SecurityLink India October E-Magazine

Page 1

October 2018

Volume III • Issue 3 • Monthly • New Delhi (102 pages including 6 for cover) RNI No. DELENG/2016/68892

` 200/-

REDEFINING SECURITY (India’s Leading Monthly Magazine on Security, Safety & Fire)

Make Network Edge Intelligent & Meet Tomorrow s Needs Today

INDIA RISK SURVEY 2018

No Compromise Wireless Emphasizing Customization with New Controller Series








Infinova Wins Recognition for Its Security Expertise Infinova was selected as a Smart City Project Recommended Brand. It received a Golden Tripod Award for its Facial Recognition and Analysis platform and VS210-P series Facial Recognition Camera.

VS Series Low Light Intelligent IP Box Camera and Minidome Camera ● ● ●

Smart face snapshot High resolution and multi-stream Starlight sensitivity

V2200 Network Video Management Software ● ● ● ● ● ●

Support a maximum of 100,000 video inputs Rich functions of video surveillance andmanagement Support real-time video browsing, search and playback Display real-time status of surveillance points and alarms Support E-maps and E-map zooming Support digital matrix functions such as tour, salvo and alarm management

World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com



From the Editor’s Desk

(102 pages including 6 for cover) Volume III • Issue 3 • October 2018

®

®

ISO 9001-2015 CERTIFIED

Dear Readers,

Editor-in-Chief Santosh Pathak

Greetings from SecurityLink India! Atop intense protracted debates by the folks for and against the subject, the Supreme Court of India upheld that the Aadhaar scheme is constitutionally valid – sans certain provisions of the Aadhaar Act. ‘Aadhaar’ has become the most talked about expression in recent years. It is described as a ‘Unique Identity,’ for various obvious reasons. UIDAI claims that it is a foolproof method of identifying a person that can help him enter into any transaction with no requirement of any other document in support. Aadhaar scheme was conceptualized in 2006, and launched in 2009 with the creation of UIDAI. It has secured the enrollment of nearly 1.1 billion people. The use of Aadhaar has spread like wildfire thanks to the robust and aggressive campaigning done by the Government and pertinent government bodies who boast of multiple benefits of Aadhaar.

Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080

Conversely, the scheme and the architecture built thereupon have been receiving scathing criticism from a section of the society. According to them, Aadhaar is a serious invasion into the right to privacy of citizens and it has the tendency to lead to a surveillance state where each individual will be kept under surveillance by creating his/ her life profile.

E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com

However, a five-member constitution bench of the Supreme Court believes that there is nothing in the Aadhaar Act that violates the right to privacy of individuals. The Court observed that all matters pertaining to an individual do not qualify as being an inherent part of right to privacy. Only those matters over which there would be a reasonable expectation of privacy are protected by Article 21. It found that there are sufficient measures in place to protect data, and that it is difficult to undertake surveillance of citizens on the basis of just Aadhaar. Albeit, the Court also demanded the Government must introduce a ‘strong data protection law’ as soon as possible,which will help clear doubts in the minds of people and an environment of trust and confidence can be established.

Circulation Sanju Singh

The 12-digit UID number will continue to be mandatory for filing IT returns, applying for PAN, government welfare schemes etc. But the Court struck down Section 57 of the Act which permits private entities to avail Aadhaar data for their purposes. Now, applying for SIM cards, opening bank accounts, admission in educational institutions including CBSE, UGC etc., will not command Aadhaar identity. This, however, raises a question as to how data already shared with telecom companies, which is humongous, will be ensured to be retrieved or deleted. It will be interesting to see how the Government responds to this ruling. A scheme like Aadhaar is surely worthwhile for a country like India where corruption and black money are rampant, but judicious execution thereof is also inevitable. The Government must program a robust and failsafe course of action to comprehensively accomplish the objectives of Aadhaar, as well as safeguard the inherent rights of people. Till next month, stay safe and happy reading! With warm regards,

10

Santosh Pathak Mob: +91 9968172237

Admin Vibha Dixit

Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)



National Roundup

october 2018

CONTENTS REPORT

INDIA RISK SURVEY 2018

44

WHITE PAPER Make Your Network Edge Intelligent and Meet Tomorrow’s Needs Today

68

NATIONAL ROUNDUP 32

Email-based Cyber Attacks Target Users in India

Emphasis on Staying Ahead of Real World Threats

34

Com-Sur Partner Training Programs Concluded

23

Enterprise IT TechDay

35

24

Videonetics Launches Smart Urban VA

CP PLUS CCTV Surveillance Certification Programs

25

Prama Hikvision Signs MoU with AP Govt.

36

FICCI Supports Public Walk Donation Campaign for Safer Roads

26

Axis at India Retail Forum

• Matrix Bags Electronics Maker Award

28

Delta at InfoComm India 2018

29

Netgear Unmanaged PoE Switch Launched in India

• CP PLUS and BIGG BOSS Join Together Once Again

• CP PLUS: UP Pride of India Award

38

• ICC IP500 Protocol Summit in Bengaluru

• Synology Launches Security Camera App

• Matrix COSEC VEGA FAX

40

PACC 2018

31

Hikvision Certified Security Associate Program

42

Genetec Partners with Inflow Technologies

20

FICCI New Age Risks 2018

21

Municipalika 2018

22

30

37

FEATURE ARTICLEs No Compromise Wireless Emphasizing Customization with New Controller Series 12

SecurityLink India ■ October 2018

84 85


National Roundup

SecurityLink India â– October 2018

13


National Roundup

october 2018

CONTENTS Application/ case studies 54

Hikvision Secures Ontario Car Dealership

62

Hanwha Secures Strandudden Gated Community

56

CP PLUS Secures Central Coalfields of CIL

63

Smith Detection for Indianapolis International Airport

57

HID Enhances Security at New Skanska Office Complex in Warsaw

64

Charleston’s Coastal Uses Vicon Cameras

58

March Solutions for Passenger Rail & Bus Fleets in Europe

65

Vanderbilt Secures Gilbert Christian Schools

59

Bosch Secure Truck Parking Creates Space for Trucks

66

NEC Biometrics Provides Security at 18th Asian Games

60

Securiton Safeguards Leopard’s Den

International updates

Product showcase

14

74-83 88-97

SecurityLink India ■ October 2018


National Roundup

SecurityLink SecurityLink India India ■■ October August2018 2018

15


Audio made smart & easy.

AXIS C1004-E Network Cabinet Speaker

AXIS C3003-E Network Horn Speaker

AXIS C2005 Network Ceiling Speaker

Axis network speakers are complete high-quality audio systems in a single unit. And because they’re based on open standards, they’re easy to integrate with other systems. Our ceiling and cabinet speakers are perfect for public address system and background music in stores and other settings, such as schools. And with our horn speaker you have a cost-efficient way to deter crime by complementing your video surveillance solution in outdoor settings.

Learn more about our network audio systems at www.axis.com/products/audio



500 MANAGING DIRECTORS OF PSAs 200 CORPORATE SECURITY & INTELLIGENCE PROFESSIONALS WILL EVOLVE A JOINT STRATEGY TO SECURE PEOPLE AND PROPERTIES

13th Annual Conference of CAPSI & APDI 15-16 November 2018

PHD House August Kranti Marg, Hauz Khas, New Delhi For Registration & Queries Please Contact: Regd. Office: 276, Sultan Sadan, West End Marg, Saidullajab, New Delhi – 110030, INDIA Mob. : 9871103074, 9582333948 Landline: +91-11-40820070, 40820071 Email: registration@capsi.in

w w w. c a p s i . i n

w w w. a p d i . i n

We are Guardsmen to the Nation. Media Partner



National Roundup

Need for Regulatory Mechanism to Access Information for Detection of Crimes through Misuse of Social Media Information & Cyber Insecurity Continue to Nag Businesses as Number 1 Risk

F

of crimes, especially those channelized through the social media, by reaching out to schools and the community at large. Cmde Sujeet Samaddar, Senior Consultant (Industry), NITI Aayog categorised the new age risks as business, economic, legal and compliance, and technology risks. He underlined the need for predictability, credibility and stability of the legal and compliance regimes in order to make businesses viable and sustainable. The biggest risk to business is to take the business-as-usual approach rather than a transformational and disruptive one. “The new digital environment and the multiplication of technological options have raised challenges and risks for which businesses should prepare themselves,” said Rahul Chaudhry, Chair,

20

SecurityLink India ■ October 2018

ICCI has recently released the seventh edition of FICCI-Pinkerton ‘India Risk Survey 2018 Report.’ Speaking on the occasion, Madhur Verma, Deputy Commissioner of Police, Delhi underscored the need for a regulatory mechanism to facilitate access of information for detection of crimes perpetrated through the misuse of social media. Mr. Verma said, “Businesses today, especially those engaged in international operations, have to contend with cybercrimes relating to transfer of money through fake e-mails, and this throws up a huge challenge for the enforcement agencies in detecting frauds.” He added that the Delhi Police had created a separate cell for dealing with cybercrimes and was trying to create awareness on the nature and the enormity

FICCI Homeland Security Committee. Rohit Karnatak, Managing Director India, APAC & EMEA - Global Screening, Pinkerton said, “In today’s time, policy makers and business leaders can truly fulfil their role by timely anticipating risks. Pinkerton utilises a data driven comprehensive approach to corporate risk management, aiming to use tools like artificial intelligence to anticipate risks, their probability and their potential impact to businesses.” According to Venkat Ramana, CoFounder & Director, Valuepitch E Technologies, “The crime rate in India can be lowered with the help of technology and training. Discovering previous antecedents along with real time situation monitoring without invading privacy is the challenge that needs to be addressed.”


National Roundup

Municipalika 2018 Three-in-one mega event on future cities with CAPEx and IIPM held in Mumbai he 15th MunicipaIndian businesses in lika Exhibition & the infrastructure and Conference in Mumsmart cities sector, bai has expanded as a 28 leading Canadian 360 degree event on urban infrastructure, city development, with Internet of Things and the addition of Conartificial intelligence struction, Architecture companies visited the & Planning Exhibition event. The mission (CAPEx) and India has been organised by International Property the Canadian Trade (L to R) Dignitaries at the inaugural ceremony of Municipalika 2018: G Ibrahim, Executive Director, Mart (IIPM) – the first Commissioner SerGood Governance India Foundation; V Suresh, President, Good Governance India Foundation & Former CMD, HUDCO; Divya Kush, President, Indian Institute of Architects; H.E. Nadir Patel, of its kind B2B forum vice (TCS) of Global High Commissioner of Canada in India; Mahendra Jain, IAS, Additional Chief Secretary, Urban Development Department, Government of Karnataka; & Sanjiv Agarwal, Founder Chairman, Good for real estate. Affairs Canada, in Governance India Foundation and Editor & Publisher, Urban News Digest The three-in-one collaboration with the international conferGovernment of Ontarence and exhibition at the Bombay missioners, urban local bodies, CEOs io, the Government of British ColumExhibition Centre was organised under of smart cities and parastatals, along bia, the Government of Alberta, Air the banner of ‘Future Cities’ – an ex- with technology providers, profession- Canada and the Indo-Canadian Busiposition of technologies, products and als and all urban stakeholders. Faculty ness Chamber. services for urban development. Nadir Patel said, “Canada is globand students of architecture, engineerMunicipalika 2018 was inaugurat- ing, technology and management insti- ally recognised for its excellence in ed by Mahendra Jain, IAS, Additional tutions also attended to get exposure on urban infrastructure and smart citChief Secretary, Urban Development the latest trends. ies which includes high-level project th Municipalika 2018 providDepartment, Government of Karnamanagement, specialised technical The 15 taka, and Divya Kush, President, In- ed a mega-networking forum for gov- skills and for developing environmendian Institute of Architects. H.E. Nadir ernments, experts, entrepreneurs and tally friendly technological solutions Patel, High Commissioner for Canada service providers to collectively find combined with innovative design. This to India, was also present at Municipa- solutions to urban challenges. Munici- is a great opportunity for Canadian lika’s inaugural session, sharing Cana- palika provides a platform to evolve, companies to learn about the exciting da’s experience in building world-class evaluate and share policies, strategies, developments and plans for transforcities and underscoring Canada’s com- cutting-edge technologies and innova- mation in India’s urban infrastructure tions towards smart and sustainable liv- and smart cities. I look forward to furmitment to India. The event had participation of over ing in cities. ther collaboration to support India in Canada, the Partner Country, achieving its smart cities objectives.” 200 delegates in the conference segment, from over 300 Indian cities and brought an array of technological best There was a special session on fire towns and abroad, and professional vis- practices for possible use in India’s and public safety, which had the paritors in the exhibition segment includ- city development missions. To ex- ticipation of chief fire officers, fire ening ministers, mayors, municipal com- plore collaboration opportunities with gineers and professional institutions

T

SecurityLink India ■ October 2018

21


National Roundup

deliberating about the fire regulations for all types of buildings and their enforcement in-line with the National Building Code of India. The three-day long conference also included sessions on Resilient and Secure Cities, Healthy Cities, Green Cit-

ies, Connected Cities, Digital Cities and on Integrated Cities for self-contained cities. The Decision Maker’s Conclave, a special buyer-seller meet, provided a great opportunity for solution providers to meet architects, builders, green

building consultants, EPC project heads and material procurement heads from large corporations. The event was organised with JLL as the Knowledge Partner. JLL is cocurating the sessions with Good Governance India Foundation.

