behavior, they pose a risk,” said Ishikawa. Capturing video of the incident helped underscore the serious nature of the situation. “We were able to show police that this was not a minor disruptive party. It was a very concerning issue for us. And it wasn’t just our bank, it was occurring in other banks, too,” he added. Going forward, Bank of Hawaii is planning to migrate its remaining retail branches to March Networks. Given the widespread benefits of intelligent video, Ishikawa predicts that, like him, more bank security managers will receive requests to share their video surveillance securely with other departments. “In the future, it won’t just be security that’s asking for a video upgrade,” he said, “It’s going to be other parts of the business saying, ‘We want a piece of the pie too.’ Because surveillance is more than just investigating a fraud or robbery incident. Now, video surveillance is a lot more than that.” 59
application/ case study
360 Vision’s Invictus Onboard Robot Jack Debut at EuroSatory TBC-France, the worldwide supplier of advanced security robotics solutions has incorporated 360 Vision Technology’s new Invictus high-performance ruggedised all-in-one PTZ camera into its advanced autonomous security robot, Jack
D
eveloped in Europe, robot Jack has been designed to provide security companies with an effective solution for live roving surveillance of sensitive sites such as large outdoor or indoor warehouses, ports, industrial complexes, gas and oil facilities, solar power stations, prisons or military bases etc. An autonomous robot built to exact standards of component quality and durability, Jack can be deployed to enhance the security surveillance of any critical/ sensitive site. A secure, high quality multi-terrain autonomous surveillance and intervention, Jack’s advanced mobility and obstacle detection software, embedded artificial intelligence and secure communications technologies enable this
60
tireless patrolman to promptly detect intrusions or anomalies to carry out safe and effective risk assessments. To provide the demanding imaging quality needed to secure Jack’s machine vision, TBC-France approached 360 Vision Technology’s VAR, Dealpixpro. “Originally TBC-France purchased a selection of small and compact size PTZ cameras from our portfolio, however, technical tests demonstrated that these products were not sufficiently ONVIF compliant to be integrated,” reported Pascal Wojciechowski, Sales & Marketing Director at Dealpixpro, “TBCFrance’s strategy was to build a robot with Made in Europe components. With this in mind I recommended 360 Vision’s new Invictus camera, as its high performance specifications and value for money matched with TBC-France’s expectations, and liking the camera package TBCFrance borrowed a demo unit for evaluation.” On confirmation that Invictus would integrate easily into robot Jack’s command software, and along with integrated Sirius LED illumination and ultra low-light full 1080P HD colour/mono camera imaging, TBC-France deSecurityLink India ■ November 2018
cided to incorporate Invictus. “Nearly all of the components for Jack are made in France, Europe, or NATO countries,” comments Mathilde Bravais, Marketing Manager at robot Jack’s manufacturer, TBC-France, “So we looked for a European manufacturer that could provide us with a performing camera resistant enough to be placed on a multi-terrain robot. We shortlisted the Invictus camera because it matched all our criteria, and we valued the fact that 360 Vision Technology is a specialist company that only manufactures cameras, which shows its expertise in the area. The Invictus camera is an essential component for Jack. Whenever the robot detects something, Invictus becomes the eyes of the guard in the field. Its level of quality and performance enables Jack to see with precision and reactivity.” The final development of robot Jack offers up to 18 km/h on or off-road autonomous mobile surveillance and integrated video analytics with human detection. Making its debut appearance at June’s Eurosatory international defence & security industry trade fair in Paris, Jack demonstrated its ability to be deployed for patrol and intervention. For use over all types of terrain, Jack’s simple integration into existing security systems for situational awareness and alarm activation means the novel solution is now set to reduce intervention response
application/ case study
times, decrease operational costs and minimise risks to staff for a broad range of end-user applications. “Robot Jack dramatically illustrates the direction new security solutions are taking to provide enhanced levels of mobile autonomous situational awareness,” says Mark Rees, Managing Director of 360 Vision Technology, “We’re pleased that the Invictus camera with its latest ONVIF 2.4 Profile S compliant protocols for fast set-up, IP67 certification and rugged build quality was selected to provide the eyes for Jack for dependable performance in any environment.”
Fermax 2 Wire DUOX System Used on Major Nottingham Retrofit F
ermax has offered an ideal, cost effective solution to allow installation partners to complete a successful upgrade of a large apartment complex in Nottingham. Working with its approved partner FSE Security systems and involving over 90 apartments at Marina Park Nottingham, the challenge was to upgrade an old third-party audio only system to a modern audio-video sysFlamingo Court, Marina Park, Nottingham tem with the minimum of disturbance to residents and without incurring excessive high cost. By using the Fermax 2 Wire Duox system with SKYLINE surface mounted panels and VEO-XS flat screen hands-free video monitors, the installation was completed using existing cables throughout, achieving major reductions in time and material cost. Residents were delighted to be able to upgrade to the new Fermax VEO-XS monitor using innovative 2 wire DUOX technology offering the high-quality performance of a purely digital system. As well as its modern, slimline design the VEO XS hands-free monitor offers the added benefit of image storage and retrieval using the PHOTOCALLER function, enabling residents to view images of visitors and callers to their apartment whilst they were not at home.
Fermax VEO-XS Monitor
A
delighted installer commented, “The cables were a selection of cat 5.8 core alarm cable and flat twin 0.5 mains flex. All cables suited the DUOX system which was easy to install and easy to program. Most of all, it was user friendly which to me as an installer is the most important quality.” SecurityLink India ■ November 2018
Fermax VEO-XS Monitor
61
application/ case study
New Level of Protection for Critical Infrastructure with
The Integration of SpotterRF and Videotec’s Systems S
potterRF, a company that specializes in designing Compact Surveillance Radar systems for highly critical sites, announces the integration of their Radar technology with the ULISSE COMPACT HD range of PTZ cameras manufactured by Videotec, creator of professional video surveillance cameras. In this integrated solution, the radar helps the camera to always look in the right direction by tracking potential threats in the vicinity. This greatly increases the value of the cameras by creating a fully automated system that enhances situational awareness and prevents incidents before they happen in large critical areas. Using cutting-edge radar technology, SpotterRF can pinpoint the GPS location of unwanted intrusions around the property and potential threats beyond the perimeter. In a perfectly synchronized operation and without human intervention, the radars rapidly and continuously send these exact coordinates to the connected Videotec PTZ cameras. The response is immediate and they can be programmed to zoom in for greater detail, capture sharp Full HD images of the target and send them in real time to the operator’s monitor. The system promptly sends alerts to operators of an alarm, and due to the near-zero false alarm rate of the radars, this occurs only when there is actually something of interest happening on the site. The Videotec ULISSE COMPACT HD PTZ camera offers excellent visual surveillance capability coupled with high functional and mechanical performance in outdoor areas. With its wide field of vision and fast positioning, it is capable of capturing great quality full HD images in the most adverse environments. The combined system from SpotterRF and Videotec has been proven in many real-world deployments worldwide such as electrical substations, military zones, and other large sensitive areas.
Nedap’s !D Cloud Software Selected for Largest RFID Deployment in Nordic Retail Market
V
oice Norge AS selected !D Cloud, Nedap’s leading RFID software platform, for the RFID roll-out to their 200 stores in Norway. The roll-out, which was completed within 6 months, is the largest RFID deployment in the Nordic retail market to date. Johnny Ottesen, CEO at Voice, commented, “We realized that we needed to significantly raise our stock accuracy to improve our on-shelf product availability and enable true omnichannel. In !D Cloud, we found the best solution, because it is scalable, easy to use and easy to integrate with our Infor M3 ERP-software, which enables a fast large-scale deployment.” The full roll-out was preceded by a pre-rollout in four stores, resulting in 98+% stock accuracy, which led to a better product availability and an increase in sales. Based on these results, Voice decided to roll out the !D Cloud solution to their 200 stores in the Voice chain, which includes the Match, VIC and Boys of Europe stores. “We are proud that our !D Cloud software was selected by Voice, which is the largest RFID deployment in the Nordics to date. It is really exciting to support retailers in solving their stock accuracy challenge. From now on, Voice can offer omnichannel services like click and collect, and redesign the customer journey,” explained Mark Kasbergen, Global Business Developer at Nedap Retail. 62
SecurityLink India ■ November 2018
application/ case study
SecurityLink India â– November 2018
63
application/ case study
World’s First TPM for Cybersecurity in the Connected Car I
nfineon Technologies AG is enabling a crucial step toward greater cybersecurity in the connected car. The Munich-based company is the world’s first semiconductor manufacturer to put a trusted platform module (TPM) specifically for automotive applications on
the market. The new OPTIGA™ TPM 2.0 protects communication between the car manufacturer and the car which increasingly turns into a computer on wheels. A number of car manufacturers already designed in Infineon’s OPTIGA TPM. The TPM is a hardware-based security solution that has proven its worth in IT security. By using it, car manufacturers can incorporate sensitive security keys for assigning access rights, authentication and data encryption in the car in a protected way. The TPM can also be updated so that the level of security can be kept up to date throughout the vehicle’s service life. “As a computer on wheels, the connected car benefits from the experience of the IT industry,” said Martin Brun64
ner, expert for automotive security at Infineon, “In the complex interplay between software, network and cloud, security hardware creates the solid foundation for secured communication. Backed by Infineon’s many years of expertise in the automotive and security areas, we have optimized the OPTIGA TPM for automotive applications. It is easy to integrate and substantially increases cybersecurity – from production to recycling of connected cars.” Infineon has decades of experience in automotive electronics and hardwarebased security. With the new OPTIGA TPM 2.0 and its ™ AURIX family of microcontrollers, Infineon provides a comprehensive portfolio of application-specific security solutions that address key challenges in the automotive industry.
Secured communication throughout the vehicle’s service life
M
obility of the future requires the exchange of huge volumes of data. Cars send real-time traffic information to the cloud or receive updates from the manufacturer ‘over the air,’ for example to update software quickly and in a cost effective manner. The senders and recipients of that data, whether car makers or individual components in the car, require cryptographic security keys to authenticate SecurityLink India ■ November 2018
themselves. These critical keys are particularly protected against logical and physical attacks in the OPTIGA TPM as if they were in a safe. Furthermore, incorporating the first or initial key into the vehicle is a particularly sensitive moment for car makers. When the TPM is used, this step can be carried out in Infineon’s certified production environment. After that, the keys are protected against unauthorized access; there is no need for further special security precautions throughout the various stages of the – often globally distributed – value chain. The TPM likewise generates, stores and administers further security keys for communication within the vehicle. And it is also used to detect faulty or manipulated software and components in the vehicle and initiate troubleshooting by the manufacturer in such a case. Whereas a vehicle has an average service life time of 12 to 15 years, security features and algorithms keep on being developed and enhanced on a continuous basis. The TPM’s firmware can be updated by remote access so the security it offers can be kept up-to-date, including the cryptographic mechanisms (cryptoagility).
Technical information and availability
T
he new OPTIGA TPM 2.0 SLI 9670 from Infineon is a plug & play solution for automotive applications. It is especially suited for use in a central gateway, the telematics unit or
application/ case study
the infotainment system of the vehicle. The SLI 9670 consists of an attackresistant security chip and high-performance firmware developed in accordance with the latest security standard. The firmware enables immediate use of security features such as encryption, decryption, signing and verification.
The TPM can be integrated quickly and easily in the system thanks to the open source software stack (TSS stack) for the host processor, which is also provided by Infineon. It has an SPI interface, an extended temperature range from -40°C to 105°C and the advanced encryption algorithms RSA-2048,
ECC-256 and SHA-256. The new TPM complies with the internationally acknowledged trusted computing group TPM 2.0 standard, is certified for security according to common criteria and is qualified in accordance with the automotive standard AEC-Q100.
Expanding Government Options for Offering Mobile IDs to
Their Citizens Via its New goID™ Gateway H
ID Global® has extended its HID goID platform so governments can more easily offer mobile identities to citizens from multiple authorized issuing agencies. The platform is now available as a cloud service in a packaged HID solution, or as a new, in-country offering operated locally with support from HID support teams. The new goID Gateway manages the provisioning of fully encrypted mobile identities from a central issuance system to citizens’ smartphones while ensuring the privacy of all personal information. “We are delighted to announce the expanded capabilities of our marketleading goID platform with the addition of our flexible in-country goID Gateway,” said Rob Haslam, Vice President Worldwide Sales, Citizen ID, with HID Global, “Now governments can choose whether to contract the management of end-to-end encrypted mobile ID provisioning services to HID or to invest in their own provisioning service, either on-premise or in the cloud.”
The goID Gateway has recently been added to HID’s end-to-end ePassport solution used by the government of Tanzania to enable provisioning mobile ‘electronic passports’ to citizens’ smartphones if their physical passport booklets have been stolen or lost in another country. The goID in-country gateway also creates the opportunity for any public entity to deliver localized and dedicated mobile ID services to Tanzanian citizens in the future.
Going mobile with goID
T
he goID platform is for issuing secure identity documents to citizens’ mobile phones. End-to-end encryption ensures complete confidentiality of personal information to protect the issuing entity, citizens and gateway service provider, while allowing secure over-the-air provisioning, updating and revoking of mobile IDs. The goID Gateway is offered as a managed service operated by HID, or as in the government of Tanzania’s case, an in-country offering operated locally. The goID Gateway enhances the features SecurityLink India ■ November 2018
of goID which include remote enrolment and provisioning, off-line verification, remote verification, role-based verification services, Bluetooth engagement and customizable functionality. HID Global is a leading provider of government-issued identity documents for national ID, ePassport, foreign resident ID, driver license, vehicle registration and other programs, with greater than 150 million shipped across more than 50 countries. The company’s products and technology can be found in sixty percent of all government issued electronic identity projects around the world. 65
application/ case study
Wisenet Cameras Watch Over Torbole Casaglia W
ith a population of just under 6,400, the Comune, which is located in the Brescia province in Italy, has a history which can be tracked to the first century AD when it was colonised by the Romans. Following on from a public tender process, the project to install Wisenet cameras throughout the Comune was won by SetiSnc, a specialist electronic security systems integrator. SetiSnc was able to demonstrate that by deploying Wisenet cameras integrated with INQUIRIS video management software (VMS) platform, local police would be able to effectively monitor activity throughout the Comune in order to respond quickly to any incident or suspicious activity.
High definition cameras
2
4 Wisenet XNO-6080RPs bullet cameras have been carefully located in key public areas. The XNO-6080RP is a true day/ night 2 megapixel high definition camera with built-in IR illumination. Equipped with the world’s best 150dB wide dy-
66
namic range (WDR) technology and the word’s best low light motorised varifocal lens, the XNO6080RP is part of the Wisenet X series of cameras which are supercharged by the most powerful DSP chipset ever incorporated into a full camera range. Together, these features ensure superb quality colour images are captured, regardless of the environment or the time of day. Images captured by the cameras are transmitted via a HiperLAN wireless network to the municipality of Torbole’s central control room. The wireless transmission of the images is greatly assisted by the XNO-6080RP utilising H.265 compression and WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression according to movement in the image. As such, it is one of the most bandwidth friendly cameras available. The deep integration of the cameras with the INQUIRIS VMS ensures control operators are alerted if the cameras are not being powered by Power-overEthernet (PoE) and therefore online, or if they have switched to a UPS standby power supply. In the event there is any disruption, images are stored on an SD SecurityLink India ■ November 2018
card on board the cameras and are subsequently automatically transmitted to the control room when the connection is restored. In addition to control room operators, other authorised personnel such as patrolling police officers are also able to securely gain access to the live or recorded images via a smartphone or tablet using a free to download App.
Success
“
The Wisenet XNO-6080RP cameras and INQUIRIS VMS have proved to be the perfect combination for this type of town centre surveillance project,” said Cirillo Flaminio, Technical Manager and Legal Representative for SetiSnc, “Equally important, we have been able to work closely in partnership with the Hanwha Techwin pre-sales and technical team based in Italy to ensure the project was completed on time and that it is operating to the client’s complete satisfaction.”
application/ case study
SecurityLink India â– November 2018
67
feature
8 Steps to Making Systems More Secure By Scott Penno – Regional Marketing Manager, APAC, Allied Telesis
T
oday we are seeing the rise of Internet of Things or IoT whereby literally billions of devices are increasingly being connected to the Internet, and sharing the information and data they collect. These could be simple devices like a thermostat or light bulb, or more complex devices like CCTV cameras and so-called smart bins. This inter-connectedness and ability to share information can bring intelligence and efficiency that could not have been imagined in the past. Today, buildings can optimize their performance to ensure they are meeting not only the requirements of the occupants in terms of comfort and security but also they meet mandatory environment or legal requirements. No longer it is necessary for the council to send trucks around daily or multiple times a day to empty rubbish bins because the bins can hold more rubbish (or recycling) thanks to an integrated compactor. When it approaches the full mark, it contacts the local council to advise that it needs emptying. These are two simple examples of how connect-
68
edness and intelligence help improve performance and efficiency. There is, however, a downside to this increasing level of connectedness, and this relates to security. With the explosion of devices that are now being interconnected along with the sensitivity of many of these devices, there is a need to ensure that these devices are being connected with a high degree of security. For an example of what could possibly go wrong when the bad guys are able to take advantage of exploits in an IoT environment, look no further than the movie Die Hard 4.0 starring none other than Bruce Willis. While somewhat dated today, the movie illustrates what could potentially happen should attackers are able to take control of buildings and critical infrastructure such as traffic control systems. While this movie may seem fanciful in its portrayal of what capable hackers could potentially accomplish, it is important to understand that security comprises a series of counter-measures to reduce or mitigate both the likelihood of an attack and the severity thereof. While it may seem like commonsense, there are many common or routine tasks which are required to improve security that are still not being implemented. Let’s take a look at a few of these. 1. Change default usernames and passwords: Most, if not all devices, have default usernames and passwords that can easily be found by a child using a search engine. Default passwords should be changed immediately, and even better is to also change, delete or disable the default username as well. 2. Don’t share passwords: Every user of a
SecurityLink India ■ November 2018
feature
system should have their own username and password. This ensures that when that user leaves the organization, their account can simply be disabled or deleted and there is no need to change the shared account details for every system the user had access to (which in reality just doesn’t happen). 3. Use strong authentication: Using strong passwords that have a reasonable length with a combination of letters, numbers and special characters, and don’t include dictionary words which ensures that passwords can’t be easily compromised. Better yet is to use digital certificates with the keys that are generated within a token or device which not only delivers strong authentication but also provides non-repudiation. 4. Use centralized authentication: Using a centralized authentication system such as Active Directory, RADIUS or LDAP simplifies the process of managing user information as there is a single system that needs to be administered instead of multiple systems. 5. Restrict access: Access to systems should be restricted to the minimum level that is required for a user to perform the tasks they need to perform. In ad-
dition, firewalls should be used to segregate and isolate systems so that an issue or attack on one system is less likely to impact other systems. 6. Integrate redundancy: Redundancy should be integrated to ensure the system continues to operate in the event of a failure or attack. In many cases, the cost of lost business is far greater than the additional cost of redundancy. 7. Don’t forget physical security: Security is about layers and one of those layers is physical access. If an attacker can obtain physical access to a system, their task will be made simpler so be sure that physical access is only available to those that need it. 8. Maintain backups: From time to time, things will go wrong, and when this happens, it’s important that you have a backup that is off-line and stored in a different physical location. While these steps may seem simple and common-sense, there are many IoT systems today where the level of security in use leaves much to be desired. There are many additional things that can be implemented but ensuring that each of the above steps is undertaken will go a long way toward improving the security of systems that are deployed today.
Why a Fraud Solution That Incorporates Video is Worth Investment T
he methods that criminals use to commit fraud are constantly evolving. In the retail and financial industries in particular, fraudsters’ tactics change regularly and as technology advances, certain schemes may lose or gain traction. Fraud prevention and risk management teams must constantly be on their toes to stay one step ahead. Having the right tools in place is critical in the fight against fraud, because no one person or team can do it alone. Many businesses deploy multiple anti-fraud solutions in an effort to detect and deter fraudulent activity. Intelligent software can alert you to suspicious behavior far more rapidly than a human being can react, so deploying the right technology can make a world of difference. The video-based fraud detection solutions offer a unique advantage over other solutions, because they let you actually see what took place. Video-based solutions have the same powerful ability to search through enormous amounts of transaction data, but with the added benefit of tying transaction data to video images. SecurityLink India ■ November 2018
69
feature
A fraud investigator, for example, can use a video solution to not only identify a particular transaction as suspicious, but also to access recorded video to see what took place. They can see who put the empty envelope into the ATM machine, claiming it had cash, or who manipulated the point-of-sale system to conduct multiple fraudulent returns. Perhaps you already have an anti-fraud solution in place and are tempted to dismiss a video-based solution as redundant or unnecessary. Here’s why you should think twice about making the investment:
Fraud may already be costing you
W
hether you realize it or not, fraud may already be taking a bite out of your bottom line. The majority of businesses – 84 percent – reported experiencing fraud last year. Many businesses also have a tendency to underestimate the true financial impact of fraud. A recent study by Lexis Nexis Risk Solutions found that for every $1 of fraud a business experiences, it actually costs two and-a-half times – or $2.66 – to deal with that fraud based on associated costs like chargebacks or replacing lost merchandize. So if a business loses $145,000 to fraud, the real cost to deal with that fraud is actually $385,700.
Some sectors are particularly vulnerable
S
ome industries are victimized by fraud more than others – these include government, manufacturing, healthcare, education, and retail. The lion’s share of fraud, however, happens in the banking and financial services industries with about 17 percent of all fraud cases. According to the American Bankers Association’s latest (ABA) Deposit Account Fraud Survey, losses due to fraud in the banking industry reached $2.2 Billion in 2016, an increase of 16 percent over 2014. Some of the greatest losses for banks were due to counterfeit debit cards and check fraud. Both of these types of fraud involve someone passing off information that is not their own, so a video-based fraud detection solution would be ideal in these cases. Video surveillance that is integrated with transaction data and analytics allows banks and credit unions to rapidly search and sort through ATM or teller transactions, and match suspect transactions with video. This type of solution can help retailers, too, as it can help identify someone using a counterfeit card in a store. 70
The fallout from fraud is more than monetary
F
raud not only costs your business money, but it can harm your reputation. Consider for a moment the negative news coverage a fraud incident can garner. Then think about the spinoff effect, as existing customers begin to doubt the security of their money or personal data, and potential customers are discouraged from doing business with you. For banks especially, consumer trust is a major asset. If that trust begins to erode, it could harm future growth. Corporate wide, a fraud incident can have other negative impacts. Labor intensive audits and investigations can hurt employee morale, and the damage to your brand could also hurt your ability to recruit top talent.
Rapid detection is key
W
hen fraud and theft go undetected, the damage can be severe. A study by insurance firm Hiscox found that when employee embezzlement stretched over five years or more, the average loss was $2.2 million. When coupled with regular audits, video solutions that can quickly alert you to suspicious behavior – like employees accessing off-limits areas, or entering or exiting the office at unusual times – can help you uncover fraud faster. Motion detection and dwell time analytics can be incorporated into a video surveillance solution, giving you the ability to receive notifications about such events.
Worth the investment
W
hen you get right down to it, it’s not hard to see why investing in a video-based fraud solution is so important. Even just one incident of fraud can cost your organization dearly. While the types of fraud you’re susceptible to depend on the line of business you’re in, there are basic steps each organization can take to protect itself. Regular risk assessments and audits are vital, as is promoting a culture of ethical behavior through training and open communication, including encouraging anyone with concerns to speak up. Adding a video-based solution is another tool you can use in a multilayered approach to fraud detection and prevention. Let’s face it. Most organizations need all the help they can get when it comes to fighting fraud. And as the saying goes, “An ounce of prevention is worth a pound of cure,” and that’s certainly the case with this subject.