Organizations Must Emphasize on Visibility to Stay Ahead of Real World Threats

S

kybox Security recently participated in the Gartner Security & Risk Management Summit 2018 in Mumbai. Starting with the keynote speaker and during the technical sessions, it was clear that the common theme throughout the Summit was the need to understand the risks that are important, dangerous and real to organizations. Rather than looking at the overwhelming and ever-increasing number of threats, the focus should be on identifying those that pose a real risk to the business and knowing the right patching and preventive controls to mitigate them. To do this there is a need to create visibility into assets and eco-system, or what is now called as ‘your attack surface.’ In order to see the attack surface, one has to understand the many layers that create it. To some, the attack surface has only been thought of in terms of vulnerabilities. But there are other factors that put an organization at risk, and they must be analyzed in connection with other attack vectors, the context of a unique network and the potential impact if they are exploited. To holistically visualize and understand the attack surface and provide context to security risks, a solution needs to consider: ●● Topology: By comprehensively mapping all systems, devices and network segments as well as the paths between them, the interdependencies of the network affecting risk exposures becomes more apparent. Effective solutions need to incorporate servers, endpoints, networks (including clouds), networking devices and security devices (physical and virtual) into a visual model. ●● Indicators of exposure (IoEs): IoEs highlight a system, device or network that is exposed to a potential attack. It helps secure the organization before an attack occurs. IoEs include software vulnerabilities, mis-configurations and missing security controls, overly permissive rules  It’s time to harness the power of analytics, modelling and violations of security policies and compliance rules. and simulation to improve attack surface visualization. By ‘mapping’ IoEs to an organizaWith better visibility, security teams are better prepared tion’s topology, security teams can quickly to fend off attacks, with the availability of comprehensive and intuitively extract actionable concluintelligence needed to build a mature security program. A sophisticated attack surface visualization solution gives sions from the data. Only Skybox® HoriCISOs and security leaders the ability to see all security zon, an attack surface visualization tool exposures at once – zoom in on problem areas and identhat integrates with the Skybox® Security tify what’s causing the problem – all in seconds  Suite, is capable of combining an organi– Rahul Arora zation’s entire topology with all their IoEs Regional Director, India & SAARC, Skybox Security in an interactive, visual model. 22

SecurityLink India ■ October 2018


National Roundup

Enterprise IT TechDay An Initiative of APC by Schneider Electric and Enterprise IT World to Engage Leading Business Minds and Stakeholders Engaging CXOs in Ahmedabad on Data Center Optimization

E

nterprise IT World, the premium CIO magazine has recently organized ‘Enterprise IT TechDay,’ powered by APC by Schneider Electric at Hotel Hyatt, Ahmedabad. The event was an initiative to engage leading business minds and stakeholders with a knowledge forum on datacenter, micro datacenter and edge computing. In lieu of the growing customer data for Indian businesses deploying third platform technologies and connected devices, this was a series of events focusing mainly on absolute knowledge forum for businesses to understand the need for datacenter and micro datacenter optimization of an organization. Enterprise IT World TechDay took place in order to accommodate the future technologies and solutions including Internet of Things, Edge Computing, Artificial Intelligence and many more. ‘Infrastructure Optimization to Accommodate New Age Workloads’ made up as the main theme for the event. The knowledge forums helped the audiences understand the process to churn valuable customer data to get insights in order to help better business decision making. The event in its initial phase is supposed to take place in a number of cities as well. The TechDay events engaged the audiences in panel discussions and open forums to learn and let learn about future trends in the given technologies. The topics covered during the event

Dignitaries during Panel Discussion

included – Changing workloads and applications on the edge, the current state of DC infrastructure in Indian business landscape, the need for micro-datacentre at the organization’s edge and the approach of IT Heads and CIOs on choosing the right approach to DC optimization. “With a surge in digitization, our world is increasingly opening up to more robust efficiency solutions across data centers. Moreover, the proliferation of data and its criticality to businesses have given rise to edge computing solutions and other related technology requirements – the CIO has come centerstage in this new scenario where technology is directly impacting the bottom line. Schneider Electric is happy to be part of a platform which is helping facilitate a dialogue on these scenarios,” quoted Venkatraman Swaminathan, Vice President, IT Division, SecurityLink India ■ October 2018

Schneider Electric India. The event witnessed the presence of a series of speakers from reputed organizations including Deloitte, Sintex, Sonata Finance and many more, who came forward to enlighten the audiences on topics including the current scenario of IT organisations, the factors which drive these changes, the data centre optimization scenario. The event also concluded on various verticals discussing the areas where businesses today require real-time decision making, DC related queries which may hamper CIOs in near future. The events were carried out to provide an ideal platform for all CIOs, CTOs, IT Heads, IT Managers, and/ or IT decision makers who are responsible for their internal IT consumption to come and engage with like-minded peers and discuss their challenges and gain a better technology perspective. 23


National Roundup

Launches

AI & Deep Learning Powered

Smart Urban Video Analytics V

ideonetics has recently launched AI & Deep Learning powered ‘Smart Urban Video Analytics’ (SUVA) that commits to deliver actionable intelligence, and provides security insights to address real-world problems such as graffiti and vandalism, garbage and litter detection, crowd formation and behavioural analysis, traffic management and road safety, to name a few. Powered by the first Indian artificial intelligence and deep learning platform, SUVA is trained with real-time video data of over four years, thereby ensuring highest level of precision in detecting anomalies in tough Indian situations. Expressing on the launch, Dr. Tinku Acharya, Fellow IEEE, Founder & MD, Videonetics said, “I am proud that Videonetics is the World’s first company to launch AI & Deep Learning enabled visual computing platform. We are committed to promote culture of innovation in India and to introduce such advanced and smart technologies that can address challenging environments for highly populated countries like India. “Smart Urban Video Analytics is the pioneering solution which will certainly act as a true decision support system for local authorities, municipalities, traffic 24

public property without consent from the property owner. These can be in the form of writing, drawing or scratching onto surfaces using different implements such as paint, spray, markers, stickers, and so on. SUVA can immediately detect property damage within the monitored area and alert local authority to prevent such violations, thereby saving the community valuable funds and preserving assets from graffiti and vandalism. planners and law enforcement agencies. SUVA has multi-faceted applications which will certainly build traffic management more robust, increase road safety, reduce environmental hazards, provide correct information to law enforcement agencies, preventing property from any vandalism, swift suspect search, eventually to make Indian cities safe and smarter. Our intellectual property and trailblazing initiatives have won us several accolades, patents and recognitions from renowned platforms.” Smart Urban Video Analytics suite includes:

Graffiti & vandalism detection

G

raffiti and vandalism are often known as defacing on private and

SecurityLink India ■ October 2018

Garbage management

I

n highly populated countries, urban waste is a big problem which leads to hazards such as environmental degradation, water pollution, soil pollution and air pollution. Garbage management with integrating AI based video analytics detects garbage overflow, garbage bin cleaned, waste collection pattern, garbage vehicle classification, tracking of garbage vehicle movement etc. It assists local civic bodies with alerts to effectively manage waste and keep the city clean.

Debris & litter detection

B

oth debris and litter are highly pervasive and visible form of pol-


National Roundup

lution that have harmful impacts on wildlife, human health and overall environment. SUVA helps in detecting debris and litter thrown in the monitored area and triggers an immediate alarm to the local bodies/ municipalities for taking action.

Crowd management

T

he crowd management solution detects crowd formation, people count and their movement, and analyses

crowd flow. In addition, it detects sudden random movement of crowds along with providing overcrowd alert against crowd count crossing a defined threshold value.

Traffic management

S

UVA also equips law enforcement agencies by providing ultra-powerful traffic management solution comprising no parking detection, wrong-way vehicle detection, polluting vehicle de-

tection, no helmet detection, triple riding detection etc. In addition to these solutions, SUVA application can also help in detecting loitering, person collapsing and object classification. It also supports both server-based and edge analytics architecture, hence it can be successfully applied in diverse challenging conditions to maintain infrastructure, curb pollution, and secure the city.

Prama Hikvision India Signs MoU with Andhra Pradesh Government Pledges to Invest Rs.500 crore

P

rama Hikvision India has announced plans to invest Rs.500 crore in a manufacturing facility for electronic security and surveillance products in Andhra Pradesh. The company signed a Memorandum of Understanding (MoU) with the State Government of Andhra Pradesh on 27 August 2018. The MoU was signed between the Andhra Pradesh Chief Minister N. Chandrababu Naidu and Ashish P. Dhakan, MD & CEO, Prama Hikvision India at the Round Table Session at Taj Mahal Palace Hotel, Mumbai. As per the MoU Prama Hikvision will invest Rs.500 crore in Andhra Pradesh to set up a manufacturing plant. “We have signed an MoU with Andhra Pradesh Government to set up a manufacturing facility in Andhra Pradesh with an investment of Rs.500 crore. We are grateful to Andhra Pradesh Government and N. Chandrababu Naidu for extending their support.

Andhra Pradesh Chief Minister N. Chandrababu Naidu (C) and Ashish P. Dhakan, MD & CEO, Prama Hikvision India (2nd from Left) with other Dignitaries

With this new manufacturing facility we will be able to expand our manufacturing capacity in India,” said Mr. Dhakan. The company is looking to treble its capacity to make cameras by expanding its manufacturing footprint in India to meet a steady increase in demand for cameras and digital video recorders. SecurityLink India ■ October 2018

The company has plans to manufacture the latest electronic equipment tuned to the capacity of approximately 15-20 lakh video surveillance cameras and recording back-end devices per month in the State of Andhra Pradesh. The project is expected to generate 1,000 direct and/ or indirect jobs, and more in auxiliary industries. 25


National Roundup

at India Retail Forum Showcasing Latest Range of Retail solutions Demonstrated the implementation benefits of AXIS Store Reporter, AXIS People Counter, AXIS Queue Monitor, AXIS Demographic Identifier, AXIS Occupancy Estimator

A

xis Communications is driving the shift from analog camera to digital surveillance by tapping into the huge potential of the burgeoning Indian retail segment. As part of this commitment, Axis demonstrated their cutting-edge retail solutions at this year’s India Retail Forum held during 5-6 September 2018 at Mumbai. Attended by the who’s who of the retail industry, the India Retail Forum focuses on bringing the retail real estate leaders for a knowledge exchange on the importance of building and sustaining for developers and retailers, and the emerging trends and opportunities in the real estate sector. According to PwC’s 19th Annual Global CEO Survey for retail sector, CEOs stated data and analytics technologies as their key area of focus. According to them, the new operating model will be customer centric, with data analytics at the heart of the decision-making process, enabled by appropriate technology and tools. Excited on participating for the first time in the prestigious IRF, Sudhindra Holla, Sales Director, India and SAARC, Axis Communications explained, “The event also provided us a platform to connect with the end users. It was interesting to note the key challenges that they were facing as brick and mortar companies. They pointed out that while online businesses had the benefit of analytics for customer insights, they instead have always had to seek for additional investment. 26

These leading retailers were elated to know that Axis Communications provided much more than surveillance and were the only company with inbuilt features in their cameras adding analytics, customer footfalls, and bill value and peak hour statistics along with demographics and vast range of other solutions additionally.” Axis retail offerings help retail players stay ahead of their competition and enhance their overall consumer experience. The integrated smart retail solutions displayed at IRF helps provide business intelligence to the retailers and optimize the store performance by making scheduled announcements. ●● Axis Store Reporter: Real-time access to data, triggers a multitude of reports and statistics. ●● Axis People Counter: Gain knowledge of customer footfall. ●● Axis Queue Monitor: Efficiently monitor and measure in-store queue lengths. ●● Axis Demographic Identifier: Identify the demographics (age and gender) of customers in the store. ●● Axis Occupancy Estimator: Estimate the occupancy in the store. Established in 2004, India Retail Forum (IRF) is India’s premium annual event that brings together the retail brands to understand and learn the current and predicted trends in retail ecosystem.

SecurityLink India ■ October 2018


With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.

Soft Facility Management

Hard Facility Management

Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.

Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.

Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.

www.sisindia.com A 5000 crore Indian multinational company


National Roundup

Showcases Latest State-of-the-Art Display Solutions and Vivitek Line of Projectors at InfoComm India 2018

D

elta, a global provider in power and thermal management technologies and a pioneer in display solutions, showcased its comprehensive portfolio of displays solutions for varied applications at the recently held InfoComm India 2018 in Mumbai. Delta’s showcases included advanced 4K Laser DLP® video wall, fully supporting the 4K resolution, the 3rd generation distributed vision control system (DVCS®), the Fine Pitch LED display and its Xtra narrow bezel LCD video wall with as low as 1.8mm bezel to bezel gap. One of the major feature of Delta’s showcases at the show was 216sqft 4K DLP® Laser video wall. The video wall was displayed paired with Delta’s DVCS®. Which is a high-performance IP-based control system designed to fulfill the sophisticated needs of control room applications to ensure a perfect continuity of images across multiple cubes. DVCS® Gen. 3 is capable of handling 4K resolution input and output with 60 frames per second (fps) performance. This platform, which can manage multiple video sources on a single display enlarges a single video signal to multiple displays or enable centralized control of several video walls, creates an unparalleled reliable, flexible and scalable display solution capable of fulfilling critical applications such as utilities, surveillance, disaster control and traffic supervision. The state-of-the-art Delta 4K Laser video wall solution features an ex28

tra slim form factor, 560mm depth, an unmatched 4K (3840x2160) resolution, a high brightness of 4,000 lumens and a brightness uniformity greater than 95 percent. Its built-in IntelliSense function monitors the various parameters of the system and automatically performs realtime adjustments for 24x7 operations. The Laser video wall is leading in the industry to offer a certified IP6X protection rating and an optical sealed engine for up to 100,000 hours of worry-free operation. Delta’s latest Xtra-narrow bezel LCD video wall offers full HD resolution. The LCDs possess an exceptional brightness of 700 nits (55-inch cubes) and a minimum 1.8mm combined bezel width. With Full HD display, these LEDLCD video walls allow a seamless connection between each display, creating a powerful, high-impact visual experience for viewers. The indoor Fine Pitch LED disSecurityLink India ■ October 2018

plays of 1.5mm pixel pitch showcased in a larger-than-life size, takes Delta’s display solutions to the next level. With high contrast, high refresh rate, fast response time and a high motion rate, the Fine Pitch LED offers a true-to-life display. With advantages including low power consumption, longevity, seamless integration, compactness, energy efficiency and ultra-high resolution, this LED display is suitable for large conference centers, cinemas, transportation and retail applications. State-of-the-art projectors from Vivitek, a brand of Delta, were a part of the showcase at the show offering highly advanced and versatile display technologies such as edge-blending imaging for large venue applications, ultra-short throw projection for corporate & education applications and 4K interactive flat panel display (NovoTouch) with its Novo Collaborative series for complete collaborative solution.