SecurityLink India ■ November 2018
feature
Growth in Police Body-Worn Cameras Fuels Digital Evidence Management Market Evolution
By Josh Woodhouse Senior Analyst, Video Surveillance
T
he globally installed base for law enforcement and police body-worn cameras is forecast to increase by nearly 30 percent in 2018, exceeding 1.5 million bodyworn cameras in use worldwide. With a greater number of body-worn cameras in use and an associated increase in potential evidence collection, the capabilities of underlying digital evidence-management systems are becoming an increasingly critical factor in the ability of law enforcement to effectively manage and interpret huge repositories of digital evidence. IHS Markit describes digital evidence management software as software used to manage multimedia digital evidence. At the entry level, this software must be able to manage the storage of video captured through a bodyworn camera or an in-car video surveillance system, however, the initial ingest of media from the recording device does not need to be within the digital evidence management software. The software can act as a platform to connect existing repositories and device configuration applications. Digital evidence software can be bundled with body-worn cameras or in-car systems or sold separately. The market for digital evidence management software has evolved rapidly, since federal funding programs in the United States for law enforcement body-worn cameras were announced in 2014. This funding and subsequent initiatives stimulated and accelerated increases in shipments of bodyworn cameras in the United States and globally, setting the current trajectory toward increasingly sophisticated digital
evidence-management solutions. The following diagram illustrates the evolution of capabilities in available digital evidence management ecosystems. Example features are organized in four cumulative tiers, with increasing levels of feature sophistication, from tier one to tier four: The capabilities of digital evidence management software can range from simple media storage to sophisticated investigation and case-building tools. The evolution of the ecosystem and integrations with records management systems and other existing law enforcement workflows allow law enforcement to gain additional efficiencies and insights from digital multimedia evidence. These workflows offer the potential for quicker evidence availability and wider-reaching investigations. The ‘Body Worn Cameras & Digital Evidence Management Report’ from IHS Markit focuses on the global market for body-worn cameras, digital evidence management software, and in-car video surveillance systems used by police and law enforcement.
SecurityLink India â– November 2018
71
feature
Four Ways Hikvision Offers State-of-the-Art False Alarm Filter to SMB Customers By Ashish P. Dhakan – MD & CEO, Prama Hikvision India Pvt. Ltd.,
D
o SMB customers want the latest intelligent surveillance features without a full system upgrade? With Hikvision, they can enjoy the benefits of cutting-edge false alarm filter with an average of 90% accuracy while protecting their existing investment. False alarm filter is one of the most intelligent features of modern surveillance systems. Designed to filter out movements from things like rain, leaves and animals, these systems focus on movements by relevant objects like people or vehicles. This prevents time and costs being wasted on nonthreatening events. Saving time and cost is important for small and mediumsized businesses (SMBs); the question is, how can they access such innovative technology in the most cost-effective way possible?
Tech-savvy surveillance
H
ikvision’s EasyIP 4.0 security solution features intelligent false alarm filter within its AcuSense NVR and IP
camera ranges. Currently, a Hikvision AcuSense NVR supports up to four camera channels with false alarm filter. Hikvision AcuSense enabled devices can filter out false alarms with an average of 90% accuracy. What’s more, the AcuSense Quick Target Search feature saves time by identifying footage of people and vehicles automatically, avoiding staff having to search through footage manually. Add in Hikvision’s ColorVu IP cameras, which provide full color, vivid images even at night, allowing customers to take advantage of false alarm filter around the clock.
Easily accessible
F
or SMBs looking to access these features in the most efficient way, Hikvision’s cameras and/ or NVRs can be added to their existing surveillance system, to provide reliable false alarm filter capabilities while protecting their investment. Below, we describe four different ways Hikvision false alarm filter can be added to SMB customers’ surveillance systems. If SMB customers do not want to replace their existing
Solution 1: Conventional IP cameras + AcuSense NVR
72
SecurityLink India ■ November 2018
feature
Solution 2: AcuSense IP cameras + conventional NVR
across four locations. When customers need false alarm filter for more than four camera locations, a cost-effective solution can be delivered by combining conventional IP cameras with AcuSense IP cameras and an AcuSense NVR.
IP cameras, they can keep them and add an AcuSense NVR. This will support false alarm filter and Quick Target Search across four channels. It is possible to add extra channels, but these will only have traditional alarm detection features. This solution is best suited for users who only need false alarm filter in four camera locations.
Solution 4: AcuSense IP cameras + AcuSense NVR + 4-ch conventional IP cameras
Solution 3: ColorVu IP cameras + AcuSense NVR
Conversely, if customers would prefer to keep their existing NVR, AcuSense IP cameras can be added to the solution. It’s worth pointing out that this is most suitable for the customers that need false alarms to be filtered out in real time. A conventional NVR will not record or display the false alarms, as the functionality resides in the cameras. Similarly, users cannot search the alarm information delivered by the cameras as the NVR does not support Quick Target Search. ColorVu cameras deliver bright color video images, even in low light and at night. When paired with an AcuSense NVR, SMB customers get a system that delivers highly effective false alarm filter, plus Quick Target Search capability, around the clock. The only limitation of this setup is that it is designed to deliver the above features to a maximum of four channels. It is possible to add more channels, but they will only display normal alarm information, and will not support Quick Target Search. This solution is best suited for the customers who need reliable false alarm filter under low light conditions and
Because both AcuSense NVR and AcuSense IP cameras support false alarm filter, the functionality starts to overlap when only four AcuSense IP cameras connect to an AcuSense NVR. It is recommended to apply both products when customers need the function for more than four channels. To be specific, customers can connect up to four conventional IP cameras to an AcuSense NVR for false alarm filter, and then can use AcuSense IP cameras for the remaining channels. In this way, both false alarm filter and Quick Target Search will be available across all channels.
Discover more
F
or analogue surveillance system, it is not a conundrum if customers ask to add false alarm filter to their existing system. They can easily replace with an AcuSense DVR from Hikvision’s Turbo HD 5.0 product range, which makes the very most of legacy cabling. Accordingly, the system will be able to perform false alarm filter and quick target search across up to four channels. If customers have the requirement for more than four channels, they can either add extra AcuSense DVRs or Hikvision AcuSense network cameras. With Hikvision, SMBs can take advantage of state-ofthe-art surveillance systems in a way that suits their business needs and their budget. Equally important, the above mentioned different solution options can help system integrators and installers engage in new conversations with their customers.
SecurityLink India ■ November 2018
73
International Updates
INTERPOL Launches Global Policing Goals Collective action against crime threats key to security and development
I
NTERPOL has encouraged the international community to make global security a priority by supporting its comprehensive set of Global Policing Goals. Developed by INTERPOL and adopted by its 192 member countries at the INTERPOL General Assembly session in 2017, the Global Policing Goals will serve as a framework for the international community to collectively address today’s greatest security threats. Covering a range of transnational security issues, the Global Policing Goals were recently officially launched at an event coordinated by INTERPOL in cooperation with the United Nations Office on Drugs and Crime (UNODC) and the Government of Norway. The over-arching aim of the goals is to create a common understanding of what actions international law enforcement and global security actors should prioritize and commit to in the coming years. By involving a diverse set of stakeholders including police, government and private partners, the Global Policing Goals will shape the wider security agenda by highlighting the need for collective action. At the launch event held on the sidelines of the 9th session of the Conference of Parties to the UN Convention against Transnational Organized Crime, INTERPOL Executive Director of Partnerships and Planning, Carl Alexandre underscored the importance of fighting transnational organized 74
The seven goals – designed to complement the 2030 UN Sustainable Development Goals – focus on cross-border crime issues: ●● Counter the threat of terrorism; ●● Promote border integrity worldwide; ●● Protect vulnerable communities; ●● Secure cyberspace for people and businesses; ●● Promote global integrity; ●● Curb illicit markets; ●● Support environmental security and sustainability. crime to building a safe and prosperous society. “Today’s global crime threats share a common denominator – the dire effects they have on our public security, our businesses and our governance structures. They undermine our security, stifle economic development and deprive society of a better and brighter future,” said Mr Alexandre, “The Global Policing Goals developed by INTERPOL are both a call for action, and a roadmap to focus and coordinate international policing efforts which are consistent with promoting sustainable development.” “The Global Policing Goals developed alongside the UN agenda 2030, will allow a uniform and comprehensive way of addressing the deSecurityLink India ■ November 2018
velopment of security sector reforms globally, providing a roadmap for the future sustainable development of law enforcement on the national and international levels,” said Odd Reidar Humlegard, National Police Commissioner of Norway. Jorge Luis Vargas Valencia, Director of Criminal Investigation and INTERPOL Directorate for the Colombia Police shared his country’s experience in overcoming serious crime threats such as drug trafficking through coordinated action with global security partners and civil society. “The Global Policing Goals launched today are meant to enable global security actors to contribute to such transformative law enforcement efforts in other countries so that Colombia’s experience in transitioning towards a more sustainable future becomes the norm and not the exception,” said Vargas Valencia. Also attending the launch event were UNODC Director of the Division for Treaty Affairs, John Brandolino, and Francois Xavier Ngarambe, Ambassador and Permanent Representative of the Republic of Rwanda to the United Nations Office in Vienna. INTERPOL will continue to raise awareness of the Global Policing Goals – as well as the added value of international police cooperation – and the importance of incorporating them into strong international action for growth and development.
International Updates
To Acquire
A Mobile Security Company Acquisition expected to provide customers with enhanced productivity, Byod support, and strong security for government grade smart card deployments and derived credential applications on Apple ios and Android mobile devices
I
dentiv, Inc. a global provider of physical security and secure identification, has entered into a definitive agreement to acquire Thursby Software Systems, Inc., an Arlington, Texas-based provider of security software for mobile devices. The acquisition is expected to strengthen Identiv’s identity offerings with complete solutions for secure and convenient logical access across smart cards and derived credentials on Apple iOS and Android mobile devices. It is also a major strategic step towards Identiv’s vision of converged, highly secure yet frictionless access to information and places through a single identity and a single infrastructure platform. Thursby’s software solutions provide strong security for enterprise and personal mobility, supporting bringyour-own-device (BYOD) and twofactor authentication (2FA) on mobile devices. The company enables department of defense (DoD) issued common access cards (CAC), federally issued personal identification verification (PIV) cards, derived credentials, and commercially issued PIV-I cards to access, sign, encrypt, and decrypt information and e-mails from Apple iOS and Android mobile phones or tablet devices. These capabilities have allowed over a hundred thousand DoD and federal employees, including the U.S. Navy Reserve via the Ready-2-Serve (R2S) mobile application, to use personal and
government-furnished mobile devices to access needed information on-the-go. Thursby has sold more than one million software licenses to a range of customers and industries including government, healthcare, finance, energy, education, research, Fortune 500, Global 2000, and OEMs. “This combination substantially strengthens our position as a trusted provider of convenient high-security solutions to government and enterprise customers,” said Steven Humphreys, CEO of Identiv, “Thursby has built deep, long-standing customer relationships, completely aligned with our strategy of providing secure software platforms that are customizable to specific customer preferences. Thursby’s solutions truly deliver beyond its customers’ expectations, providing both high security and terrific end-user convenience. The company’s deep government strengths and mobile app expertise are core elements in our vision for federal and commercial security solutions. Thursby’s seamless support of both government-grade smart card deployments and derived credentials also aligns with our philosophy of supporting customers’ adoption of technologies at their own pace, optimized for their own use cases. We believe this accretive acquisition is a strategic step that moves us closer to achieving our longterm target business model, generating higher margins, improving profitability, SecurityLink India ■ November 2018
and delivering a solutions platform that transforms our industry.” Bill Thursby, President and Founder of Thursby Software Systems, commented, “In our 32 years, we have prided ourselves as being a leader in technology while remaining small and responsive. By becoming part of the Identiv family, we will retain our strengths while taking on the additional benefits of a large international company with an excellent reputation. We first partnered with Identiv in 2011 as both a supplier of smart card readers and a customer by adding the Thursby Sub Rosa license to the Identiv mobile reader line-up. We are excited to be joining the Identiv team who shares our passion for bringing together security and innovation for our customers.” “We started working with Thursby and Identiv in 2016 to enhance productivity and secure BYOD and mobile access for our Reservists,” said Tim Bentjen, Director of IT Development, Navy Reserve, “Thursby has been a key partner in making sure our applications are highly secure, yet convenient in the field. To ensure compatibility of our secure mobile applications on Android platforms, we have leveraged the Identiv smart fold reader/ mobile dongle.” Identiv’s acquisition of Thursby is subject to customary closing conditions and is expected to close on or about November 1, 2018. 75
International Updates
Joins Cyber Threat
The 18th International AntiAlliance (CTA) Corruption Conference: Act Now for Development, Peace and Security for Sharing Cyber T
he 18th International Anti-Corruption Conference (IACC), with the theme ‘Together for development, peace and security: now is the time to act,’ has recently concluded in Copenhagen with a rallying cry from the anti-corruption movement – ‘We are a global force and we will not be silenced.’ At a time when the rise of authoritarianism, in the guise of populist regimes, threatens all those who defend social justice regardless of the country, region or continent, the conference called on governments to protect civil society, and its role in exposing and confronting corruption and engaging citizens. Speaking at the closing plenary, Delia Ferreira Rubio, Chair of Transparency International said, “We are facing increasing threats to civil society space, freedom of speech, right to association, and increasing violence against activists and journalists. This has to stop. It is crucial for the sake for democracy and anti-corruption to defend the space for civil society.” The Copenhagen declaration proclaims: “We are unanimous in our commitment to collaborate, build coalitions, and unite so we can act together to end impunity for the corrupt. We recognise that the policies, the laws and conventions to stop corruption exist. Countries and the business community must effectively implement their existing anticorruption obligations, and must provide the resources needed to enforce anti-corruption laws and allow institutions to operate independently. Now is the time to act.” Following the money-laundering scandal which saw €200 billion in suspicious transactions pass through the Estonian branch Danske Bank, Denmark’s biggest lender, the activists gathered in Copenhagen called for cross-border action to prevent the laundering of the proceeds of corruption and stem the flow of dirty money. The conference also saw more than 45 governments, businesses and organisations sign a joint commitment to renewed anti-corruption efforts. Eighteen national governments and nine international and multilateral organisations issued their own commitments to advancing anti-corruption efforts. Huguette Labelle, Chair of the IACC Council said, “This conference has brought a renewed commitment from all of us to tackle one of the most critical challenges of our time. However, fighting corruption is not an end in itself. It is the fight for social justice, for peace and for security. We need to mobilise citizens and communities at a much higher scale and speed than what we have previously done. Young people must not fall prey to terrorism and populist authoritarianism. They must be empowered and constructively engaged in the anti-corruption movement.” 76
SecurityLink India ■ November 2018
Threat Information
N
EC Corporation has recently announced its membership in the Cyber Threat Alliance (CTA), a U.S. based nonprofit organization that facilitates the sharing of cyber threat information among member companies in order to improve products and services and elevate security for customers. Companies and organizations around the world are continually being faced with increasingly sophisticated cyberattacks. As a result, it has become critical to enhance cross-sectional security measures through inter-enterprise and inter-organizational collaboration. Recognizing this, in January 2017, six leading security companies (Check Point Software Technologies Ltd., Cisco, Fortinet, McAfee, Palo Alto Networks and Symantec) founded the CTA as a nonprofit organization, with the aim of generating and sharing cross-industrial, exhaustive and valuable threat information. Moreover, in February 2017, Michael Daniel, the former White House Special Assistant to the President, was appointed as the first CEO and President of the CTA. Currently, the CTA has a membership of 20 companies including NEC. CTA member companies can receive approximately 65,000 structured threat information eXpression (STIX) packages every day via the threat informationsharing platform operated by the CTA. STIX packages contain traces of threats
International Updates
such as file hashes of malware and malicious domain names, and contextualized threat information such as targeted attack campaigns and cyber adversaries. Members can use the information for their own analysis or to enhance their products and services. For CTA member companies to receive threat information, they are required to provide their own threat information with a certain value based on algorithms specified by the CTA. Thus, they need to maintain the technologies to collect, analyze and evaluate their own threat information. With this approach, the CTA is enabling the sharing of cyber threat information that is mutually beneficial to member companies. NEC will share information with the CTA and make use of the information it receives in order to develop cutting-edge security monitoring services and security-related products, aiming to contribute to building a safe, secure and rich society. “As the number of available targets in cyberspace increases, we need a better understanding of where malicious actors are focusing their attacks, so we can focus our collective defense. Therefore, it’s encouraging to see more companies understand the urgency of this mission and commit to sharing their data to collaboratively combat malicious cyber activity. We’re excited to welcome our newest affiliate member NEC who will contribute to and benefit from the rich data sharing within the CTA,” said Michael Daniel, CEO and President, CTA. “Cybersecurity is a global issue. At NEC, our focus is on using information and communication technology to enrich people’s lives, and the CTA’s mission of securing the global digital ecosystem is in line with our vision of orchestrating a brighter world,” said Kazuhiro Sakai, Executive Vice President, CIO and CISO of NEC, “We look forward to elevating security throughout the world through our partnership with the CTA.”
Acquires
A Cloud-Based Threat Analytics Company F
ortinet® has completed the acquisition of ZoneFox Limited, a privately held cloud-based insider threat detection and response company headquartered in Edinburgh, Scotland. The acquisition further enhances the Fortinet Security Fabric and strengthens Fortinet’s existing endpoint and SIEM security business by providing customers with: ●● Deeper visibility in to endpoints and associated data flow and user behaviour, both on and off the network. ●● Machine learning capabilities able to distill billions of events per day into highquality threat leads to uncover blind spots and alert users of suspicious activities. ●● A unique cloud based architecture that captures essential data around five core factors – user, device, resource, process and behavior – to analyze and configure policies easily. ●● Full forensics timeline recording of information, combined with a simple search interface that helps analysts quickly determine the actions needed to boost an enterprise’s security posture. ●● A zero-configuration agent that is easy and fast to deploy; the solution can scale up to support over 10,000 agents without performance loss. ●● Out-of-the-box support for GDPR, ISO 27001, HIPAA and PCI DSS, with ‘ready-to-go’ policies. The integration of ZoneFox’s award-winning machine learning based threat hunting technology will complement FortiClient endpoint security to provide endpoint detection and response (EDR) capabilities and will extend FortiSIEM with additional user entity behavior analytics (UEBA) features, both on-premises and in the cloud. Fortinet expects that the new endpoint security capabilities provided by ZoneFox will allow enterprise organizations to better leverage machine learning to detect anomalous behavior and provide an even faster response to insider threats. Dr. Jamie Graves, Chief Executive Officer and Founder, ZoneFox said, “We’re pleased to join the Fortinet team and bring together our shared vision of alleviating CISO concerns about insider threats. Integrating our solution with the Fortinet Security Fabric will allow us to extend our reach to a broad spectrum of Fortinet and third-party solutions to solve customers’ most difficult challenges in network security.” Ken Xie, Founder, Chairman of the Board and Chief Executive Officer, Fortinet said, “Enterprise organizations are experiencing a dramatic increase in the number of endpoints and users accessing data and cloud resources, which is also increasing the need to defend against insider threats. In fact, 30 percent of breaches involved insiders acting negligently or maliciously according to the 2018 Verizon Data Breach Investigations Report. By combining ZoneFox’s cloud-based threat-hunting technology with Fortinet’s existing endpoint and SIEM security offerings, we are well positioned to provide our customers with an integrated approach to defend against insider threats, eliminate network blind spots and protect today’s expanding attack surface with automation and machine learning.” SecurityLink India ■ November 2018
77
International Updates
Releases Heart of City Strategy at ‘Security China 2018’
D
ahua Technology, a leading solution provider in the global video surveillance industry, has recently hosted ‘Dahua Heart of City (HoC)’ launch conference at Damei Center in Beijing, China during Security China 2018. At the conference, business representatives, industry experts, as well as security and mass media professionals witnessed the unveiling of the Dahua Heart of City (HoC) New Smart City Framework, as well as the release of Dahua Technology’s latest cutting-edge technologies. Fu Liquan, Dahua Chairman of the Board, in his opening remarks expressed gratitude to the guests and media friends in attendance and said that through the exFu Liquan, Chairman of the Board, Dahua perience and Making the Opening Remarks deep knowledge gained in setting the national standards for smart cities as well as hundreds of city projects around the country, Dahua Technology is now perfectly equipped with the capabilities of top-level planning and detailed designing for smart cities He added, this year, Dahua Technology is setting out with the big picture in mind, redefining a new start by releasing its Dahua Heart of City (HoC) strategy. The strategy gathers together the company’s strong technological innovations, top-level security network architecture, and operation services capabilities, while forming end-to-end solutions with supporting technologies such as artificial intelligence, deep 78
learning, IoT, within all areas of smart city operations, to promote development of smart city thus enabling city operations to become smarter, and satisfying a city life that calls for high quality.”
Dahua Heart of City (HoC) builds jointly established, constructed and shared smart cities
D
eputy Director of the National Digitization Standardization Committee for Intelligent Buildings and Residential Communities, Zhang Yonggang, shared the support and guidance that smart city standardization has brought to urban construction, and explained the significance of artificial intelligence in the construction of smart cities. In his view, Dahua Technology has brought tremendous innovation and progress to the development of the industry. The release of the ‘Dahua Heart of City (HoC)’ strategy has provided new ideas and development connotations for the construction of smart cities in China, which will raise the curtains on gaining applications for its new smart city framework, and has important practical significance in building jointly established, constructed, and shared smart cities.
1+2+N new smart city framework: Empowering smart industry transformation
I
n order to give everyone an understanding, Li Ke, President of Dahua Technology, made a detailed interpretation. He explained that HoC is a smart city development engine supported by full sensing, full intelligence, full computing, and full ecosystem capabilities. It realizes the construction of a ‘1 platform, 2 centers, N applications’ (1+2+N) new smart city framework for application at the city, industry, and commercial level. “All of Dahua Technology’s future solutions and business systems will be built around the 1+2+N architecture to improve and enhance its end-to end solution capabilities,”
SecurityLink India ■ November 2018
International Updates
said Mr. Ke, “The Dahua HoC not only focuses on the ‘4 Full’ capabilities of products and solutions, but also gives the network ‘4 Full’ capabilities from a global perspective, thus driving professional, efficient, and intelligent operations. We hope that it will act as a heart that is capable of sensing a city’s pulse and data, while driving healthy city development.”
The AI series 6400W multi-sensor panoramic network camera + PTZ camera can not only achieve full-scene distribution analysis of crowds and traffic density, but also uses an AI dome to achieve the capture of details for facial feature analysis, behavior analysis etc., at ultralong distances. In the field of intelligent security inspection, Dahua has launched AI series all-in-one intelligent inspection system and intelligent X-ray inspection Dahua President, Li Ke Self-developed AI chip server, which support the identification extends AI video operations of guns, knives, liquids, sprays, and elecabilities tronic products. It also supports features such as the linking of t this year’s Security China, Dahua Technology brought people to their bags, image searching, and playback, revoludozens of new technologies, products, and solutions to tionizing the current methods for security checks. In order to the industry. Yang Bin, Vice President of the Dahua Techsolve the complicated deploying issue of software platform and nology R&D center said that Dahua Technology will always intelligentization experienced during the application of artifibuild sensing systems around real-life customer scenarios, cial intelligence projects, Dahua Technology has launched the continually deepening the computing and intelligent netAI series smart 7016 platform, which integrates intelligence, working capabilities within its products and solutions to management, storage, and forwarding into a single platform maximize value delivered to customers. In order to achieve that supports an up to 100,000 face image library and 64 video continuous, all-weather multidimensional IoT sensing, Dastream channels or 160 facial image comparisons per second, hua will promote the comprehensive application of AI techwhich accelerates the realization of intelligent industry applinology by releasing its AI series dual 4MP Super Starlight cations. In addition, Dahua Technology has comprehensively bullet/ dome integrated camera. With the use of multi-specdeployed video structuring solutions, launching its AI series tral imaging technology, combined with Dahua Technology’s structured server and video cloud big data platform to satisfy self-developed splicing algorithms for excellent low-lighting next generation city level intelligent application scenarios. The effects, the camera provides a complete color imaging expecreation of this series of products, technologies, and solutions rience. completely supports the realization of Dahua HoC.