National Roundup

GS108LP Unmanaged PoE Switch With 8 Gigabit Port Launched in India ETGEAR®, Inc., a leading provider of networking equipment for homes and small to medium-sized businesses (SMBs) has introduced GS108LP Gigabit Ethernet switch – housing 8 Gigabit copper ports in a desktop metal case which is also wall-mountable.

N

Small business has been leveraging switches for some time, but now home offices and even smart homes need to be using them as more and more devices are connected with things such as VoIP phones, IP security cameras, video-over-IP endpoints, sensors, LED lighting, secure access door locks, and other IoT devices. A lot of these new devices either require PoE or users prefer PoE to cut down on wiring. Some of the new generations of devices (Wave 2 802.11ac wireless access points and pan-tilt-zoom HD surveillance cameras) require PoE+ power. But what is most unique about these plug-and-play switches is that they have a built-in intuitive power selector and support optional interchangeable external power supplies that allow the user to easily increase PoE budget at any time to provide the devices with the power they need. With this industry-unique feature in an unmanaged switch, he can start with a lower PoE budget and then cost-effectively increase it at any time, to grow along with the business needs. If the business has to power more medium to high-power devices in the future, it can easily be upgraded just by changing the external power supply. If the users

already have multiple power-hungry devices, they can go directly to the high-power version switch for the best PoE budget. NETGEAR has designed these switches to adapt as the needs change. “GS108LP is a true Gigabit PoE switch which offers flexible mounting option. All 8 port PoE+ with compact form factor and noiseless with a total power budget of 60W, are ideally suitable for powering cameras, VoIP phones and access points etc. This new product is a result of one such outreach program to bring out multiple options of PoE switches to surveillance partners,” quoted Marthesh Nagendra, Country Manager – India & SAARC, NETGEAR.

Key features and benefits include

●● 8 PoE Gigabit Ethernet ports provide up to 30W per port to any power-hungry device. ●● Flexible PoE budget for GS108LP makes it easy to increase or decrease with interchangeable external power supply units. ●● 8 Gbps (8-port model) non-blocking switching architecture offers maximum throughput at wire speed without congestion for all the connectivity your devices need. ●● Plug-and-play, automatic connectivity to router or modem eliminates the need for an IT expert or complicated user manual. ●● Auto-negotiation between the switch and end devices means they automatically connect at the highest common speed.

SecurityLink India ■ October 2018

29


National Roundup

Launches Bestowed with the Uttar Pradesh Surveillance Pride of India Award Station 8.2

C

P PLUS has recently received the illustrious Uttar Pradesh Pride of India Award hosted by CMO ASIA & Global Real Estate Congress. The award, which seeks to identify and celebrate outstanding brand building and marketing by organisations, individuals and teams, was conferred amidst industry leaders and the media. “It is an honour to receive this award. CP PLUS has had an enriching and wonderful journey of growth so far. We’ve grown manifold as a brand, of course, with our fair share of challenges and learning. But overall, it has always been a progressive road. Acknowledgements such as these uplift us and encourage us to do even better,” said Aditya Khemka, MD, CP PLUS.

CP PLUS Represenative Receiving the Award

Winners were evaluated not just on financial standing, but also based on consumer preferences. The initiative aims to recognize brands and marketers, which have achieved extraordinary success through innovative and effective marketing practices in the region of Uttar Pradesh, and to foster marketing awareness in the professional community and inspire aspirants to achieve marketing excellence. The award also focused on educating and disseminating the importance of branding in Uttar Pradesh. ABP News was the official media partner for the event. CP PLUS is a leading surveillance and security brand in India. CP PLUS range of solutions and products are monitoring millions of locations across the globe in diverse geographies, from highly sensitive defense locations, government buildings, vital infrastructures, transportation, hotels, hospitals, educational institutions to homes, with a satisfied customer base. 30

SecurityLink India ■ October 2018

LiveCam Security Camera App in India

S

ynology Inc. has launched ‘Surveillance Station 8.2,’ a brand new LiveCam Security Camera App that instantly turns a phone into an IP camera. The iOS version is available at Apple Store and the Android version will be released this October. The revamped DS offers higher performance, along with the addition of IP speakers to the hardware support list. The next generation of application center offers greater flexibility for application management. “With the combination of LiveCam on iOS and the brand new DS cam, Surveillance Station has entered a mobile era of transforming the phone into a security camera and having its video recordings accessible by DS cam,” said Ivan Chang, Product Manager at Synology Inc., “Features like smart time lapse, dual authentication and support for IP speakers make Surveillance Station the project-ready solution.” Surveillance Station 8.2 includes the following new features: ●● Turn phones into cameras with LiveCam: The mobile device can now be an IP camera. Once LiveCam is installed on mobile phones, it can be added to Surveillance Station as an IP camera that can record as users go.


National Roundup

●● Application Center that knows just what is needed: New style of add-ons called Application Center provides up to 26 applications and utilities. Use the category filter or keyword search to quickly find the application that you are looking for and customize your Surveillance Station. ●● Revamped DS cam with extraordinary performance and compatibility: The next generation of DS cam not only provides a more streamlined viewing experience but also multitimeline capabilities for intuitively searching through video footage. In addition, with off-line license authentication in place, you can now easily deploy the system at a faster pace. ●● Now support IP speakers: Surveillance Station 8.2 can transmit audio or arrange scheduled broadcasts on integrated IP speakers. In multi-speaker deployment, either single or group broadcast is also available. ●● Oversee sizable project with time lapse: Time lapse shortens lengthy videos down to minutes or even seconds. This application is particularly useful for showing a large-scale project from start to completion. ●● Safeguard your data with dual authorization: A safer and more flexible privilege management measure, Dual Authorization restricts sensitive functions such as managing cameras or accessing video records to only be performed with authorization from another party. With extra protection in place, this prevents the leaking of sensitive information. ●● Stream to the world with live broadcast: Share your excitement with the world as you live stream to YouTube with no settings required. Simply select the camera and enter the path information provided on YouTube. Your live stream broadcast is ready for action.

Hikvision Certified Security Associate (HCSA) Program Gets overwhelming response in Bengaluru

H

ikvision has recently conducted the three day Hikvision Certified Security Associates (HCSA) Program in Bangalore which got overwhelming response from the young security professional community who came all across from Bengaluru, Hubli and Hyderabad cities to take part in the event. The successful batch of Hikvision Certified Security Associates (HCSA) Program participants received certificates along with enriching technology and product training experience. The HCSA training program will be conducted regularly in coming months.

The three day program included training sessions on Optics basics, Turbo HD analog solution, PTZ configuration, Network basics, IP camera, NVR, Fish eye camera, iVMS 4200 and smart functions and applications. The idea behind HCSA is to give hands on training and demonstration as a part of the training program. A dedicated online examination was also conducted after the training sessions and HCSA certificates were given to the successful participants. “Hikvision has set the industry standard by offering professional video surveillance certification to validate video expertise under Hikvision Certified Security Associate (HCSA) program in India. Hikvision certification program is specially designed for the Indian customers and partners. Besides, Hikvision provides meaningful endorsement to those who pass and become Hikvision certified professionals,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. The Hikvision Certified Security Associate (HCSA) level certification focuses on training participants in essential configurations, operations & maintenance of Hikvision video surveillance products and its features. It is designed for technical engineers who have worked in the security industry for several years and have already gained some security basics. The certification program is open to anyone looking at to gain expertise in video surveillance and total security solution. The trainee should have at least one year of work experience in the security industry and be familiar with security basics. SecurityLink India ■ October 2018

31


National Roundup

Email-based Cyber Attacks Continue to Target Users in India Cybercriminals use social engineering techniques to trick users into providing login credentials, initiating fraudulent transactions or unknowingly install ransomware

F

trols in place to detect and prevent these e-mail attacks.” To help ensure email security, Fortinet’s cybersecurity experts advised users to: 1. Filter spam: Because most email scams begin with unsolicited commercial email, one should take measures to prevent spam from getting into the mailbox. Most email applications and web mail services include spam-filtering features, or ways in which email applications can be configured to filter spam. 2. Regard unsolicited email with suspicion: Don’t automatically trust any email sent by an unknown individual or organization. Never open an attachment to unsolicited email. Most importantly, never click on an unknown link in an email. Cleverly crafted links can take users to forged web sites set up to trick them into divulging private information, or downloading viruses, spyware and other malicious software. 3. Treat email attachments with caution: Email attachments are commonly used by online scammers to sneak a virus onto computers. These viruses can help the scammer steal important information from the computer, compromising the computer so

32

SecurityLink India ■ October 2018

ortinet reminds corporate users in India that email remains one of the most vulnerable vectors targeted by cybercriminals. The cyberattacks are likely to happen to organizations that have yet to implement strong email security controls and best practices. According to the Verizon Data Breach Investigations report, twothirds of installed malware are actually delivered by email. To gain access into an organization’s network, cybercriminals often use phishing or social engineering techniques in emails, thus counting on human error, or a lack of cybersecurity know-how to trick users into providing login credentials or initiating fraudulent transactions, as well as to unknowingly install malware, ransomware and other malicious payloads. “Due to the ubiquity of email, it continues to be a common attack vector for cybercriminals seeking to steal login credentials, money and sensitive data,” said Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet, “The top emailbased cyberattacks carried out by cybercriminals today include phishing or spear-phishing, man-in-themiddle attacks and zero-day vulnerabilities. Companies must therefore ensure they have strong security con-

that it is open to further attack and abuse, and convert a computer into a ‘bot’ for use in denial-of-service attacks and other online crimes. As noted above, a familiar ‘from’ address is no guarantee of safety because some viruses spread by first searching for all email addresses on an infected computer and then sending itself to these addresses. 4. Install antivirus software: Users should install an antivirus program that has an automatic update feature. This will help ensure users to always have the most up-to-date protection possible against viruses. 5. Install a personal Firewall and keep it up to date: A firewall will not prevent scam email from making its way into users’ mailbox. However, it may help protect users should they inadvertently open a virus-bearing attachment or otherwise introduce malware to their computer. The firewall, among other things, will help prevent outbound traffic from a user’s computer to the attacker. When a personal firewall detects suspicious outbound communications from a user’s computer, it could be a sign that the user has inadvertently installed malicious programs on his computer.


National Roundup

SecurityLink India â– October 2018

33


National Roundup

Com-Sur Partner Training Programs Concluded

C

OM-SUR has conand technologies, and cluded its latest other modern equipment to police departPartner Training Programs in New Delhi, ments. BNB Security Bengaluru and Mumbai. and Automation Solutions offers consultancy, “Over the past three design, supply, installayears we took part in tion, commissioning and over 100 security shows service support for se– both nationally and curity and fire systems, internationally – which automation systems, AV has given us the opportunity to meet some solutions etc. across vargreat like-minded comious verticals like hospiJainish Shah, VP COM-SUR, with the team from Cyberace panies, for whom offertality, retail, commercial ing practical and outestablishments, banks, of-the box solutions is of paramount They want to be a part of a Made in government departments and so on. importance. The three companies we India story that has plugged the three Cyberace is involved in designing and trained in this phase were Kwick Soft missing pieces of CCTV surveillance building turnkey projects in IT, ELV from New Delhi/ Chennai, BNB Se- namely auditing CCTV video footage systems and audio-video integration, curity and Automation Solutions Pvt. as a SoP, smart backup, and stand- offering several products and services Ltd. from Bengaluru/ other southern ardized intelligent reporting,” said including network services, facilities states of India, and Cyberace from Gautam Goradia, CEO & MD, COM- management and cloud services. Mumbai with offices in New Delhi, SUR. The sessions were conducted at Kwick Soft specializes in the sup- their respective offices for over three Pune and other Indian cities, as well as in Singapore. These three organisa- ply of equipment and kits for foren- days in terms of learning the philosotions strongly believe in the philoso- sic labs, specialized and high-tech phy, complete hands-on training, new phy of COM-SUR and what it stands surveillance systems (CCTV), crime marketing techniques, communicafor. They are excited with the oppor- scene investigation related products tion skills and relationship building. tunity to solve their cusEach team received the tomers’ pain points, and coveted ‘COM-SUR will offer COM-SUR Certified Channel Partner’ certificate at the not only within India, end of the program. but also globally. They “BNB is proud to see COM-SUR not only partner with COM-SUR. as an opportunity for We are happy that this revenue building, but partnership will enalso as one that will help able us to take COMthem be a part of making a difference in the SUR’s offerings to our Jainish Shah, VP COM-SUR, with the team from Kwik Soft. industry. surveillance esteemed customers. 34

SecurityLink India ■ October 2018


National Roundup

COM-SUR’s CCTV video footage auditing solution has created a niche in the industry, and we believe that every user of CCTV should incorporate this wonderful product as a de-facto part of their video surveillance initiative. We thank Mr. Goradia and his team for carrying out the training program, and look forward to a long partnership with COM-SUR for mutual benefit,” said Anand V Bhat, Managing Director & CEO, BNB Security and Automation Solutions Pvt. Ltd. Shammer Shah of Kwick Soft, and. Pushp Chauhan of Cyberace offered the similar views.

Jainish Shah, VP COM-SUR, with the team from BNB in Bangalore

CP PLUS Commences its CCTV Surveillance Certification Programs C

P PLUS has launched a special initiative to train and certify its partners and system integrators. These certification programs are focused on training and educating surveillance system engineers (SSE) on installation, operation and maintenance of CP PLUS products including designing intelligent security solutions and providing lifetime sustenance for complete customer satisfaction. “We are in the golden period of the electronics industry where surveillance has become an integral part of infrastructural development. With an aim to deliver customized, robust and scalable solutions across verticals and deliver value, CP PLUS has launched the Mission Tech Certified Training Program which is focused on bridging the knowledge gap of our customer touch points i.e., our partners and system integrators. These training programs entail both concept fundamentals and hands-on training for optimum learning,” said Aditya Khemka, MD, CP PLUS. This training program aims to impart globally relevant surveillance solutions training to the system integrators and partners, upgrade their skills for effective and efficient solution designing, enable them to deliver customized, robust and scalable solutions across verticals, and deliver value by designing and implementing the most relevant solution and thereby ensuring RoI. The program offers three levels of certification – CP PLUS Certified Surveillance Engineer (CSE), CP PLUS Certified Surveillance Professional (CSP), and CP PLUS Certified Surveillance Designer (CSD). The courseware is based on the Indian environment so that system integrators can deliver robust and scalable security solutions for the Indian market. The CP PLUS certification program is open to all individuals in the video surveillance industry with a minimum 6 months experience in the business. CP PLUS commenced its training sessions on 25th September and has successfully completed two batches of trainings so far certifying almost 50 partners. SecurityLink India ■ October 2018

35


National Roundup

Pledges Support to Public Walk Donation Campaign for Safer Roads

S

afety on Indian roads has taken on a new meaning with the ‘longest and largest walkathon’ from Kanyakumari to Kashmir by Subramanian ‘Subu’ Narayanan, Member Club D2S, the lead walker, who recently reached Delhi-NCR. Speaking at an interactive session on ‘1 Crore Steps for Safer Roads’ under the National Road Safety Campaign organised by FICCI in association with Club D2S, SIAM, Mr. Narayanan said, “When we make the roads safer, and when more people can walk, use of private vehicles will come down for short distances and roads will become even safer. I am on a mission to raise public awareness about the difficulty of pedestrians on Indian roads, which can lead to urgent action for creating a robust and systematic approach to road safety. I appeal to all to join me to support this cause.”

The unique national campaign of 1 Crore Steps for Safer Roads – ‘Public Walk Donation’ got a new lease from two mega walkathons – one on 22 September from Tau Devi Lal Stadium in Gurgaon and the second on 24 September 2018 from Sector 11, Dwarka, where thousands of participants from schools, colleges, corporates and other institutes were expected to join the walk. The campaign is supported by many of India’s apex organisations including FICCI. As a measure of its demonstration of support to the cause of road safety, FICCI employees walked 1.8 kms around the vicinity of Federation House, a distance covered in 23 minutes. Ramashankar Pandey, President, Central Working Committee of the NGO, Drive Smart, Drive Safe, and Managing Director, HELLA India Lighting Ltd.

said, “The latest data on road accidents in India is very alarming. With one death every four minutes and an accident every minute, the situation is critical and cannot be left unattended for long. Hence our team member, ‘Subu’ is taking the challenge to appeal to all Indians to join this national movement and donate their walk on www.onecroresteps.com to give this cause the highest priority.” Dilip Chenoy, Secretary General, FICCI said, “Ensuring road safety is a collective effort and the message here is that if each one takes a step, it can motivate others towards the collective goal of road safety. FICCI is supporting the walkathon from Kanyakumari to Kashmir which is aimed at creating, increasing and infusing pedestrian safety awareness, and we will take the message across our members for their support.”

FICCI employees along with Dilip Chenoy, Secretary General, FICCI and Subramanian ‘Subu’ Narayanan, Member, Club D2S participated in walkathon on 1 Crore Steps for Road Safety under National Road Safety Campaign

36

SecurityLink India ■ October 2018


National Roundup

Matrix Awarded as Best Intelligent Security Solutions Provider by Electronics Maker M

atrix has bagged the Electronics Maker Award for Best Intelligent Security Solutions Provider for the fourth consecutive time. Electronics Maker, one of the leading magazines in the electronics industry, has instituted this award to recognize contribution and performance of companies operating in the security field. The award was selected across various categories based on internal data, market analysis and features learning. Finally, Electronics Maker top editorial and advisory panel chose the winners.

Naveen Kumar, Sales Manager- Security (IPVS) (L), Matrix Comsec receiving the award

On winning this prestigious award, Ganesh Jivani, CEO of Matrix said “Matrix is focused on designing, manufacturing and marketing cutting-edge security and telecom solutions for modern organizations. We export these products to more than 50 countries – most of them to the first-world technologically advanced nations. R&D is one of the core drivers of Matrix business. With 350+ R&D engineers, world-class infrastructure and latest equipment, Matrix invests heavily in R&D. This award is a validation to Matrix’s innovation capabilities. I thank all our customers and channel partners for their trust in Matrix and congratulate the entire Matrix team for this achievement. We thank Electronics Maker for conferring this award on Matrix. Such recognition would encourage us to work harder towards building world-class, cutting-edge technologies and products.”

CP PLUS and BIGG BOSS Rock Together Once Again C

P PLUS has partnered with BIGG BOSS once again for Season 12. This is the third time in a row that CP PLUS has collaborated with the widely popular entertainment show. Although its association with Colours TV has been a long one where it has tied up with quite a few shows, its collaboration with the BIGG BOSS banner has been, by far, the most prominent.

“We are excited to be associated with BIGG BOSS this year again for Season 12. Given the number of inmates at the BIGG BOSS house, their bonding, fights and other emotions that come forth, powered by the nationwide viewership under the eyes of CP PLUS cameras substantiates our punch line UPAR WALA SAB DEKH RAHA HAI. Furthermore, BIGG BOSS has been the iconic show of our brand ambassador Salman Khan which adds to the glamour and excitement of the show with consistent viewership,” said Aditya Khemka, MD, CP PLUS. CP PLUS has installed over 100 cameras (a combination of high end speed dome, PTZ and Cube cameras) across the BIGG BOSS house that monitor the contestants round the clock, and simultaneously connecting them to the world outside. BIGG BOSS is one of the most popular reality shows in India, where selected individuals (a mix of celebrities and commoners) coming from different backgrounds, are confined within a space for a period of time, isolated from the outside world.

SecurityLink India ■ October 2018

37


National Roundup

Indian Chambers of Commerce Host

IP500 Protocol Summit in Bengaluru I

ndian Chambers of Commerce (ICC) alongside the IP500 Alliance hosted the ‘IP500 Protocol Summit’ in Bengaluru in order to explore the usage of IP500 methodology to enhance IoT-based building automation management and smart city applications. The event was inaugurated by Dr. Rajeev Singh, Director General of ICC, followed by a welcome speech by Helmut Adamski, Chairman of the IP500 Alliance. The event saw the presence of some notable names of the industry including officials from Indian Smart City Missions, Honeywell, Microsens, Wipro, Bosch, Bajaj Electronics Ltd. and many more. Numerous representatives from governmental bodies, research institutes and OEMs also attended the one-day event. “Over the past few years, the building automation and controls market has been expanding at a significant rate. With the government itself coming up with the concept of smart cities, the new generation of India is driving the next wave of technological innovations. As the world’s fastest growing economy, we are in dire need of a standard solution. IP500 technology is a wireless network platform that simplifies the servicing and maintenance of smart buildings, commercial places as well as smart cities,” said Dr. Rajeev Singh, Director General of ICC. “The market opportunity in India is endless at this mo-

ment. We joined hands with ICC for this event to highlight the potential of IP500 technology. With a diverse scope for application in different sectors, we aim to make Indian cities as technologically advanced as any other high-tech cities in the world. We are looking to collaborate with the major players to address together the challenges in smart cities and commercial buildings as well as Indian railways and airports,” commented Mr. Adamski. “We couldn’t think of a better venue than Bengaluru as it is considered the Silicon Valley of India. The city is also home to the major influencers of the building automation market,” he added. “Keeping in line with IP500 alliance’s commitment to the Indian Market, the India Chapter is working closely with the industry leaders to create a sustainable ecosystem of manufacturers, systems integrators and customers. We will provide complete support to all the stakeholders to ensure easy and seamless adaptation of the products on this wireless platform,” said Gulshan Aghi, President of the IP500 India Chapter. The Indian building automation market is expected to grow at a CAGR of over 12.5% until the year 2023. The government and private bodies are transforming cities, based on a smart information layer backed by IoT as well as sensors.

COSEC VEGA FAX C

OSEC VEGA FAX, an advanced door controller is engineered with careful blend of aesthetics, size, connectivity, reliability and ease of use for modern enterprises. It is a perfect fit for access control and time-attendance solution for modern organizations. Moreover, COSEC VEGA FAX is an open system allowing integration with third party hardware. Using auxiliary input and output ports, Fire Alarm system and Video Surveillance system can be connected without any need for external hardware modules. Motion sensors and relay devices can also be connected through these ports. COSEC VEGA FAX, a part of VEGA series, is specifically built for demanding enterprise to meet the functional needs of an organization’s employee time tracking system along with access control applications. The device offers unique advantages in terms of connectivity, technology, usage environment and ease of use. IP65, PoE, touchscreen and wireless connectivity offer foolproof access control and time-attendance solutions for corporate firms, manufacturing units, government organizations and more. It has various interfaces like exit reader, exit switch, auxiliary input/ output port, Ethernet and Wi-Fi. 38

SecurityLink India ■ October 2018


National Roundup

SecurityLink India â– October 2018

39


National Roundup

PACC 2018

(Supported by Hikvision) FSAI Bravery Awards Presented to Four Bravehearts at PACC 2018, Jaipur Hikvision Presents AI Enabled Security Solutions with Latest Innovative Products ire & Security Association of India (FSAI) has recently (7-9 September) organized the 6th edition of Projects Heads, Architects & Consultants Conclave (PACC) 2018 in Jaipur. Hikvision participated as the presenting partner of the event. PACC 2018 was attended by over 500 delegates, which included top bureaucrats, renowned architects, consultants, finest technocrats, and accomplished fire safety and security professionals from across India and other countries. PACC 2018 was concluded successfully with insightful discussions on the global security technology trends and best practices. In his welcome address Pankaj Dharkar, Program Chairman and International President, FSAI said, “With the express requirement of making a ‘Surakshit Bharat,’ PACC brings together global experts from fire and security industry to share best practices to make us and our neighboring countries learn, adapt and share. We have the perfect combination of policymakers, technology providers along with users and influencers. Our endeavor is to make the cities, people and assets safe and better with every passing year.” K.P. Dominic, National President, FSAI said, “FSAI’s ‘Surakshit Bharat’ campaign needs everyone at a national and regional level to work for its success by reaching out to people. More FSAI membership means additional commitment to spread safety awareness in the country.”

F

Hikvision Presents AI Enabled Security Solutions with Latest Innovative Products at PACC 2018

H

ikvision showcased their AI enabled security solutions along with the latest innovative products at PACC 2018, Jaipur. “Hikvision is at the forefront of AI enabled innovations. We’re here to share Hikvision’s AI enabled solutions and lat-

Ashish Dhakan (L) and K. P. Dominic (R)

Dignitaries Lighting the Inaugural Lamp

40

est innovative products with the industry stalwarts. Together with FSAI, we at Hikvision strive to evangelize the adaptation of latest security solutions including AI enabled video surveillance, access control and intrusion solutions. In line with FSAI’s motto to make Surakshit Bharat, Hikvision invites project heads, architects & consultants community to join hands in providing the best-in-class solutions,” Ashish Dhakan, MD & CEO, Prama Hikvision said, “PACC 2018 turned out to be a perfect platform for Hikvision to network with delegates, business leaders and security ecosystem partners to explore new growth opportunities.” SecurityLink India ■ October 2018


National Roundup

K. P. Dominic (L), Ashish Dhakan (C) and Pankaj Dharkar (R)

Ashish Gujarathi, AVP-Products (access control, intruder alarm and VDP), Prama Hikvision India gave an elaborate presentation on ‘Next Gen Future Technologies’ which showcased Hikvision’s giant strides into robotics, machine vision, AI and machine learning. Mr. Gujarathi also elaborated on Hikvision’s latest product innovations in UAV (unmanned aerial vehicle), UVSS (under vehicle surveillance system), PanoVu camera and thermal camera segments. Vinay Mishra, VP - Projects, Prama Hikvision India, participated in a panel discussion along with distinguished panelists on the theme ‘Integrated Security Needs of Modern Buildings,’ moderated by Garry Singh, President, IRIIS Consultants. Mr. Dhakan took part in Big 7 Debate on the theme ‘Security at Public Spaces – Reality vs. Claims,’ moderated by Maroof Raza, Defence and Security Specialist.

FSAI Bravery Awards Presented to Four Bravehearts at PACC 2018

D

uring PACC 2018, four bravehearts were felicitated with FSAI Bravery Awards. The prestigious FSAI

FSAI Bravery Award in Hero category was presented to Prashant Kumar,IPS, ADGP, Meerut, UP Police

Award is given in recognition of the acts of bravery in extraordinary circumstances that are considered worthy of honour. The awards are dedicated to salute brave policemen who have shown exceptional courage beyond the call of duty. The Awards included categories of Hero and Super Hero. The Super Hero award was presented to Late Pramod Kumar, Shaurya Chakra Commandant, CRPF, who heroically fought a fierce gun battle with 7 militants in Srinagar. He closed in to militants in his vehicle and then stepped in open to fight and neutralize the militants. The Hero Awards were given to Constable Sohan Singh, Rajasthan Police (posted at Jaipur), Late Ankit Kumar, Constable, UP Police, and Prashant Kumar, IPS, ADGP, Meerut, UP Police.