A
Acquires Belgian Fire Control Panel Company
H
alma has successfully acquired Limotec Bvba in a move that will strengthen their fire safety offering in continental Europe. Based in Belgium, Limotec is a leading fire control panel designer and manufacturer and fire system seller in the Belgian market. The company will complement their existing portfolio of market-leading fire companies including Advanced, Apollo, Argus, FFE, and LAN Control Systems. Limotec currently integrates their control panels with Apollo’s detection devices, to sell complete fire systems through specialist channels. Limotec brings strong brand equity, supported by robust technology and excellent customer service. This acquisition supports the strategy of growing their geographic footprint and increasing fire system offering. The company will continue to run under its current management team, and will become part of Halma’s Infrastructure Safety sector. Andrew Williams, Halma’s Chief Executive commented, “Limotec strengthens our presence in continental Europe, bringing strong brand equity and robust technology to further enable us to capitalise on growth trends in fire detection, including increasing regulation and digitalisation. This acquisition follows our successful acquisition of Advanced Electronics in the UK in 2014 and is a further example of our strategy to acquire regional partners to accelerate growth in our core fire detection markets.” SecurityLink India ■ November 2018
79
International Updates
Leading IP Surveillance to the Next Level V
IVOTEK, a global leading IP surveillance provider, has joined the new Open Security & Safety Alliance (the Alliance), a non-profit, non-stock corporation that brings members together to create a common standardized platform for security and safety solutions. VIVOTEK is one of five founding companies joined by Bosch Building Technologies, Hanwha Techwin, Milestone Systems, and Pelco™ by Schneider Electric. Together, members will be working with the best common standards and specifications. They will also share guidelines for implementation to minimize integration efforts and lead IP surveillance industry to the next level. In the past, surveillance solutions were isolated without a common standardized platform. Manufacturers and software developers, therefore, were forced to expend resources on making their systems compatible to one another. This drain on research and development limited the innovation through which real value for customers and users was created. In establishing the Alliance, such a drain is greatly reduced and innovation will further as the Alliance grows. Companies of any size that share the same values are welcome to join the Alliance and contribute their ideas and expertise. Owen Chen, Chairman of VIVOTEK stated, “To become the eye in IoT is our vision. We have foreseen the strong growth potential of AI and IoT. A common standardized platform for security and safety solutions is required to allow the industry to grow in this age. Together in the Alliance, we are committed to combining different expertise across industries, and offering solutions in one common language for better results. Manufacturers or software developers can reach many more potential customers and create value added innovations beyond security and safety. Meanwhile users can enjoy up-to-date AI technology and discover more customer insights in smarter ways. It is a win-win collaboration for everyone in the ecosystem.” 80
Infineon Included in Dow Jones Sustainability Index for the 9th Time I
nfineon Technologies AG has been listed in the Dow Jones Sustainability™ Europe Index (DJSI) for the 9th consecutive year. This was announced by the Sustainability Investing (SI) specialist RobecoSAM. In addition to its incorporation in the European Index, Infineon is also part of the Dow Jones Sustainability™ World Index for the fourth time in a row. Infineon can therefore be ranked in the top ten percent of the world’s most sustainable companies. “Business success and responsible behavior are indivisible for us,” says Dominik Asam, CFO of Infineon Technologies AG, responsible for sustainability issues, “Environmental sustainability alone counts for little in the long run, if a company isn’t commercially successful as well.” Companies considered for inclusion in the DJSI are assessed with regard to economic stability as well as environmental and social performance. The longest running index of its kind, the Dow Jones Sustainability Index contains the most sustainable companies in a particular geographic region. This makes it the key reference point for companies and investors who place a high value on sustainability criteria when making investment decisions. The DJSI is created and managed cooperatively by S&P Dow Jones Indices and RobecoSAM. Infineon practices efficient and resource friendly manufacturing at all its 17 production locations worldwide. Over and above this, the company’s sustainable products make it possible to cut CO2 emissions by some 58 million tons of CO2 equivalents throughout their lifetimes. These products are used in areas such as automotive electronics, industrial drives, renewable energies, servers, cell phone chargers and induction cooking appliances. All in all, Infineon’s products and efficient manufacturing practices bring an environmental net benefit of more than 56 million tons of CO2 equivalents. This figure roughly corresponds to the greenhouse gas emissions caused by energy consumption in the private homes of around 85 million Europeans. Infineon Technologies AG is a world leader in semiconductor solutions that make life easier, safer and greener.
SecurityLink India ■ November 2018
International Updates
Hikvision Achieves Common Criteria Certification H
ikvision’s IP camera product series DS-2CD3 and DS-2CD5 have achieved the certificate of Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) with assurance type EAL2 augmented with ALC_FLR.2 (EAL2+). It demonstrates Hikvision’s commitment to global customers on reliability and cybersecurity. As one of the most widely recognized international standards (ISO/ IEC 15408) in information technology security, the Common Criteria certification is mainly applicable to evaluating security and reliability of information technology products or solutions, and is also focused on the protection of private information. Government organiza-
tions or government agencies from 28 countries participated in the Common Criteria Recognition Arrangement (CCRA) including National Information Assurance Partnership, Department of Defense of U.S. Many enterprise organizations also use CC as a requisite in relevant procurements. “Along with the transformation into a networked and intelligent era, security industry is facing unprecedented development opportunities, but also new challenges. Hikvision is always committed to developing quality, safe and innovative security products,” said Dr. Wang Bin, Chief Officer at Hikvision Network and Information Security
Laboratory and Network Security Department. As required process to achieve Common Criteria certificate, Hikvision successfully passed the rigorous evaluation performed by Common Criteria testing laboratory Brightsight, a worldrenowned security evaluation institution.
Appointing VP & President, Building Solutions, APAC J
ohnson Controls International plc. has recently appointed Visal Leng as Vice President and President, Building Solutions, APAC. In this role Leng will serve as an officer of the company and oversee Johnson Controls Building Technologies & Solutions operations across the Asia Pacific region. Leng joins from Baker Hughes, a GE Company where he served as president Asia Pacific of the world’s first and only full stream provider of integrated oil field products, services and digital solutions. Prior to the merger of Baker Hughes with GE in 2017, Leng held a number of roles with increasing responsibility with GE, including president of its Asia Pacific oil and gas operations. “Visal is a seasoned leader with strong business acumen and a growth mindset. He will be instrumental in driving the company’s growth platform across Asia Pacific to position Johnson Controls as a leader in smart and sustainable solutions for our customers,” said George Oliver, Chairman and CEO of Johnson Controls. Leng holds a master’s degree in civil engineering from Ecole Speciale des Travaux Publics (ESTP) in France. Leng will report directly to George Oliver and be based in Shanghai. SecurityLink India ■ November 2018
81
International Updates
Avigilon Announces Professional Monitoring Support for Avigilon Blue™ Cloud Platform New integration with SureView Systems will provide powerful video analytics-based event verification to central alarm monitoring stations
A
vigilon Blue cloud service platform for security and surveillance will support professional video monitoring through a new integration with SureView Systems (SureView) Immix® CS and Immix CC software. The Avigilon Blue cloud platform features patented selflearning video analytics that detect movements of people and vehicles, and generate an alarm with a short video clip, allowing central station operators to more efficiently verify and respond to potentially critical events. The integration with Immix CS and Immix CC software will feature alarms with live and recorded video as well as audio transmission. “Video analytics-based alarm management will enable central stations to manage significantly more cameras and sites with fewer resources and help provide faster response to events, which ultimately creates a better monitoring experience for both the central stations and the end users,” said Ryan Nolan, Senior Vice President, Business Operations at Avigilon, “With our advanced video analytics, the Avigilon Blue platform integrated with SureView software will provide our customers with a single point of control for security response and coordination.” “At SureView, we develop a powerful monitoring platform to improve customers’ ability to manage and respond to security events,” said Simon Morgan, Chief Technology Officer at SureView Systems, “With Avigilon Blue’s exceptionally accurate analytics and low false alarms, this new integration will further enhance the operational efficiency and value of professional monitoring services.” The Avigilon Blue integration with SureView Immix CS and Immix CC software is expected to be available in November 2018. 82
BX Shield Nominated as Finalist in Detektor International Awards 2018 T
he security trade magazine Detektor International has nominated 12 products/ solutions for the 2018 Detektor International Awards. The overall winners in each category will be announced at the security industry presentation ceremony in Copenhagen, Denmark, during the Sectech exhibition, 7 November 2018. The prestige associated with Detektor International Awards is derived from the fact that there is no formal entry process. Instead, each year, the Detektor International Awards panel of jurors scrutinise the security market to discover, nominate and vote on which products demonstrate the most innovation, versatility and user-friendliness. There are four product categories – ID and access control, alarm & detection, video surveillance and IoT security, and three products have been nominated in each category. The winner in each category will be awarded the Best Product Award and the other finalists will be awarded the Innovative Achievement Award at the security industry presentation ceremony. BX shield has been selected in the category of Alarm & Detection. The shield series has had a lot of interest in the public eye since its launch and continues to gain positive press and customer feedback due to its multifunctional detection system and sleek design. The BX shield series features a series of curtain-based outdoor motion sensors for intrusion detection with up to 12 metres detection range on each side of the device. One of them comes with antimasking (BX SHIELD AM model).
SecurityLink India ■ November 2018
International Updates
UTC Climate, Controls & Security Completes Acquisition of S2 Security and Launches LenelS2, a Leader in Access Control Systems
U
TC Climate, Controls & Security has completed its acquisition of S2 Security, which will be combined with Lenel to create LenelS2, a global leader in advanced access control systems and services. Through the collective strengths of both companies, LenelS2 will provide scalable, cutting-edge customer solutions in the access control and security management systems industry, serving global enterprises to small- and mid-sized companies. The business is part of UTC Climate, Controls & Security, a leading provider of fire safety, security, building automation, heating, ventilating, air conditioning (HVAC) and refrigeration systems, a unit of United Technologies Corp.
“LenelS2 unites two world-class teams with complementary strengths,” said Alex Housten, VP and GM, Fire & Security Products, UTC Climate, Controls & Security, “Together, we have more than 50,000 systems installed worldwide. We look forward to providing enhanced service capabilities and offerings for our customers, and accelerating our access control and video-centric solutions for intelligent buildings across the globe.” Lenel President Jeff Stanek will lead the new organization and S2 Security Founder and CEO John Moss will serve as Chief Product Officer. The broader leadership team will consist of key members from each company, ensuring that the combined com-
pany will bring together the best of both worlds in serving its customers. “These are two leading brands that share a strong culture of innovation and commitment to customer service,” said Stanek, “Together, we will harness the power of our talented workforce to better serve the needs of customers and offer them more choices.” “The depth of Lenel’s OnGuard platform and BlueDiamond™ mobile credentialing together with the breadth of S2’s product ecosystem and channel, creates a new offering that is far greater than the sum of its parts,” Moss added, “We will continue to advance the capabilities of all product lines, including NetBox and OnGuard.”
Canon to Increase its Ownership in Axis A
xis majority owner Canon has recently announced a share purchase agreement that will result in Canon holding almost 98 percent of the shares in Axis AB. Canon intends to apply for delisting of Axis from the Nasdaq Stockholm. Axis will remain an independent entity within the Canon Group. “Considering that Canon at the time of their public offering in 2015 expressed an ambition of acquiring all shares in Axis, this was expected to happen at some point. We do not expect this to change daily operations at Axis. Canon has underlined that Axis will continue to be run as an independent company. At the same time, we believe it’s very positive to be part of the Canon Group,” said Ray Mauritsson, CEO of Axis. Canon made the share purchase agreement with Elliott International, L.P. and The Liverpool Limited Partnership. Canon has agreed to purchase 7,825,516 shares in Axis at SEK 363.75 per share. As a result of the transaction, Canon will hold 97.9 percent of the shares in Axis and intends to request that the Axis Board resolves to apply for delisting of Axis shares from the Nasdaq Stockholm. Canon also intends to initiate a compulsory acquisition procedure under the Swedish Companies Act to acquire all remaining shares in Axis. SecurityLink India ■ November 2018
83
feature
Dahua Hdcvi 5.0 Technology Brings New Insight into Surveillance to your Service By Balasubramanian Jayam Head of Marketing (India & SAARC), Dahua Technology India Pvt. Ltd.