FSAI Bravery Award in Super Hero category was presented to the widow of Late Pramod Kumar, Shaurya Chakra Commandant, CRPF

FSAI has been working relentlessly towards achieving its mission of ‘Surakshit Bharat’ and protecting lives and properties. Hikvision as the world’s leading providers of innovative security and surveillance products and solutions is committed to make India a safe and secure nation. The award exemplifies the collective mission of FSAI and Hikvision towards fostering a culture where demonstration of courage

FSAI Bravery Award in Hero category was presented to the father of Late Ankit Tomar, Constable, UP Police

SecurityLink India ■ October 2018

FSAI Bravery Award in Hero category was presented to Sohan Singh,Constable, Rajasthan Police

41


National Roundup

and bravery, especially those from our security forces is recognized and rewarded. Speaking on the occasion, Mr. Dhakan said, “We have come together with FSAI for the FSAI Bravery Awards. It is a matter of social responsibility to honour the brave policemen, who have shown exemplary courage in protecting our citizens. We at Hikvision have envisioned a secure and safe society and remain committed to provide solutions that can help build such a system.”

K. P. Dominic added, “Digitalization is a valuable element in achieving efficiency in every industry and by leveraging the technical advancements, focus should be on development of green, sustainable and safe premises. We are extremely proud to be associated with this initiative of Prama Hikvision India to acknowledge and award the valiant acts of our policemen and their contribution against all odds to save lives without even once thinking about their own.”

Genetec Announces Distribution Partnership with Inflow Technologies New strategic partnership will facilitate growth and market penetration for Genetec unified IP security solutions across India

G

enetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions has recently entered into a new distribution partnership with Inflow Technologies. Based in Bangalore, Inflow distributes IT and security products through a network of 1,400+ channel partners in India and South Asia. Through this agreement, Inflow will distribute the entire Genetec portfolio of physical security software and hardware to enterprise, city, government, and education customers across India. At the heart of the Genetec portfolio is Genetec™ Security Center, a unified IP security platform that combines video surveillance (VMS), access control, automated number plate recognition (ANPR), communications, and analytics – all within a single user interface. In addition to on-premises solutions, Inflow will also market cloud-hosted subscription options that offer greater choice for installing Security Center in India. “The Indian security market is growing exponentially, with great demand to evolve security platforms into unified, federated models – especially with government initiatives like Smart City and Digital India. Genetec is strategically positioned to bring our unified IP security solutions to new untapped markets in India, made possible by the broad distribution network that Inflow has built,” commented Daniel Lee, Managing Director for APAC, Genetec. “Inflow has over a decade of expertise in security software and hardware deployments, servicing a broad network of channel partners. We are excited to enter this distribution partnership with Genetec to address the growing demand for high quality security solutions and hardware for both resellers and end-users. This combination will allow us to bring the specialized security solutions from Genetec, coupled with our ability to reach new resellers in varied geographies, with unique OEM products and services throughout India,” commented Rajesh Kumar, VP Tech BU, Inflow Technologies Pvt. Ltd.

Inflow and Genetec road shows

I

nflow hosted a series of Genetec technology road shows in Mumbai, Delhi and Bengaluru respectively to promote the new alliance and to educate integrators, channel partners, and end-users on the Security Center unified IP physical security solution. Security professionals will be able to learn about industry best practices, future security trends, and new business opportunities while also gaining insights into Inflow’s partner strategy. 42

SecurityLink India ■ October 2018


National Roundup

SecurityLink India â– October 2018

43


report

INDIA RISK SURVEY 2018 I

ndia continues to position itself as an attractive hub for investments from foreign players with an expanding economy and a steady gross domestic product (GDP) growing annually at 7.1%. International forums have indicated that the ease of doing business in India has improved significantly. Pro-investor policies have been implanted by the government to further bolster India’s position in the international market. Through several flagship programmes, the government is striving to promote manufacturing activity locally. Foreign investment and IT-powered infrastructure continue to be developed to further enable support for logistically robust and multi-nodal networks. Emerging possibilities of growth implies risks across all sectors. Companies should expect an array of challenges in business operations in India. A lack of preparation against risk mitigation could result in financial and operational functions. The Government of India continues to make attempts at ensuring that bilateral and multilateral relations remain friendly for businesses to conduct operations. As India prepares itself, as a nation, for another round of general elections in 2019, there has emerged a certain amount of uncertainty regarding business policies and existing schemes. With the upcoming elections in 2019, it is likely that policy change may affect business continuity. A holistic risk-management strategy would assist businesses to anticipate and prepare against emerging and existing risks, thereby, allowing a company to mitigate such risks.

1

Executive Summary

Overall Risk Trends - 2018 Overall Risk Trends 2018

15.00

10.14 9.94 10.00

9.14 8.76

8.52

8.50

8.38

8.18

7.90 7.15 6.82

6.55

5.00

0.00

Information & Cyber Insecurity

Natural Hazards

Fire

Terrorism Political & Strikes, & Governance Closures Insurgency Instability & Unrest

Crime

Corruption, Business Threats to Accidents Intellectual Property Bribery & Espionage Women Safety Theft Corporate Frauds

â– October 2018areas. The risks wheel is divided into other risk The44India Risk Survey consists of 12 risks thatSecurityLink indicate India the four quadrants: Hazard & Event Risk (natural hazards, the most significant threats to business operations


report

The India Risk Survey consists of 12 risks that indicate the most significant threats to business operations and development in India. Each risk is assessed individually, which provides a deeper and more holistic understanding, based on the Pinkerton Risk Wheel. The Pinkerton Risk Wheel frames risk into four broad categories which can help understand not only the different threats that can impact business continuity, but the inter connectivity of risks as a whole. Threats categorized in one risk area ultimately can impact the other risk areas. The risks wheel is divided into four quadrants – Hazard & Event Risk (natural hazards, terrorism & insurgency, crime and fire), Operational and Physical Risk (strikes and unrest, threats to women safety, accidents and infrastructure risk), Market and Economic Risk (political and government instability, corruption, bribery, fraud, and legal regulatory risk), and Technology and Information Risk (information and cyber insecurity, intellectual property theft and business espionage).

NATURAL HAZARDS Flood Draught/Famine Earthquake Pandemic

STRIKES, CLOSURES & UNREST Political Violence Union / Labour Strikes Civil Unrest Regulatory Changes

TERRORISM & INSURGENCY Explosives Active Shooter/Suicide Bombers CBRNe Multipolar Insurgency CRIME Violent Crime such as Murder, Kidnapping Property Crime Offences against Public Tranquility Drug Abuse FIRE Electric Short Circuit Chemical Based Fires Gas Cylinders / Stove Burst Fire in building Public Transport

THREATS TO WOMEN SAFETY Sexual Assault Including Rape Eve-teasing Abduction Sexual Favours At Workplace

HAZARD & EVENT RISK

OPERATIONAL & PHYSICAL RISK

OCCUPATIONAL HAZARD AT WORKPLACE INFORMATION & CYBER INSECURITY Data Theft/Phishing/lacktivism Threats compliance / Regulatory Incidences Domain Based Threats / Cyber Infrastructure Attack Executive Threats / Impersonations INTELLECTUAL PROPERTY THEFT Brand Reputation Loss Counterfeit Goods Patent & Trademark Infringement IP Legal Framework

ACCIDENTS Traffic Accidents Forces of Nature - Lightning, Heat stroke, Factory / Machine accidents Crowd Mismanagement

INFRASTRUCTURE RISK

TECHNOLOGY & INFORMATIONAL RISK

MARKET & ECONOMIC RISK

POLITICAL & GOVERNMENT INSTABILITY Policy Changes State Fragility Local Govt. Instability International Conflict CORRUPTION, BRIBERY & CORPORATE FRAUD Bribery/ Kickback Conflict of Interest Shell Companies Business Identity Theft LEGAL REGULATORY RISK

BUSINESS ESPIONAGE Vendor Bribing Risk Through document waste Hacking Employee Poaching ■ October 2018 digitisation. While this could be towards India Risk Survey 2018 also provides the mostSecurityLink significant Indiamoving perceived as a step towards rapid development in threat types within each risk for a comprehensive

45


report

The India Risk Survey (IRS) aims to measure and quantify the different risks that organizations face when conducting operations in India. The constantly evolving nature of risks compels organizations to safeguard their operations and develop innovative strategies to predict threats. In this seventh edition, IRS 2018 aims to delve deeper into all facets of risks to identify the most prevalent threats under each risk category. Through deliberations with policy makers and industry stakeholders across sectors, each year emerging risks are also identified. The IRS 2018 states infrastructure risks, occupational hazards at workplace and legal regulatory risk as the emerging risks of 2018. In today’s time, policy makers and business leaders can truly fulfil their role by timely anticipating risks. On behalf of Pinkerton, I sincerely hope that the India Risk Survey 2018 report will assist the industry, as well as the government decision makers to assess the impact of these risks and develop preventive strategies to mitigate them. – Rohit Karnatak, Managing Director – India, APAC & EMEA - Global Screening, Pinkerton

Overall Risk Trends – 2018

I

ndia Risk Survey 2018 also provides the most significant threat types within each risk for a comprehensive reading of each threat-vector as part of a larger reality. The threats are interconnected and overlap across domains, sectors and geographies. In the 2018 edition, new risks have been identified on the basis of this year’s survey, which include infrastructure risk, occupational hazards at workplace, and legal regulatory risks. Information and Cyber Insecurity remains at the top position in the India Risk Survey 2018. Considering the importance of cyber critical infrastructure, the vulnerabilities attached to it remain largely underlined in the Survey. Services in India are quickly moving towards digitization. While this could be perceived as a step towards rapid development in various sectors, it also presents risks in which malicious activity can be easily carried out, posing a significant threat to sensitive data. The India Risk Survey 2018 focuses on four major risks posed by Information and Cyber Insecurity. These are data theft, compliance and regulatory incidents, cyber infrastructure attacks, and impersonations. Amongst these, data theft, phishing, and hacktivism emerged as the biggest threat. With India becoming a key destination for businesses and foreign investment, a more serious focus should be directed to create a robust security mechanism to address these challenges. Natural Hazards ranks as the second biggest risk to business operations in the India Risk Survey 2018. As per the findings, floods pose the biggest threat to business op46

erations. Inadequate infrastructure and maintenance by concerned bodies remain a primary factor that would allow natural hazards to pose serious risks to business operations. Further, a lack of preparedness and early warning systems has contributed to making Natural Hazards a risk that should be considered with more seriousness. Outbreak of fire ranks at third position with numerous fire accidents in the current year, causing significant loss of life and property. Non-compliance with safety norms in factories and high-rises in addition to the under-equipped fire services in India has led to an alarming number of accidents year-on-year. While the government and other regulatory bodies have prescribed norms and fire safety measures, implementation and vigilance continue to be a concern. Risks that emanate from Terrorism and Insurgency show a significant drop to the fourth position. While there has been a marked decrease in fatalities, it has been found that there has also been a rise in the number of alleged terrorist attacks in the country. Left-Wing Extremism (LWE) remains a severe threat, posing security risks mainly to logistical operations. While the Islamic State (IS) has been relatively controlled on a global scale, the potential of IS sleeper cells remains a big threat. The Government of India continues to push concentrated efforts to holistically counter the threats of terrorism and insurgency – internal as well as external. India continues to strengthen its domestic capabilities in hostile regions and at the borders. Simultaneously, the government is also strengthening ties on bilateral and multilateral platforms to tackle the risks posed by terrorism to ensure that

SecurityLink India ■ October 2018


report

business operations and personnel are secure and safe. Political & Governance Instability’ ranks fifth position this year. The Survey finds that certain policy changes are perceived as a threat under this risk category. It is assessed that the general elections to be held across the country in 2019, led to a perception of increasing uncertainty, causing the risk to climb up one spot to number 5 position in 2018. This risk is closely observed by investors, foreign and domestic, and would impact business development and continuity plans for the economy as a whole. The survey finds that growing political instability has become a major cause for concern, which has resulted in violent clashes and unrests in several parts of the country. The implications posed by risks from Strikes, Closures, and Unrest, which is ranked sixth, have direct implications on financial losses incurred by businesses, and a slow-down in the business development. Further, the country’s reputation perceived as inhospitable for business to flourish also affects future prospects. Instability and threatening business operations directly impact the market by affecting investor confidence and increase in the risk premium assigned to securities in the country. The government continues to take steps to rectify situations by addressing worker disgruntlement through legal changes and reforms. According to the India Risk Survey 2018, Crime ranks on the seventh position. India is ranked 136 out of 163 countries in theRisk Global Peace Index 2018,Trends moving up just one Overall RankingYearly

position as compared to a jump of six positions in 2017. It is noted that the risk of crime in India has seen a steady decline over the last few years. The government and police have made use of social media and digital platforms to reach more people and ensure more efficient policing. Various police departments have taken to using social media as a tool for crime prevention. The India Risk Survey 2018 finds that threats to security and safety posed by violent crimes such as kidnapping and murder, are the biggest risk to company personnel. ‘Corruption, Bribery & Corporate Fraud’ continues to be one of the biggest risks faced by businesses in India, which ranks eighth in the India Risk Survey 2018. The perception of the risk has fallen with India incorporating economic reforms to ensure that global investors are appeased. According to the World Bank’s Doing Business 2018 rankings, India has jumped from 130 in 2017 to 100 in 2018 out of 189 countries. ‘Corruption, Bribery & Corporate Fraud’ as a risk, however, continues to hinder growth and cause disruptions in progress. It dissuades potential investors and diminishes the growth opportunities of existing players. Investors have called for better corporate governance and more stringent regulation of business corporations. Business Espionage remains in the ninth position in the India Risk Survey 2018. As per the Transparency International’s Corruption Perception Index 2017, India ranks 81 with a score of 40. This is in contrast to a ranking of 79 in in