D
ahua Technology presents the world with HDCVI 5.0, the latest instalment to a revolutionary series for the global surveillance industry initiated in 2012, which brings clarity, intelligence and security to an unprecedented level. For those who are not already familiar with the field, there’s no need to rush into jargons of technical details behind the acronym. Simply imagine a really good security guard you hire who happens to enjoy an exception-
ally sharp eyesight unaffected by the darkness of night; who also happens to be able to recognize each and every face ever shows up with correct names attached; who also happens to be smart enough to identify potential threats approaching and brave enough to take spontaneously actions; who also happens to never get tired 24/7. It doesn’t take a miracle to have such a great security guard. Dahua HDCVI 5.0 Technology accomplishes all the aforementioned and more. Now let’s cut to the hard-core facts and numbers that confirm the various ground-breaking benefits brought to you by HDCIV 5.0, which consists of HDCVI active deterrence camera, 4K/ 5MP/ 1080p Starlight HDCVI camera, 1080p full-colour HDCVI camera and HDCVI 4K & H.265 AI XVR. When used combined, they will take care of your security problems in the following 5 aspects.
Perimeter protection
H
DCVI 5.0 can detect potential risks based on configurable motion, tripwire and intrusion rules. The system will send alarms to users when unwanted moves occur. Furthermore, the system boasts intelligent analyses that filter minor objects like animals, insects, leaves, light,
84
SecurityLink India ■ November 2018
feature
raindrops etc., thus reducing false alarms and allowing users to focus on real threats that are people and vehicles.
Face recognition
H
DCVI 5.0 is able to determine if there is a face in the monitoring video and crosscheck it with faces stored in database to see if it belongs to a suspect or distinguished guest according to users’ own black/ white lists, and take corresponding actions that could either be an alarm or a free pass without manual check at entrance control. Fully guaranteeing accuracy and process efficiency, the system supports up to 24 pic/s face recognition and 20 databases with up to 100,000 face images in total.
Metadata search
C
onstituted with feature attribute information extracted from target faces such as gender, age, glasses, masks, beard and expressions, metadata makes it possible to do smart search by comparison between the modeled object and database or matching with identity characteristics, which significantly enhances accuracy and efficiency. In addition, the metadata is also of great help to platforms that allow potential business applications realized by third parties.
Active deterrence
E
njoying PIR and motion dual-detect which improves accuracy and reduces storage space for motion detect based recording, HDCVI 5.0 can not only send real alarms to users in time but also warn off intruders with white light and siren on site. Thus, the system is a watchdog that not only watches but also barks. Moreover, together with the alarms sent to users in real-time are visual and audio verification with HDCVI videos, the most immediate evidence of what really happened.
Starlight & full-color
F
or HDCVI 5.0, darkness is no excuse. With starlight cameras ranging from 1080P to 4K and full-color, which are endowed with high performance sensor and
larger aperture lens, the system is able to give high color reproduction and light sensitive performance resulting in more vivid, brighter images, meeting the requirements in low-light monitoring environments such as parking lots, urban streets, shops etc. Full-color camera allows 24/7 color monitoring for collecting chromatic information such as colors of clothing or vehicle. Even in total darkness, the system still functions, thanks to light compensation with smart IR (for common starlight cameras) or smart white light (for fullcolor cameras). The images gathered, after being treated with advanced processing technology to reduce noises while retaining low smear and clear details, are useful materials for further intelligent analysis. It should also be noted that HDCVI 5.0 keeps all born features of HD-over-Coax system including seamless upgrade and easy-to-use. It further simplifies system deployment with practical features as smart H.265+ encoding and broadcast-quality audio. As a leading solution provider in the global video surveillance industry, Dahua Technology has always put great emphasis on ‘innovation, quality and service,’ which naturally leads to the birth and ever evolving of HDCVI solutions. The latest HDCVI 5.0 is another milestone on the way to Dahua’s ultimate goal – enabling a safer society and smarter living.
SecurityLink India ■ November 2018
85
product showcase
products. The organization has a global member base of established camera, video management system and access control companies and more than 10,000 profile conformant products.
Profile T for Advanced Video Streaming VTO9341D
O
NVIF®, the leading global standardization initiative for IP-based physical security products, has announced the final release of Profile T, a new specification with advanced video streaming capabilities and an expanded feature set for metadata streaming and analytics. Profile T also offers support for H.265 video compression, which more efficiently handles image streams from high-definition cameras. With Profile T, ONVIF will employ a new media service that offers support for both H.265 and H.264 video codecs. The media service gives ONVIF the ability to more easily incorporate new video and audio codecs as needed as the industry continues to advance. By supporting H.265, Profile T supports more efficient compression rates, which translates into decreased storage requirements on hard drives and less bandwidth usage – reducing the overall costs of system ownership. “Profile T is an excellent example of how ONVIF has embraced technological advancements within its specifications to serve the changing requirements of this industry,” said Per Björkdahl, Chairman of the ONVIF Steering Committee, “In addition to the H.265 support, Profile T standardizes analytics, metadata streaming and other important features to satisfy current and future market requirements for end users, systems integrators and consultants.” The new Profile T features bidirectional audio streaming, supporting audio input as well as output from the camera. Using standardized event types, Profile T ensures that video management systems and other software clients use one set of events to support all cameras, regardless of manufacturer. This includes alerts such as tampering, digital input and relay output. Profile T also enables a specific area of an image to be selected for analysis, using the conditional motion region detector configuration through the analytics service. Profile T also covers the streaming of metadata, including analytics and events. ONVIF is a leading and well-recognized industry forum driving interoperability for IP-based physical security 86
Face-recognition apartment outdoor station
D
ahua Technology has recently launched a new apartment outdoor station VTO9341D, providing new access control solutions to fence and lobby entrance with the cutting-edge face recognition technology. The apartment outdoor station elevates the safety and convenience of resident security system to a new level with the fashionable non-touch face-recognition entry, while conventional unlocking ways are preserved in case of emergency. The product’s working temperature is between -20°C and 60°C, meaning it can operate smoothly across a variety of weather conditions and geographical areas. With a shell made of aluminium alloy plate, it meets IP55 standard for water and dust resistance, and IK07 standard for impact resistance. Further enhanced by the intrusion prevention system, the product will offer ideal ingress protection to property owners and facilitate the work of security guards.
Face recognition
O
nce a person steps into the 0.5 metre distance range of VTO9341D, that triggers its approaching induction, the 2MP CMOS image sensor captures the face highdefinition color image for identification. In as
SecurityLink India ■ November 2018
Dahua Face-Recognition Apartment Outdoor Station VTO9341D
product showcase
quick as 0.5 second, it can complete recognition and open the door for the residents. With strong capacity to store up to 20000 faces, the system would suffice the demand of large housing estates or commercial lots. The auto gain control supplements white light to cope with poorly-lighted conditions, enabling night vision for the outdoor station.
Multiple unlocking approaches
V
TO9341D is also equipped with Mifare card reader, fingerprint recognition (with a memory of 3000 fingerprints), and touch screen key pad, which provide multiple unlocking approaches via card, fingerprint and password. Working together with VTS5240B Master Station that can forward image to mobile devices, owners can even enjoy the remote unlock function while away from home. Additionally, the audio system supports bidirectional talk, which assists visitors and owners in dual-way communication as an auxiliary to face identification. As a high-end product with unique features and full market potential, VTO9341D will benefit both Dahua dealers and system integrators. With DSS EXPRESS monitoring access control & other Dahua exclusive technologies, the apartment outdoor station would lower the time cost of integration and maintenance. With a mission of ‘enabling a safer society and smarter living,’ Dahua Technology will continue to focus on ‘innovation, quality and service’ to serve partners and customers around the world.
CyberVantage™ Security consulting services New Industrial Cybersecurity Services to Address Customer Skills Gap
H
oneywell has added new cybersecurity consulting services designed to help industrial and critical infrastructure customers identify and eliminate dangerous security weaknesses. The Honeywell CyberVantage™ Security Consulting Services portfolio now includes penetration testing, providing active ‘white-hat’ hackers who exploit customer defenses in order to fix them. It also now offers system hardening to reduce software vulnerabilities and assist customers
in safely complying with global center for internet security (CIS) industry benchmarks. Delivered by consultants with expertise in both operational technology (OT) and industrial cybersecurity, the services help organizations lower the risk and possible impact of security incidents and improve their industrial cybersecurity maturity levels. Strategically, CyberVantage security consulting services provide capabilities that enable safer connected plants, digital transformation, and Industrial Internet of Things (IIoT) efforts. “Our unique OT/ IT experience has resulted in the successful delivery of more than 5000 projects, helping customers prioritize their cybersecurity investments,” said Mike Spear, Honeywell’s Global Operations Director for Industrial Cyber Security, “As a result, they have maximized ROI and reduced risk, saving both time and costs. Additionally, our cybersecurity consultants are familiar with the rigorous requirements of working in an industrial facility and maintain a variety of safety and security certifications.” The need for industrial cybersecurity skills is particularly critical as the process industries face a growing worldwide skills gap, with research company Cybersecurity Ventures predicting 3.5 million unfilled cybersecurity positions by 2021. As well, fines introduced by government legislation can cost non-compliant customers millions of dollars. Tapping Honeywell’s specialized knowledge of requirements such as industrial control system (ICS) security standard IEC-62443 and a variety of country specific standards can help avoid such penalties while improving cybersecurity preparedness. The new penetration testing and system hardening offerings expand the Honeywell CyberVantage security consulting services portfolio of more than 30 services that deliver
SecurityLink India ■ November 2018
87
product showcase
comprehensive cybersecurity expertise to industrial clients, from assessments and audits to remediation. CyberVantage customers have access to hundreds of cybersecurity experts, as well as multiple industrial cybersecurity centers of excellence located around the world to simulate, validate and accelerate their multi-vendor industrial cybersecurity solutions. The purpose-built, state-of-the-art facilities are staffed by Honeywell cybersecurity experts.
AXHub Intruder Alarm System The latest innovation in intruder alarm systems
H
ikvision has released the latest product range to hit its portfolio, the AXHub intruder alarm system. Part of the Hikvision AX-Series, the brand-new wireless system stylishly caters to any residential and small commercial applications by seamlessly connecting security and video on one-platform. “Hikvision is pioneering the one-platform revolution for security systems that enables HD video verification of events, remote control to arm and disarm the alarm, as well as the ability to switch between alarm system and video like never before,” said Jiang Feng Zhi, Head of Hikvision’s Alarms Division.
Video and intrusion system in one platform
T
his advanced synergy of technologies is delivered in a small, compact and discreet panel that delivers multi-
88
configuration methods, full control and setup via Hik-Connect smart device application, and iVMS as well as video verification through revolutionary Intruder Verification as a Service (IVaaS). Integration is at the core of the AXHub, utilising cloud technology to combine intrusion and video like never before. Where other video verification methods on the market are reliant on sending low-quality static imagery to confirm events, IVaaS links previously separate video and intruder systems to one platform, providing a 7 second clip in the event of an alarm – 5 seconds pre-alarm and 2 seconds post alarm. To achieve this, there are two options – via the cloud, or innovatively connecting up to two cameras directly to the AXHub for on-board video verification. This enables Hikvision’s video and intrusion systems to seamlessly deliver video footage directly to the user through Hik-Connect or iVMS, or directly to a central monitoring station (CMS). By delivering video to users, or a CMS via e-mail, smart device and desktop applications, they can switch to full HD live streams to verify action can take much faster and more reliably in the event of an activation. Hik-Connect compatibility also allows full control of the system from anywhere, enabling users to remotely arm, disarm and monitor, as well as check history and receive push notifications of any events. “When one manufacturer provides the components for each part of the system, we don’t need to try and make things work together; we aren’t ‘integrating’ systems,” said Mr. Jiang, “The video and intruder systems are
SecurityLink India ■ November 2018
product showcase
designed to work seamlessly with each other, and this is what we have achieved in the AXHub.” Compatible with any Hikvision video or intrusion device, this allows the ideal security solution to be fitted every time, covering every vantage point.
Award-winning intrusion technologies
T
he system supports up to 32 wireless inputs from a wide range that includes internal and external detectors, contacts, keyfobs, life safety sensors, and much more. The extensive wireless range of intrusion devices feature award-winning, proven and patented intrusion technologies for complete confidence and peace of mind, with easy installation using signal strength indicators and one-push-to-learn. The AXHub also utilises 3EasyFit, a technique to speed up initial installation, and supports voice-guided setup for configuration and operation, making the entire installation process fast and efficient. The local voice prompts will also alert the user to any events on the system, while voice calls for alarms can be configured as well. The variety of communication pathways available with the AXHub is unmatched, offering LAN, Wi-Fi, GPRS, and 3G/ 4G connections with on-board communication modules and connectors for a simpler and more cost-effective installation. While with multiport IP communications, the AXHub can also communicate simultaneously with multiple devices to ensure alarm messages are sent to all that need them.