3

Trend Analysis

Overall Risk Ranking – Yearly Trends

1

1 1 2

2

2

RISK RANKING OVER THE YEARS 2018 Rank 2017 Rank 2016 Rank

3

3

3 4

4

4 5

5

5 6 6

7

6 7

7

8

8

8 9

9 9 10

10

10 11 11

11 12 12

Information & Cyber Insecurity 1 1 2

Natural Hazards 2 4 7

Fire 3 5 8

Political & Terrorism & Governance Insurgency Instability 4 2 4

5 6 6

Strikes, Closures & Unrest 6 7 1

While assessing and analysing the trends forSecurityLink the primeIndia

Crime 7 8 3

Corruption, Bribery & Corporate Frauds 8 3 5

■ October 2018

12

Business Espionage

Threats to Women Safety

Accidents

Intellectual Property Theft

9 9 10

10 11 11

11 12 12

12 10 9

47 Natural Hazards has evidently recorded a jump from the


report

Risks to business establishments are detrimental to the growth and development of any country. The nature of risks globally has changed enormously, and with their occurrences becoming more unexpected and their effects becoming more profound, risks need to be taken more seriously. Further, due to rapid digital transformation of businesses, underlying infrastructure is becoming more complex. In these changing times it is critical to understand emerging risks. Knowledge about impending risks can benefit businesses, especially MSMEs and start-ups, so that they could take well-informed decisions. The seventh edition of the India Risk Survey is based on a comprehensive survey spanning across several sectors of the economy and geographical regions of India. This survey is an endeavor to examine and evaluate the potentially destructive risks to business undertakings in India. – Dilip Chenoy, Secretary General, FICCI 2016, also with a score of 40. While the India Risk Survey 2018 places Business Espionage on the ninth spot, business developers and investors should remain focused on the risks associated with it, which should be mitigated at all costs. Due to the sensitive nature of critical infrastructures of businesses today, particularly the cyber-domain, business espionage is becoming increasingly more sophisticated and more covert. Hence, detecting and mitigating the risks involved becomes more difficult. Threats to women safety ranks tenth in India Risk Survey 2018. Harassment of women in the workplace is assessed as a growing risk faced by businesses in India. The prevention of sexual harassment in the work place is a responsibility that has to be largely borne by the employer. Corporates, in their own best interests, should streamline and strengthen their internal policies on sexual harassment. The India Risk Survey finds that ‘Accidents’ climbs one spot to be at 11th position from 12th last year. The survey finds that traffic accidents have been the most significant threat within the risk. According to media sources, a report published on 10 January 2018, nearly 400 fatalities a day are caused by traffic accidents in India. The source further reported that the Government of India is attempting to curb the rising trend on Indian roads. The growing trend of fatalities caused by occupational accidents implies increased liability for business, particularly for the insurance sector. Injuries caused by occupational accidents can also impact operations with probable reduced productivity, lower sales, and possible disrupted business continuity. The India Risk Survey 2018 finds that risks associated 48

with Intellectual Property (IP) Theft ranks twelfth. While there has been a slip in its ranking, IP theft is still a threat that could significantly affect a brand name and reputation. With India’s IP policy coming closer to international norms, research and development have also seen an improvement.

Factors influencing the risk gainers Natural hazards Trends

A

ccording to the media reports, a disaster risk index prepared by the Government of India along with the United Nations Development Programme, assesses hazards and vulnerabilities across 640 districts indicating that Maharashtra is the most vulnerable and prone to natural disasters, followed by West Bengal, Uttar Pradesh, and Madhya Pradesh. Among the Union Territories, Delhi positions itself to be the most vulnerable to such disasters.

Threat mapping

T

he survey identifies flood as the most significant risk to businesses and communities in the country. In August 2018, the state of Kerala experienced what has been considered as the worst flood in the region of the century following incessant rain. According to the media reports in August, property worth more than INR20,000 Crores (USD2755.01 million) has been destroyed, and insurance companies have reportedly received claims worth over INR1000 Crores, (USD137.67 million). Nearly one million people have been displaced and nearly 400 deaths have been reported.

SecurityLink India ■ October 2018


RS INFLUENCING THE RISK GAINERS

report Risk Gainers 2015

2016

2017

2018

0 1 2

2 3 4

4 5 5 6

6 7 7

The implications posed by risks from strikes, closures and unrest have direct implications for financial losses incurred by businesses and a slow-down in business development.

8 8

Threat mapping

9 10 12

O

12

Natural Hazards

Fire

Strikes Closures & Unrest

ATURAL HAZARDS

nds

This year, incidences of drought were also reported in

cording to media reports, a disaster risk index prepared by the Government of India, along India. According to reports, Shimla experienced severe h the United Nations Development Programme, assesses hazards and vulnerabilities across droughts with waterissupply decreasing by an 50% 0 districts indicating that Maharashtra most vulnerable and prone to estimated natural disasters, owed by West Bengal, Uttar Pradesh, and Madhya Pradesh. Among the Union Territories, of the daily requirement. The crisis has affected the tourhi positions itself to be the most vulnerable to such disasters.

n 2 January 2018, it was reported that thousands of Dalits in Mumbai staged a protest, which disrupted local train services in the city. On May 23, 2018, it was reported that the Madras High Court’s Madurai Bench stayed the construction of a leading manufacturer’s new copper smelter plant in Tuticorin resulting in protests. It has been further reported that police opened fire against thousands of protestors. Thirteen casualties were reported and several others were injured.

ism industry which the hill station is known for. Fragile infrastructure, dilapidated buildings, and weak conditions of e survey identifies flood as the most significant risk to businesses and communities in the logistic chains have a crucial impact and substantially inuntry. In August 2018, the state of Kerala experienced, what has been considered as the of extreme natural rain. events. rst flood in thecreased region ofthe the risk century, following incessant According to media reports

Risk Ranking – Comparative Perspectives on Risk

August, property worth more than INR 20,000 Crores (USD 2755.01 million) has been lost; urance companies have reportedly received claims worth over INR 1000 Crores, (USD 137.67 Fire ion). Nearly one million people have been displaced, and nearly 400 deaths have been Trends orted.

T

reat Mapping:

Govt./ PSU Vs Private Sector

he survey results suggest that the perception of risk categories remains the same as last year between the Govon-compliance to safety in to factories and highernment/ PSU and the Private sector, with ‘Information & s year, drought situations were also reported in India.norms According reports, Shimla erienced severe droughts waterof supply decreasing by an estimated the daily rises,withlack institutionalized funding50% andof underCyber Insecurity’ remaining as the greatest risk to their opuirement.2 The crisis has affected the tourism industry which the hill station is known for. equipped fire services in India have led to an alarming numerations. This perception can be attributed to a sustained ingile infrastructure, dilapidated buildings, weak conditions of logistic chains have a crucial ber of increase accidents in risk theofcountry. Electric short circuits have crease in attempted cyber-attacks and potential espionage on pact and substantially the the extreme natural events. been rated as the most significant threat under the risk catcyber-security this year. As per the report, data theft, phishattles worst water crisis in decades,’ egory of Deccan fire. Herald, May 29, 2018, https://www.deccanherald.com/national/shimla-battles-worst-water-crisis- ing and hacktivism pose the biggest threat under this risk cat672312.html The National Crime Records Bureau (NCRB) data re- India Risk egory. Survey 2018The | 13 information and cyber domain remains one of the corded a total of 1,13,961 deaths due to fire accidents between most important critical infrastructures for the government 2010 and 2014 at a startling average of 62 deaths per day. and the private sector, with the government’s extensive shift towards digitization. This coupled with the private sector’s Threat mapping multi-modal engagement and investment in the sector has umbai alone has witnessed 12 major fire tragedies and made it the most vulnerable to attacks. Protection of critical 22 deaths since the Kamala Mills fire that killed 14 infrastructure operations has emerged as a major challenge people in December 2017. for the government and corporate sectors. The cause-wise analysis of fire accidents indicates that The government/ PSU rates ‘Terrorism & Insurgency’ as 29% were incidents at residential buildings while those at the second highest risk to its operations, the same is ranked factories manufacturing combustible goods accounted for at No. 4 by the private sector; The government/ PSU rates only 1.42%. ‘Natural Hazards’ as the third highest risk whereas private sector ranks ‘Fire’ at number 3. The Government/ PSU ranks Strikes, Closures & Unrest ‘Fire’ at number 5 whereas Private sector places ‘Political Trends & Government Instability’ at the same rank. Private sector ndia Risk Survey 2018 finds that growing political instaranks ‘Crime’ at number 7 whereas Government/ PSU places bility has become a major cause for concern, which has ‘Corruption, Bribery & Corporate Fraud’ at the same posiresulted in violent clashes and unrests in several parts of the tion. ‘Business Espionage’ is ranked at number 9 & ‘Intelcountry. lectual Property Theft’ at number 12 by both segments.

N

M

I

SecurityLink India ■ October 2018

49


Risk Ranking - Comparative Perspectives on Risk

report

Risk Ranking - Govt./PSU Vs Private Sector

1

Risk Ranking – Govt./ PSU Vs. Private Sector

1

0

2

2

nage’ second most risk, for smallscale companies ‘Information & 5 4 6 6 Cyber Insecurity’ was the second 7 7 6 8 8 most risk. Natural Hazards came 9 9 10 8 10 at 2nd spot for large corporations. 11 11 10 For companies exceeding an 12 12 12 annual turnover of INR200 crore 14 (USD27.83 million) rated ‘TerNatural Threats to Fire Information Terrorism Crime Corruption, Political & Business Accidents Strikes, Intellectual rorism & Insurgency,’ ‘Political & & Hazards Women & Cyber Bribery & Governance Espionage Closures Property Safety Theft Insecurity Insurgency & Unrest Corporate Instability Frauds Government Instability’ & ‘Fire’ as among the top five risks. Govt/PSU Private Sector Similarly, small companies ranked ‘Fire,’ ‘Terrorism & Insurinfrastructure operations has emerged as a major The survey results suggest that the perception of risk Risk Ranking – Company Turnover gency’ and ‘Strikes, Closures & Unrest’ among the top five challenge for the Government and Corporate sectors. categories remains the same as last year between he survey includes a study of the risk perception by threats besides ‘Natural Hazards’ & ‘Information & Cyber The Government / PSU rates ‘Terrorism & Insurgency’ the Government/ PSU and the Private sector, with the second highest risk toInsecurity’ its operations, theFor same is ‘Information & Cyber Insecurity’ companies on remaining the basis as of the their turnover,asgiving an overrisk. medium-scale companies ‘Strikes, Cloranked at No. 4 by the private sector. The Government greatest risk to their operations. This perception can view of the nature of challenges faced by small & medium sures & Unrest,’ ‘Fire’ and ‘Terrorism & Insurgency’ consti/ PSU rates ‘Natural Hazards’ as the third highest be attributed to a sustained increase in attempted level enterprises in comparison to large corporations. For the tute among the top five risks. risk whereas private sector ranks ‘Fire’ at number cyber-attacks and potential espionage on cyber-security purpose of thedata survey, companies were3. The Government/ PSU ranks ‘Fire’ at number 5 segregated ac‘Corruption Bribery & Corporate Fraud’ ranked at 8th this year. As per the report, theft, the phishing & hacktivismcording pose the to biggest threat under thisUpto risk INR100 whereas Private sector places ‘Political & Government position across the company segments, while ‘Accidents’ is the turnover, viz., crore (USD13.9 Instability’ at the same rank. Private sector ranks category. The information and cyber-domain remains the lowest perceived threat among medium scale companies million), Between INR100 crore to 200 crore (USD13.9 ‘Crime’ at number 7 whereas Government/ PSU places one of the most important critical infrastructure for & large corporations 27.83 million), and companies with a turnover of more than ‘Corruption, Bribery & Corporate Fraud’ at the same though it still remains a threat to busithe Government and the private sector, with the position. ‘Business Espionage’ is ranked at number 9 Government’s extensive shift towards digitisation. ness operations. INR200 crore (USD27.83 million). For medium-scale com& ‘Intellectual Property Theft’ at number 12 by both This, coupled with the private sector’s multi-modal panies with a turnover between INR 100 crore to 200 crore segments. engagement and investment in the sector has made Region wise risk ranking million), as of well as large corporations with it the most(USD13.9-27.83 vulnerable to attacks. Protection critical wo regions of India – South and West – view ‘Information an annual turnover exceeding INR 200 crore (USD 27.83 & Cyber Insecurity as the top most risk for businesses million), ‘Information & Cyber Insecurity’ was ranked as the in the country, whereas the East region perceives ‘Political & primary risk. For small-scale companies with a turnover of Governance Instability’ as the highest risk for business operaUpto INR 100 crore (USD13.9 million) ‘Natural Hazards’ tions and investments. This rating is because of the increasing was the primary risk. unrest in the region. The North region perceives ‘Natural HazWhile medium-scale companies ranks ‘Business Espioards’ as the topmost risk for Risk Ranking - Company Turnover business operations. The 0 1 1 1 eastern region ranks ‘Infor2 2 2 2 3 3 3 mation & Cyber Insecurity’ 4 4 4 India Risk Survey 2018 | 15 4 5 5 5 and ‘Strikes, Closures & 6 6 6 6 7 7 7 Unrest’ at No. 2 & No. 3 8 8 8 8 respectively. Based on key 9 9 9 10 10 10 10 local challenges and con11 11 11 12 12 12 cerns the western region 12 rates ‘Natural Hazards’ and 14 ‘Fire’ at the second and Corruption, Information & Political & Strikes, Intellectual Threats to Terrorism & Natural Bribery & Business Cyber Governance Fire Crime Closures & Property Women Accidents Insurgency Hazards Corporate Espionage third position respectively.’ Insecurity Instability Unrest Theft Safety Frauds Turnover 0-100 crores 2 4 6 1 8 3 7 5 12 9 11 10 Information & Cyber InTurnover 101-200 crores 1 5 10 6 8 4 11 3 9 2 7 12 Turnover Above 200 Crores 1 3 4 2 8 5 6 7 11 9 10 12 security’ and ‘Fire’ conRisk Ranking – Company Turnover stitute No. 2 and No. 3 in 3

3

4

2

4

5

T

T

The survey includes a study of the risk perception by companies on the basis of their turnover, giving 50 an overview of the nature of challenges faced by small & medium level enterprises in comparison to

For companies exceeding an annual turnover of INR 200 crore (USD 27.83 million) rated ‘Terrorism & Insurgency’, SecurityLink India ■ October 2018 ‘Political & Government Instability’ & ‘Fire’ as among the top five risks.


report

Top three risks each region of India Topinthree risks in each

region of India Information & Cyber Insecurity

Natural Hazards

Natural Hazards Corruption Bribery & Corporate Frauds

Information & Cyber Insecurity

Information & Cyber Insecurity

Fire

Crime

‘Information & Cyber Insecurity’ at No. 2 and No. 3 positions respectively. Pan India respondents also Information & Cyber Insecurity ranked ‘Natural Hazards’ as the highest risk, followed by ‘Information & Cyber Insecurity’ and ‘Business Espionage’ as the other twoCorruption key risk to businesses. Bribery & Corporate Frauds

Industry Wise Risk Ranking

I

ndustry-wise rankings of risk categories present a varied, comprehensive and sectoral perception. Crime ‘Information & Cyber Insecurity’ is ranked the top Political & Information & Governance risk by the Education, Govt./ PSU, Financial SerCyber Insecurity Instability NORTH vices, SOUTH Infrastructure, Logistics & Transportation, Medical Services, Telecom and Others. For the eInformation & Natural Hazards Cyber Insecurity Commerce and Hospitality sectors, ‘Corruption, Bribery & Corporate Frauds’ holds the top most Political & Strikes, Information & Closures & Governance Fire Unrest position. ‘Natural Cyber Hazards’ is the second leading Insecurity Instability risk for sectors including e-Commerce, Financial WEST EAST Services, Infrastructure, Logistics & Transportation, Top Three Risks in Each Region of Information India & Hazards Top three risks across industry sectors Media & Entertainment,Natural Medical Services, Retail, Cyber Insecurity SECTOR No. 1 Risk No. 2 Risk No. 3 Risk Security Service Providers, Telecom and Others. For Information & Cyber Insecurity Natural Hazards Political & Governance Instability Education risk ranking perceptions for the northern region. The southern a majority of sectors ‘Natural Hazards’ has entered in the top Corruption, Bribery & Corporate Frauds Strikes, Closures & Unrest E-commerce Natural Hazards Strikes, region of the country ranks ‘Corruption, Bribery & Corporate three risk category and is considered to be one of the colosInformation & Cyber Insecurity Corruption, Govt. & PSU Terrorism & Insurgency Closures & Bribery & Corporate Fire Frauds Unrest Frauds’Information and ‘Crime’ at No. 2 and No. 3 respectively. For resal key concerns for business operations in the country. For a & Cyber Insecurity Terrorism & Insurgency Financial Services Natural Hazards spondents fromBribery outside of Fraud India, Information ‘Natural& Cyber Hazards’ majority of sectors, risks such as ‘Terrorism & Insurgency’, Corruption, & Corporate Natural Hazards Hospitality Insecurity comprises Information & Cyber Insecurity Terrorism & Insurgency Infrastructure Natural Hazards EAST the top most risk, followed by ‘Terrorism & Insurgency’ and ‘Fire’, ‘PoliticalWEST & Governance Instability’ and ‘Business EsSOUTH

NORTH

Fire

IT/ITES

Natural Hazards

Information & Cyber Insecurity

Fire

Logistics & Transportation

Information & Cyber Insecurity

Natural Hazards

Terrorism & Insurgency

Manufacturing

Top Three Risks Across Industry Sectors Top three risks across industry sectors Fire Natural Hazards Information & Cyber Insecurity

Media & Entertainment

Business Espionage SECTOR

Medical Services

NGO

Retail

Natural Hazards Education Political & Governance Instability

Fire

Natural Hazards

Fire

Political & Governance Instability

Natural Hazards

Fire

Natural Hazards

Strikes, Closures & Unrest

Natural Hazards

Information & Cyber Insecurity

Terrorism & Insurgency

Corruption, Bribery & Corporate Frauds

Corruption, Bribery & Corporate Frauds

Govt. & PSU Information & Cyber Insecurity

Information & Cyber Insecurity Natural Hazards

Others

Information & Cyber Insecurity

Financial Services

No. 3 Risk

Natural Hazards

Information Cyber Insecurity Terrorism &&Insurgency

Strikes, Closures & Unrest

No. 2 Risk

Terrorism & Insurgency

E-commerce

Security Service Providers

Telecom

Natural Hazards No. 1 Risk

Information & Cyber Insecurity

Natural Hazards

Fire

Strikes, Closures & Unrest

Information & Cyber Insecurity

Natural Hazards

Terrorism & Insurgency

Hospitality

Corruption, Bribery & Corporate Fraud

Information & Cyber Insecurity

Natural Hazards

Infrastructure

Information & Cyber Insecurity

Natural Hazards

Terrorism & Insurgency

IT/ITES

Natural Hazards

Information & Cyber Insecurity

Fire

Logistics & Transportation

Information & Cyber Insecurity

Natural Hazards

Terrorism & Insurgency

Manufacturing

Fire

Information & Cyber Insecurity

Natural Hazards

Media & Entertainment

Business Espionage

Natural Hazards

Fire

Medical Services

Information & Cyber Insecurity

Natural Hazards

Terrorism & Insurgency

NGO

Natural Hazards

Terrorism & Insurgency

Fire

Retail

Political & Governance Instability

Natural Hazards

Fire

Security Service Providers

Strikes, Closures & Unrest

Natural Hazards

Information & Cyber Insecurity

Telecom

Information & Cyber Insecurity

Natural Hazards

Fire

Others

Information & Cyber Insecurity

Natural Hazards

Strikes, Closures & Unrest

10 | India Risk Survey 2018

10 | India Risk Survey 2018

SecurityLink India ■ October 2018

51


report

pionage’ are the primary concerns and constitute among the top five perceived risks. ‘Strikes, Closures & Unrest’ is indicated among the top five risks observed in the E-Commerce, Manufacturing, Security Service Providers and Others. The Govt./ PSU, Media & Entertainment and the Non-governmental organization (NGOs) perceive ‘Threats to Women Safety’ as the fourth most important and concerning risk.

gorization

Risk Categorization

T High

he IRS 2018 segregates risks into three categories, viz., Strategic, Operational and Safety risks. Strategic risks are those that impact directly the achievement of an organization’s business objectives. At the national level these are risks which have a grave impact on national security and its

e

survivability. Strategic risks are majorly determined by the top leadership of the organisation. Operational risks are defined as the probability of loss occurring from the internal inadequacies of an organisation or a breakdown in its controls, operations or procedures. Lastly, Safety risks are those risks which have the potential to jeopardise employee safety. These could be either internal or external or both. Employees being the critical assets to an organisation, any potential hazard or threat to their safety could affect business continuity. The graph on ‘categorisation of risk’ represents a particular risk that falls within the categories of either Strategic, Operational or Safety risks. The probability and impact of these risks illustrate their importance to the corporate sector. The categorisation is generic. Some of the risks considered ‘Strategic’ for some inInformation & dustries can be categorised as ‘Operational’ Cyber risk for another set of industries. Natural Hazards

Moderate

PROBABILITY

Accidents

Crime Political & Govt. Instability Strikes Closures & Unrest

Overall Risk Ranking Terrorism & Insurgency Fire

Threats to Women Safety IP Theft

Low

Corruption, Bribery & Corporate Frauds Business Espionage

n ns Low

High

Moderate

IMPACT

al

Strategic Risks

Operational Risks

Safety Risks

T

he India Risk Survey presents the perception of various categories of risk by business leaders, professionals in public and private sectors spread across the country. As with any country facing challenging environments, India continues to tackle the dynamic and demanding environment with regard to the changing threat perceptions. India Risk Survey 2018 thus tries to delve and encapsulate the movement of a particular risk in the spectrum comprising a set of 12 risks. This year the report has also captured the most prevalent threat under each risk as per the responses provided by surveyors.

categories of either Strategic, Operational or Safety risks. The probability The India Risk Survey 2018 is a joint effort of FICCI and Pinkerton to highlight potential threats and impact of these risks illustrate their importance to the corporate severity of such risks Some and their impact. The results of the survey are based on a collation of sector. and The categorisation is generic. of the risks considered a set of 12 risks that have been identified after a series of discussions & deliberations with stake‘Strategic’ for some industries can be categorised as ‘Operational’ risk holders across sectors. The survey thus aims to focus on the major risks that have the potential for another set of industries.

to adversely impact businesses in India. The India Risk Survey also provides inputs that would be beneficial in cross-sector business leadership in devising risk-mitigation strategies to ensure a secure business environment. However, due to the multi-dimensional nature of risks, and their impact, the applicability of each risk to individual organizations may vary. 52

SecurityLink India ■ October 2018


National Roundup

SecurityLink India â– October 2018

53


application/ case study

Hikvision Surveillance System Secures Ontario Car Dealership Using Innovative Off-Grid Platform

T

he Hikvision integrator Off Grid Surveillance Platforms (OGSP) installed the security system provided by Hikvision USA Inc., one of the top providers of artificial intelligence, machine learning, robotics and other emerging technologies, and the leading supplier of video surveillance products and solutions, to secure a building during the remodelling process for Ajax Hyundai in Ontario, Canada. Ajax Hyundai in Ontario, a part of the Drive Auto Group in Canada, had plans to renovate a building down the street from its original location and rebrand the dealership. In the process of reconstruction, walls were opened and wires were cut, and

the building lost electricity. While under construction, the building housed new unsold vehicles and expensive construction equipment. The renovation process left the interior contents of the dealership vulnerable to theft during the construction process. As a result, Ajax Hyundai needed a surveillance solution that could function independently from the electric grid. “We have a long working relationship with OGSP, so when we required surveillance during construction, we knew exactly who to call,” said Sean Harris, General Manager for Ajax Hyundai, “I have four Hikvision dome cameras installed at my home which are paired with Hikvi-

sion DVRs, so I’m familiar with the video quality of Hikvision surveillance systems. It’s the unique installation from OGSP that left many of our employees astounded by the engineering feat.” This type of installation is OGSP’s expertise – surveillance systems that operate off the electrical grid using the sun to power video surveillance and live monitoring equipment. “There is a big issue in Canada with people trying to steal cable at construction sites and hydro installations, and people will harm themselves because there are live wires. To counter this problem, preventing injuries and even deaths and reduc-

Hivision’s IR PTZ dome security cameras and Hikvision NVRs provided solar-powered video surveillance during building renovation

54

SecurityLink India ■ October 2018


application/ case study

ing construction site theft, I devised a more diverse system providing greater power with reliable, real-time monitoring, via third parties and superior area coverage,” said Jeff Mcilveen, Owner of OGSP.

Requirement

Mobile surveillance system with panoramic coverage

T

he building was open for business during the interior renovation, so Ajax Hyundai needed a surveillance system to function as a theft deterrent as well as monitor employee safety and protect equipment and vehicles. “It was important for us to have a panoramic view of the entire building and surrounding areas,” said Harris, “The off grid surveillance platform placed the Hikvision PTZ security cameras more than 24 feet in the air, so it can capture details from many blocks away. The platform looks very ‘official,’ and therefore serves as an effective theft deterrent.” “The surveillance system had to generate enough solar power to operate around the clock, using stored battery power for overnight use, with a generator as a backup power source,” said Mr. Mcilveen, “Hikvision’s high resolution and PTZ features provided the dealership with live viewing and recorded video in case of an incident.” The assistant service manager checks the cameras every morning when he gets in, and uses Hikvision’s iVMS-4200 app to check in remotely. Staff can review recorded footage, and by using motion-activated lights, they can determine if an event warrants further investigation.

Solution

Solar-powered surveillance equipped with Hikvision PTZ security cameras and a Hikvision NVR

O

ff Grid Surveillance Platforms recommended and installed four Hikvision DS-2DE4A220IWAE 2MP network PTZ dome camera with 20 times optical zoom, IR range 150 meters (~490 feet), IP66 rating and IK10 vandal protection. The PTZ cameras were installed at the top of a 24-foot base, with one camera facing each of the four corners. “I installed Hikvision PTZ cameras to ensure they were located in the center of a circle, to provide 360-degree coverage and full visibility,” said Mr. Mcilveen, “The compact size of Hikvision cameras helps, and I installed the cameras to be stationary and stable even with wind resistance, offering as much coverage as possible while being able to capture details such as license plates.” Hikvision cameras offer performance with compact size and weight, to balance the design. OGSP also installed a Hikvision DS-7604NI-E1 embedded plug & play NVR inside of the trailers with a capacity of 3 TB to store up to one month of video recordings.

Results

Panoramic surveillance and heightened security for building renovation

Hikvision camera resolution is phenomenal, and it is easy to check on our cameras using Hikvision’s iVMS-4200 app,” commented Mr. Harris, “Our staff was pretty impressed with the unique SecurityLink India ■ October 2018

OGSP configuration and kept saying ‘wow, you’ve got to see this thing.” Mr. Mcilveen added that weather posed a big challenge, with the Ontario area receiving lots of snowfall and temperatures routinely dropping as low as -20 degrees Celsius (-4 degrees Fahrenheit). “I had to determine how much power the system would need, estimating downtime for winter weather, and snow on solar panels. I visited the site every few days to remove snow from the panels,” said Mr. Mcilveen, “The Hikvision PTZ cameras are weatherproof and functioned perfectly in temperatures down to -30 degrees Celsius.” Hikvision PTZ cameras offer the best details to get results, because they can be adjusted and zoom in with astonishing detail. The OGSP installation provided 360-degree, panoramic surveillance that doubled as a theft deterrent, while giving the dealership the flexibility to zoom in for further detail, scan recorded video for footage, and check in remotely from Hikvision’s iVMS app via a smartphone or tablet. The system can also be live monitored by central stations 24/7 if required, trespassers can be requested to leave via active bullhorns, and police dispatch can be immediate.