Lite Version of VIGIL Client for Mac Users New application will power company’s deeper penetration into the fast-growing Education market
3
xLOGIC, Inc. has recently announced immediate availability of new VIGIL Client Lite software for Mac users. 3xLOGIC’s newest software offering fulfills customer requests to produce a lite version of VIGIL Client for Mac users that provides the basic functionality of the PC version
of VIGIL Client. “This application opens up a yet untapped segment of our customer base who use Apple products, particularly in the education vertical,” said Michael Poe, Product Manager, 3xLOGIC. VIGIL Client Lite for Mac supports many of the features of the 3xLOGIC PC-based VIGIL Client including: ●● View live streams for up to 36 cameras across multiple VIGIL servers. ●● Use VIGIL Connect or Direct IP to connect to multiple VIGIL servers or standalone cameras. ●● Digital pan, tilt, and zoom support through the live view window. ●● Instant playback to quickly view the last 5 minutes of video. ●● Search playback based on date and time. ●● Export Jpeg snapshots or MP4 videos. ●● Smart search support. ●● VIGIL central management (VCM) support – VCM users can easily populate and load managed VIGIL Servers. “This is an important addition to our software library,” commented Bills Hobbs, National Director of Sales for 3xLOGIC, “The education vertical market is large and growing. We’ve had good success with education customers, and now we’re set to gain even more education market share by supporting popular Apple technology.” Running VIGIL Client Lite natively on the Mac OS should be a significant performance boost while maintaining the look and feel Apple users have always enjoyed, thus bringing the power and flexibility Windows users have had to the Mac user as well. Version 1.0 of the Mac Client provides the building blocks of future versions that will offer additional functionality as the software evolves.
SecurityLink India ■ November 2018
89
product showcase
Wisenet Q Flateye IR Dome cameras for humid environments
accurately produce images in scenes that simultaneously contain very bright and very dark areas, and lens distortion correction (LDC) which compensates for the image distortion that can occur with wide angle lenses. A hallway view feature provides a highly effective way to monitor narrow vertical areas such as corridors, tunnels and aisles, with the added bonus of minimising bandwidth and video storage requirements.
H
anwha Techwin’s new Wisenet Flateye IR dome cameras have been designed for high humidity environments and for where condensation might occur because of temperature differences. The main feature of the new H.265 domes, which are part of the Wisenet Q series, is that they have a flat surface cover which is applied to the front of the lens instead of the dome cover. This reduces IR diffused reflection which is caused by moisture, and in the absence of a normal transparent dome cover, it also removes the effect scratches can have on image clarity. “These new models have been introduced to provide a highly effective and robust solution for our end-user clients who require high definition cameras to operate effectively in what may be challenging environmental conditions, such as industrial or food processing plants,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, “Installers will also benefit from having to spend less time on site as there is no need to initially remove and then mount a dome cap during the installation process.” The 2 megapixel Wisenet QNE-6080RV and 4 megapixel QNE-7080RV Flateye domes have built-in IR functionality which ensures objects can be recognised at night up to a distance of 30 metres, whilst a 3.1x (3.2 – 10mm) motorised varifocal lens enables wide-angle monitoring. The new domes are also equipped with defocus detection which generates an alert if the camera is out of focus, and ‘defogging’ which makes corrections to blurry images which are captured in foggy conditions. Additional features include the world’s best wide dynamic range (WDR), which performs at up to 150dB to 90
Learning-based Auto Focus Speed up the focus speed of Speed Dome cameras using machine learning
A
CTi has developed an intelligent learning-based auto focus technology that allows the PTZ cameras focus instantly based on previous learning of best focus positions of each spot in the hemisphere. The camera learns by itself and no supervision is required. As a result, whichever direction the PTZ camera is pointed at, it focuses instantly. In comparison, conventional PTZ cameras require 1-3 seconds to focus whenever pointed at a different direction. The first speed dome models supporting this technology are B913, B915, B923, B943, B922 and B928. Learning-based auto focus technology is used in selected ACTi speed dome cameras to increase focusing speed after panning, tilting or zooming. Conventional focusing techniques rely on detecting peaks in contrast and sharpness of objects’ edges in the scene while continuously adjusting the focus. The image is becom-
SecurityLink India ■ November 2018
product showcase
ing sharper beyond the point at which the focus is optimal. Once this point has been exceeded, the lens returns slightly to the position with the sharpest image. To the viewer, the image appears sharp, then blurry and then sharp again. Depending on the lighting conditions and other factors, this process may take several seconds. Once in focus, ACTi speed dome models equipped with learning-based auto focus technology use reverse calculations to determine the distance of the object in front of the camera at each specific position (defined by pan and tilt coordinates) and store it into their internal memory as a reference point. Next time the camera moves to this position, it uses the previously saved information about target’s distance to immediately focus on it. The action takes a split second, significantly less than if the camera had to find focus without any reference. In a typical scene, the majority of objects are static like furniture, buildings, or trees. Their distance from the camera is unlikely to change over time. However, some objects are mobile, for instance, people or vehicles. It is possible that an object’s distance that had been found previously at the position is no longer valid. In that case, the camera detects suboptimal image sharpness and automatically starts refocusing. Since the camera has a reference distance, it attempts to find the optimal focus around the previously measured distance. It is able to refocus nearly instantly because it doesn’t need to search focus in a range between few centimeters and infinity. It then updates the focus information for this position in its memory. The learning is completely autonomous and continuous, resulting in the camera’s focus becoming faster over time simply by using it. No action needs to be taken by the camera operator, although defining the focus manually for any position is also possible. The focus created manually then takes precedence over the automatically learned one.
FLIR Firefly® Deep Learning Enabled Camera Family
F
LIR® Systems, Inc. has recently announced the FLIR Firefly® camera family, the industry’s first deep learning inference enabled machine vision camera. The FLIR Firefly, which integrates the Intel® Movidius™ Myriad™ 2 vision processing unit (VPU), is designed for image analysis professionals using deep learning for more accurate decisions, and faster and easier system development. Traditional rules-based software is ideal for straightforward tasks such as barcode reading or checking a manufactured part against specifications. The FLIR Firefly combines a new, affordable machine vision platform with the power of deep learning to address complex and subjective problems such as recognizing faces or classifying the quality of a solar panel. The FLIR Firefly leverages the Intel Movidius Myriad 2 VPU’s advanced capabilities in a compact and low-power camera, ideal for embedded and handheld systems. Machine makers can load their trained neural networks directly onto the Firefly’s integrated VPU. Additionally, Intel Movidius Neural Compute Stick users can easily deploy their existing networks directly onto the Firefly. This unique design reduces system size and improves speed, reliability, power efficiency, and security. “Automated analysis of images captured by machines is a key part of our day-to-day lives that few of us think about,” said James Cannon, President and CEO of FLIR, “The quality, affordability, and speed-to-market of items like our smartphones or the food on our tables are made possible by systems using cameras doing both inspection and automated production. With the FLIR Firefly powered by Intel Movidius Myriad 2 VPU, we are enabling the designers of these
SecurityLink India ■ November 2018
91
product showcase
systems to leverage deep learning faster and at lower costs.” “The Intel Movidius Neural Compute Stick enabled FLIR to rapidly prototype, streamlining the early development of machine learning in the Firefly,” said Adam Burns, Director of Computer Vision Products at Intel, “Now the FLIR Firefly uses the compact, efficient Intel Movidius Myriad 2 VPU to perform real-time inference in the camera, without compromising the amazing levels of miniaturization that FLIR has achieved in this device.”
technology can also be used for free flowing traffic at speeds of up to 200km per hour, and is able to read plates with a very high level of accuracy. IndigoVision’s BX Thermal bullet camera has been updated to deliver a different dimension of safety. This update includes a higher frame rate of 30fps, a new sensor update, audio input & output, fire detection analysis and CyberVigilant® in Camera, making it the perfect solution for dark, long range monitoring applications. For over 20 years, IndigoVision have been on the forefront of cutting edge technology and innovation in the IP security industry. Trusted in more than 15,000 installations, IndigoVision can be relied for providing with innovation that makes life safe.
The Latest Innovative Products Detect. Deter. Disrupt.
I
ndigoVision, the leading developer of complete end-toend IP video security solutions, released new innovative products during GSX 2018 and Security Essen 2018 this year that allow customers to further enhance their security solution. IndigoVision’s latest version of tiered security management solution, Control Center v15.3, will help enhance security systems with exciting improvements to the CyberVigilant® device (including alarm collapsing features), Reorder Storyboard Clips, and the introduction of the Federated License Server. IndigoVision’s intelligent and accurate license plate recognition (LPR) is powered by InnoWare and takes the system beyond traditional license plate recognition. Integrated into IndigoVision Control Center, LPR powered by InnoWare is ideal for stop and go applications such as parking-lot access where cards or money are required to enter and exit. This
Detect. Deter. Disrupt.
92
Smartphone Credentialing for Its VAX Access Control System New bluetooth solution eliminates need for physical cards
V
icon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components, brings a new level of convenience and simplicity to its VAX Access Control solution with today’s introduction of mobile credentialing. This new feature allows VAX customers to present their smartphones, instead of cards or fobs, to specialized bluetooth-enabled VAX door readers. Upon installation of a custom smartphone ‘wallet’ app and a simple authentication process that links that app to the specific phone, users enter their personal VAX credentials into the wallet. Multiple credentials can be accommodated. No additional activation steps such as entry of personal information or bluetooth linking are required. To unlock doors using the mobile credentials, users unlock their phone, access the credential within the wallet app and push the ‘unlock’ button. Credentials are uniquely linked to each smartphone and cannot be shared or installed across multiple devices. Android and iOS devices are supported. Strong AES encryption, combined with smartphone PINs or biometrics, make the mobile credentials even more secure than traditional
SecurityLink India ■ November 2018
product showcase
smart cards. Two models of contactless door readers are available – one requires immediate proximity (1.5 inches) and one with read range of up to 15 feet. The bluetooth readers can also accommodate traditional RFID access cards, providing flexibility to administrators wishing to offer both types of solutions to employees. Bret McGowan, Vicon’s V.P. of Sales and Marketing said, “Access control is as much about convenience as it is security. If a solution isn’t easy for customers to use, doors will remain propped open and the system can’t do its job. Our new mobile solution makes it possible for employees to always have their credentials with them, even when they’re not carrying a purse or wallet. It’s another way we are using cutting-edge technology to deliver ‘advanced simplicity’ to the security marketplace.”
New Paxlock Pro At nationwide installer events
trol units, such as the PaxLock Pro. The improved aesthetics facilitate its positioning on a wall or ceiling for optimal coverage, and the enhanced, low profile design provides a clear display of the status LED’s for ease of use. It is also easy to fit with a simple three-step instillation process. Gareth O’Hara, Paxton’s Chief Sales Officer says, “The PaxLock Pro represents Paxton’s third generation of wireless door handle and comes as a direct response to customer feedback. Following two-years in development, we believe it is our best yet. The versatility of the product allows us to address networked and non-networked systems, internal and external doors; we believe the PaxLock Pro is the must have product for Paxton installers everywhere. We continuously strive to meet our customers’ expectations and have worked tirelessly to ensure the product is robust, durable and aesthetically pleasing in equal measures.
P
axton has launched the PaxLock Pro, the latest addition to its range of wireless access control solutions, in conjunction with the new and improved Net2Air bridge, the connector to the Net2 wireless range. PaxLock Pro has a universal design that can operate in standalone mode or as part of a networked system. There is a simple upgrade path from standalone to networked, with no extra hardware required that creates a solution which can evolve with the needs of the customer. There are both internal and external versions available making it applicable for more sites than ever before. This includes residential, educational facilities, commercial buildings and healthcare sites. It has a smart, compact appearance and is available in black or white complete with anti-scratch fascia ensuring that the product maintains a high-quality look and feel for even the most modern of interiors. The PaxLock Pro is built to last with its robust design and capacitive wake-up ensuring a time and energy efficient solution. The kit comes ready to fit, meaning it can be installed quickly and can replace an existing door handle. Paxton’s new Net2Air bridge provides the wireless communication link between the Net2 software and wireless con-
Thermeye™ Building A New Product Line Dedicated to Smart Building Applications This thermal sensor line is for integrators needing detection and people counting capabilities for connected buildings
U
LIS, a designer and manufacturer of a wide range of innovative thermal image sensors, has recently launched ThermEye Building, a thermal sensor line for system integrators of detection and people counting equipment for connected buildings. The ThermEye Building range includes two new products – ThermEye™-b90 and ThermEye™-b120. These 80x80 thermal sensors provide system integrators with advanced functionalities to detect presence (even when people are
SecurityLink India ■ November 2018
93
product showcase
immobile), and localize and count people in order to improve capabilities in analyzing human activity and communicate with relevant smart building applications. Coupled with a 90° or 120° field of view (FoV) lens, a single ThermEye Building sensor can cover a zone of 30m2 (323ft2), equivalent to a meeting room accommodating eight to ten people. The product range is configured with a conventional video channel (50 images per second) and features an intermittent mode that is compatible with low-power consumption applications. It only requires one AA battery to run a ThermEye Building sensor when transmitting an image at two-minute intervals. The advantage of running entirely on batteries means that end-users can deploy these detection, people counting and localization systems in both new and existing buildings. The solutions developed for the ThermEye Building product line guarantee occupant anonymity and privacy, as there is no facial recognition. This is a plus for integrators wishing to use data to develop other future solutions for smart building applications that improve how facilities optimize space usage and energy management, detect potential fire hotspots and manage people flow during a fire. “ULIS is invested in the connected buildings market. This novel product demonstrates our commitment to bringing smarter sensing solutions to facility managers,” said Cyrille Trouilleau, Smart Buildings Manager at ULIS, “We have extensive expertise and experience in designing reliable high-resolution thermal image sensors. We are now applying this know-how and industrial rigor to our mass market sensors. ThermEye-b90 and ThermEye-b120 are 80x80 resolution sensors offering the right level of added performance needed for intelligent systems. Our industrial platform based on a disruptive technology that drives costs down will allow us to produce several hundred thousand of these sensors every year for commercial applications.” 94
Acoustic Nozzle Receives UL Verification
J
ohnson Controls recently received Underwriters Laboratories (UL) Verification for its ANSUL® Acoustic Nozzle, making it the first fire protection product to earn a marketing claim verification for performance. This independent, science-based assessment confirms the accuracy of a manufacturer’s marketing claims, allowing customers to be confident in their product selection. The acoustic nozzle earned the verification for this claim – ‘1/3 octave sound power is less than 110db for regulated flow and less than 113db for orifice flow.’ UL presented the verification certificate to Johnson Controls at the National Fire Protection Association Expo, June 11-14 in Las Vegas. “We are pleased to award Johnson Controls the first industry UL verification for acoustic nozzle performance,” said Ghanem Zureikat, UL Global Business Development Manager, “This objective third-party validation allows companies to stand out from those with self-declared or unsubstantiated claims.” The ANSUL acoustic nozzle, in combination with the INERGEN fire suppression system, is particularly useful for suppressing fires in hazards where sound levels may affect sensitive electronic equipment. The ANSUL acoustic nozzle passed all UL testing standards to perform as acoustically intended using exclusive sound power calculation software. “It’s exciting to have the first UL verified claim in the fire protection industry,” said Derek Sandahl, Global Product Manager, Engineered Fire Suppression Systems at Johnson Controls, “The UL verification mark provides confidence to our customers in the stated acoustic performance
SecurityLink India ■ November 2018
product showcase
of our suppression system acoustic nozzle.” The ANSUL acoustic nozzle directs agent into the hazard area and reduces the sound level compared with standard nozzles. Flow calculations are used to specify the nozzle orifice size for the correct quantity and distribution of agent. This game-changing product is UL listed with INERGEN 150, 200 and 300-bar fire suppression systems and replaces the standard INERGEN nozzle without major pipe rework or hydraulic adjustments, making it an affordable solution for retrofits.
Husky X Series High-Performance NVR Milestone Delivers Best in Class NVR Performance with New X Series
M
ilestone Systems, the leading open platform company in networked video management software (VMS), announces the Milestone Husky X2 and X8 NVR hardware platform with scalable VMS. These products give the Milestone community the possibility to design small or very large business video solutions using the Milestone Husky X-series NVRs as scalable high-performance building blocks. This keeps the total cost of ownership down as less hardware is needed for a given installation compared to of-the-shelf standard servers. Less hardware means lower operational costs as fewer servers are needed. Reducing the number of servers also saves on power and cooling. The X series of NVR achieves this high performance thanks to hardware acceleration where system performance can be boosted just by having the graphics processor taking over the heavy lifting in decoding video, leaving room for the system to handle other tasks. Because the X-series are based on industry standard
hardware and software these NVRs are easy to keep hardened in a cyber security context.
High performance in compact unit
M
eeting the user demand for highly available video systems, the Husky X-series is built to be as fail safe as possible using redundant components for all relevant subsystems. The demands for high performance are met thanks to optimized hardware design. Two models will be available at launch: ●● Milestone Husky X2: Two hot-swappable hard disks and integrated PoE+ switch, supporting up to 133 cameras (720p @ 25fps, 2Mbit/s). ●● Milestone Husky X8: Eight hot-swappable hard disks and dual 10 Gbit/s network interfaces. The internal storage can be expanded with external storage arrays connected via high speed fiber channel over ethernet (FCoE) and iSCSI connections. Husky X8 supports up to 780 cameras (720p @ 25fps, 2Mbit/s) with a maximum recording rate of 1.828 Mbit/s. This high performance is reached thanks to a 4 core Intel Iris Pro GPU (Graphics Processing Unit) facilitating hardware acceleration and a server grade motherboard design. The systems are highly configurable regarding hardware and software, making it easy to meet customer needs for the Milestone community partners. Both units are preloaded with Milestone XProtect VMS and support all current versions of Milestones VMS, making it possible to use them in larger centrally managed multi-unit installations, or as stand-alone units.
Building blocks for perfect solutions
M
ilestone is currently extending the focus for integrated business video solutions. The recently announced Milestone System builder program is a part if this. This program gives the Milestone community a wide selection of appliances with XProtect and a choice of different service plans. The Milestone X-series of NVRs are designed by Milestone as dedicated high-performance building blocks in a business video infrastructure with Milestone driven service and support. Milestone Husky X2 and X8 will ship in fourth quarter of 2018.
SecurityLink India ■ November 2018
95
product showcase
Effective Lithium Battery Detection
ConteraIP™ Multi-Sensor Camera Takes Home New Product of the Year Award
A
recont Vision Costar has announced the receipt of a prestigious award for the brand new ConteraIP™multisensor panoramic dome camera series. Arecont Vision Costar’s newest multi-sensor camera was recognized as a New Product of the Year in the ‘Video Surveillance Cameras – IP’ category at GSX 2018 in Las Vegas.
Award presented to Arecont Vision Costar at GSX 2018 by Security Today
The ConteraIP multi-sensor panoramic dome camera was first publicly unveiled on April 11, 2018 at ISC West. Arecont Vision has a long history of innovation, introducing the security market’s first multi-sensor megapixel cameras in 2006. The ConteraIP multi-sensor is now the newest member of the Arecont Vision Costar family of industry leading panoramic and omnidirectional megapixel surveillance cameras. The new camera is in early customer trials and is expected to be available for all customers soon. The new, award-winning four-sensor camera is a highly advanced indoor/ outdoor 180° panoramic dome, suitable for day/ night use. ONVIF Profile S and G compliance plus advanced integration through the Arecont Vision API tool and MegaLab™ validation ensures integration not only with the cloud-enabled ConteraVMS™, but also with other leading video management and NVR systems. All Arecont Vision Costar cameras feature a three year warranty. 96
S
miths Detection now offers reliable and accurate lithium battery detection as an option on the HI-SCAN 100100V-2is and 100100T-2is scanners, with other conventional X-ray systems to follow. Existing installations can also be upgraded on site. This is the first module from a series of smart and adaptable algorithms for the automatic detection of an ever expanding list of dangerous, prohibited and contraband goods and substances. Taking the deep learning approach, Smiths Detection is collaborating with customers to build a huge library of images from which the algorithms can ‘learn’ to detect many other items. “The lithium battery development follows IATA’s recommendations regarding dangerous goods and is aimed mainly at the air cargo sector,” explained Matt Clark, VP Technology & Product Development, Smiths Detection, “It is designed to tackle the tangible threat posed by lithium batteries, which have the potential to ignite when airborne. In addition to extending this option to a full range of systems, we plan to expand these augmented detection capabilities to goods such as weapons, flammable liquids, currency and drugs.” As it is particularly suitable for break-bulk cargo screening and is already popular with air freight handlers, the HISCAN 100100 series was first in line for the lithium battery option. The combination of excellent performance and small footprint makes these scanners ideal wherever parcels with diverse shapes and sizes need to be screened. Positioned at 90° to each other, two 160 kV generators speed up the
SecurityLink India ■ November 2018
product showcase
inspection time of tightly packed items by providing both horizontal and vertical views. For further efficiency, there is a choice of conveyor heights and a maximum load of 220kg. HI-SCAN 100100 series scanners are compliant with EU regulation 2015/ 1998. The lithium battery kit uses an external evaluation computer to host the detection software, which analyses the contents and ‘frames’ any detected batteries – this data can be shown on the main system monitor or on an additional screen. Adding this detection function does not affect the speed of overall image evaluation and little or no training is required. It is available now as an option on new HI-SCAN 100100 series scanners or as an upgrade for existing machines.
gence and data protection systems. When operating together, the two systems provide a comprehensive hybrid solution for personal communications.
FULL HD Corrosion-resistant Camera with DELUX Technology For exceptional night-time vision
V SigmaCell A Real-Time Active Cellular Intelligence System
ideotec is launching NVX, an IP FULL HD super lowlight camera with high corrosion resistance. This camera incorporates the DELUX imaging and encoding technology for recording incredibly clear colour video day or night. Its extremely sensitive light sensor works with the DELUX technology to provide high colour rendering and maximum noise reduction in very low light conditions of 0.006 lux, or 0.0006 lux in black and white.
E
lbit Systems Ltd. has introduced SigmaCell, a real-time active cellular intelligence system that neutralizes cellular communications of terrorists and criminals. Based on Elbit Systems’ Signal Intelligence expertise, SigmaCell was designed to detect, identify, intercept and expose details of target cellular devices and their precise location. Covering the entire cellular spectrum (gsm, umts & lte) Sigmacell captures hundreds of devices simultaneously and can be remotely operated via a web based user interface. Either portable or stationary, SigmaCell can be effectively utilized in a variety of environments and operational scenarios such as thwarting terrorist and criminal activity, detecting and preventing Cellular usage in prisons, protecting borders and checkpoints, rescuing survivors in catastrophes and protecting sensitive facilities. Invisible and undetectable, SigmaCell can be integrated with other Elbit System’s cyber intelligence solutions such as C4I systems, and electronic warfare and location systems, to maximize customers’ benefits and enhance their intelligence capabilities. SigmaCell joins Signet™, the Company’s Cyber RF intelligence system as part of an expanding line of RF intelli-
Video images can be transmitted via network with H.264/ AVC, MPEG4, MJPEG or JPEG compression, and it’s possible to have up to 3 simultaneous and independent full HD video streams. The NVX external housing is made entirely from AISI316L stainless steel, and has a compact and lightweight design that, along with the rapid connectors, helps installation and maintenance. The wiper and the modular bracket for wall/ ceiling/ parapet mounting come standard. NVX has exceptional corrosion resistance, a wide operational temperature range and IP66/ IP67/ IP68/ IP69 protection. These features mean it is well suited to marine and industrial areas such as the food industry rail and motorway tunnels applications.
SecurityLink India ■ November 2018
97
National Roundup
Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)
“Security Link India” payable at New Delhi dated__________
* Please subscribe through admin@securitylinkindia.com
WE ARE UPDATING OUR DATABASE For free listing in Database:
For
Advertisement Contact: editor@securitylinkindia.com
* Send your detail to admin@securitylinkindia.com
Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 100
SecurityLink India ■ November 2018