Conclusion

Hikvision technology offers cost effective solutions that deliver the best image and video quality on the market. The diverse features and quality of the cameras is unmatched,” concluded Mr. Harris. 55


application/ case study

CP PLUS Secures Central Coalfields of Coal India Limited C

entral Coalfields Limited (CCL) is a subsidiary of Coal India Limited (CIL) which is the largest coal producer in the world. It is a Miniratna company with its coalfields located in Ramgarh district of Jharkhand. With a revenue of US$13 million (FY 2014-15), Coal India Limited (CIL) contributes about 84% of the coal production in India, and is owned and controlled by the Ministry of Coal, India. Subsidiaries of CIL include Eastern Coalfields Limited (ECL), Bharat Coking Coal Limited (BCCL), Central Coalfields Limited (CCL), Western Coalfields Limited (WCL), South Eastern Coalfields Limited (SECL), Northern Coalfields Limited (NCL), and Mahanadi Coalfields Limited (MCL). CP PLUS was tasked for securing the Central Coalfields Limited. Coalfields usually run into kilometers and monitoring such vast stretches of land physically is hardly effective. In the case of Central Coalfields Limited, besides monitoring the vast expanse of fields, theft of coal from heaps and railway sidings that were collected just after mining, trespassing/ intrusion of unauthorized persons at the site, vigilance at the time of dispatch of sidings,

From the control room

56

Tower erection for CCTV installation

and monitoring of workers were also huge challenges.

Solution

T

he CCL management was clear about what they expected from the CCTV system. Besides round the clock vigilance within the premises, they required full optimization of cameras with a recording of 24 hours since the coalfields were in use 24/7, and video analytics for when there was no manned monitoring. After careful evaluation of the premise and consideration of the needs and requirements, a complete solution was designed. This included a combination of CP PLUS 2MP motorized zoom and PTZ (pan-tilt-zoom) cameras complete with CP PLUS NVRs for 24 hour recording, and advanced edge analytics such as intrusion detection, trip wire, and motion detection integrated with audio and alarm systems. Furthermore, it was ensured that the solution provided is scalable and can be easily upgraded as and when required. The region being a reSecurityLink India ■ October 2018

mote area of Jharkhand, system integrators faced resistance from the locals as well. However, with the assistance and support of the CCL authorities and the CISF personnel arranged by them, the installation was successfully completed.

Impact

T

he project was successfully implemented as per the client’s requirement. The solution provides the administration with a ready access to all sections of expanse at a click of the mouse. It also enhanced the overall safety and operational efficiency. The authorities were very satisfied with the results. They are now able to monitor the entire premise from one location, and send officials to inspect only when they would find something suspicious. Further, with the integrated advanced edge analytics, they are able to keep a vigil on the premise even when there is no one to monitor at the main station. “As an SI we feel privileged that Coal India Ltd. chose us to serve them and that we were able to meet their requirements and provide them satisfaction,” said Vasu Garg, GM, Smart Monitoring Innovations Private Limited.


application/ case study

Helps Create an Integrated Mobile Experience and

Enhances Security at New Skanska Office Complex in Warsaw

S

kanska, one of the world’s leading project development and construction groups with operations in Europe and North America selected and incorporated HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos®, HID Mobile Access® improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixedtenant space, it was crucial to restrict access to secure areas from unauthorized visitors. The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. Both Spark building employees and

their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android™ devices to an iCLASS SE® reader using NearField Communications (NFC) or Bluetooth Low Energy (BLE), and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloudbased portal. “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications such as parking, virtual reception and other Internet of Things functionality, bringSecurityLink India ■ October 2018

ing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control, HID Global, “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organizations are leveraging the power of mobile credentials and the cloud to realize the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.” 57


application/ case study

Intelligent Video Recording and Management Solution For Passenger Rail and Bus Fleets in Europe arch Networks®, a global provider of intelligent video solutions, has recently introduced its leading transit video recording and management offering to the European passenger rail and bus fleet markets. The end-to-end

M

solution helps transit agencies improve security and incident investigation using integrated high-definition (HD) surveillance video coupled with advanced vehicle metadata searching. It dramatically reduces the time required to prepare and defend cases, and is currently deployed in more than 33,000 trains, subways and buses, as well as hundreds of wayside locations, across North America. The solution starts with purposebuilt March Networks RideSafe™ RT series IP recorders for passenger rail cars, and RideSafe MT series IP recorders for buses. The RideSafe RT series recorders are available in two 20-channel models, including one with eight Power-overEthernet (PoE) ports for rail cars requiring integrated camera power. The compact RideSafe MT series recorders for buses include 4, 6 and 8-channel mod58

els and support PoE. All of the recorders capture sharp megapixel video at a full 25/ 30fps per channel, and support automated video downloading over WiFi, GSM, LTE, 4G and 5G wireless networks to save operators time and keep vehicles in service longer. The RideSafe video recorders complement March Networks’ complete video offering for mobile and wayside applications, which also includes ruggedized mobile IP cameras, user-friendly Command for Transit client software, and IP and hybrid video recorders for use in stations, park-and-rides and other transit facilities. All of the products integrate seamlessly and can be centrally managed with powerful March Networks Command™ Enterprise video management software.

Incident search

C

ontinuing March Networks’ commitment to video solutions that enable better operational intelligence and risk mitigation, the RideSafe recording platform delivers innovative search and investigation capabilities through integration with leading vehicle systems including global positioning systems (GPS), train control and management systems (TCMS), passenger information systems (PIS), computer aided dispatch (CAD), and automated vehicle location (AVL). Virtually any video and data evidence captured by the March Networks system can be a selection point for investigation. The integrated video and data enaSecurityLink India ■ October 2018

bles operators to search for recorded events such as emergency brake activation, speed, location and driver-tagged incidents, and review these incidents along with the associated video. It allows transit operators to investigate complaints, liability claims and other events quickly and cost-effectively, and resolve disputes with the help of compelling video evidence. Operators can also use the investigation tool to proactively identify and address potential issues such as a malfunctioning door before an incident occurs.

High reliability

I

n addition, the RideSafe video platform is engineered for reliable operation in demanding transit environments, incorporating features such as an embedded Linux OS, solid state drives, front panel diagnostic LEDs, and real-time system health monitoring. It is also compliant with multiple environmental, electromagnetic (EMC), shock/ vibration and fire safety regulatory standards including EN50155, E-Mark, CE and EN45545. “March Networks has spent more than a decade designing and delivering high performance, highly reliable video systems to some of the world’s largest rail and transit operators,” said Matt Leyes, March Networks’ Vice President of European Sales, “We are already seeing early success with this expanded transit portfolio for Europe, and we look forward to demonstrating the advanced integration, investigation and reliability features so critical to today’s fleet management.”


application/ case study

Bosch Secure Truck Parking Creates Space for Trucks New Parking Facilities in the Port of Hamburg

T

he solution is intended to increase the efficiency of port logistics by connecting the Bosch platform to the slot booking procedure of the Hamburg container terminal. In future, instead of clogging up the streets, trucks that are waiting for customs clearance at the terminals can park at Cruise Gate. In this way, the parking facilities available in the port will be increased in an intelligent way. The parking area is access-restricted and video-monitored, and provides drivers with an impressive panorama of the Port of Hamburg. Sanitary facilities are also available.

Intelligent use of existing parking spaces

B

osch Secure Truck Parking at the ‘Cruise Center Steinwerder’ cruise terminal relieves traffic on Hafenstraße and preserves resources. Jan-Philipp Weers, Head of Bosch Secure Truck Parking, commented, “Together with Cruise Gate Hamburg and Logistik-Initiative Hamburg, we are creating the conditions for economical and environmentally-friendly parking management to work. The existing parking space is used efficiently. The parking space search is no longer necessary due to the Internet reservation. This reduces emissions, prevents random parking and makes truckers’ lives less stressful. We are very proud to be making an important contribu-

tion to road safety here in Hamburg.” Sacha Rougier, Managing Director of Cruise Gate Hamburg, describes the new service, “Cruise Gate Hamburg is continuously searching for solutions to optimally utilize the parking spaces, also on days when no cruise ships are docked. We are delighted that we have found a partner in Bosch Secure Truck Parking with which we can improve the difficult parking situation for truckers in the port area and surrounding truck stops. The fact that you can reliably make a booking and the high standards of security are a big plus for truck drivers.” Hans Stapelfeldt, ITS Network Manager at Logistik-Initiative Hamburg, also believes that the future collaboration will be of great benefit. He said, “I am delighted that no green SecurityLink India ■ October 2018

areas have to be sealed over to create new parking facilities; existing areas, which otherwise remain unused on days when there are no cruise ship dockings, are being used in an intelligent way.”

Smarter parking: faster, easier and secure

A

round 14,000 more parking spaces are needed for trucks in Germany. The shortage often has farreaching consequences: accidents, increased fuel consumption and cargo theft. To make truck parking faster, easier and secure, Bosch provides a service that allows truckers to reserve parking spaces at truck stops and company premises throughout Europe. 59


application/ case study

Safeguarding the Leopard’s Den T

he Locarno Festival, formerly known as the Locarno International Film Festival, is the most important film festival in Switzerland and one of the most renowned in Europe. For 70 years Swiss and international directors have been competing for the festival’s coveted Golden Leopard trophy. The festival’s new headquarters, the PalaCinema, were inaugurated in 2017 to mark the event’s 70th anniversary. The prestigious building is equipped with state-of-the-art fire alarm and intrusion detection systems from Securiton. Each August, the Locarno Festival attracts more than 170,000 spectators, 1000 journalists and 3000 industry representatives. For eleven days, Locarno becomes the world capital of art-house cinema, films in which the director, by also largely determining all the other artistic aspects of the production such as screenplay and editing, is regarded as the author of the film. Hundreds of

60

films are shown in retrospectives and in the competition for the Golden Leopard. Several open-air film screenings take place in the Piazza Grande in front of 8000 spectators a time.

PalaCinema – the new headquarters

T

he film festival was able to inaugurate its new, prestigious headquarters in the Palazzo del Cinema (PalaCinema for short) late last summer. The converted former school building houses three cinemas – one seating 500 seats, the other two seating 150 each. It also contains multi-purpose rooms, a café, administrative offices for the festival management, the festival archive, offices for Cinémathèque Suisse (the country’s national film archive) and journalists, and much more. The premises are used all year round for dance and theatre performances, congresses and other events.

SecurityLink India ■ October 2018

Comprehensive safety and security

S

ecuriton AG was commissioned to install a comprehensive safety and security solution. The entire building is protected by a SecuriFire 3000 fire alarm system, which is equipped with hundreds of MCD 573x multi criteria (smoke and heat) detectors. The particularly large rooms – the three cinemas and the entrance hall – are watched over by precise and reliable SecuriRAS ASD 535 aspirating smoke detectors. To keep uninvited visitors out of the building, the entrances and passageways are monitored using the SecuriSafe 2000 intruder alarm system and 13 video cameras, whose images feed the IPS Video Manager system. In the event of an emergency, the 67 loudspeakers of the voice alarm system from g+m Elektronik, also part of the Securitas Group, ensure that everyone leaves the building quickly and safely.


application/ case study

DISPLAY NEW PRODUCTS, SERVICES AND LATEST TECHNOLOGIES IN THE FIELD OF

FIRE SAFETY & SECURITY

For Exhibiting and more information please contact : Jay Sheth: jay.sheth@nm-india.com / +91 9967971606 I Eshita Sharma / mumbaichapter@fsai.in / +91 9818805922 Supported By

Official Publication

Media Partners

SecurityLink India â– October 2018

61


application/ case study

Strandudden Gated Community A video surveillance solution manufactured by Hanwha Techwin has been chosen to help create a secure environment for the residents of Sweden’s first gated community

L

ocated in the middle of the deep forests of Småland in the south of Sweden, the Strandudden Gated Community has been designed to provide a safe environment for homeowners who wish to enjoy a high quality of life. The first phase of the development has seen the construction of 18 apartments which have stunning lake views. The materials and features of each apartment have been carefully selected to ensure sustainable energy consumption.

Wisenet cameras

W

hen the development is completed, over 100 Wisenet cameras manufactured by Hanwha Techwin, will enable security personnel to closely monitor the movements of people and vehicles as they enter and move around the public areas of the gated community. 6 Wisenet cameras were initially installed during the construction of the apartments. These have been used to ensure strict compliance with the site’s health & safety regulations, and to keep a close eye on valuable plant and machinery. “We evaluated products from a number of different manufacturers, but the superb quality of the images captured by the Wisenet cameras made it a very easy decision for us to rec62

ommend that they should be deployed throughout the Community,” said a representative of Elajo, one of Sweden’s leading electrical, mechanical, engineering and energy installation companies who were awarded the contract to manage the project, “Equally important, the massive processing power of the chipsets of the open platform cameras means that our client is able to run specialist applications such as licence plate recognition (ANPR), in order to control vehicle access to the Community.”

Camera selection

T

he Hanwha Techwin Europe presales and technical teams have worked closely with Elajo to ensure the best camera types have been specified for each of the carefully chosen camera

locations. 6 different Wisenet models have been selected to ensure high quality images can be captured day or night and that there are no blind spots. Among these is the Wisenet IP network PNP9200RH 4K PTZ dome which has builtin IR illumination. The PNP-9200RH, which is IP66 and IK10 rated for vandal-resistance and outdoor use in the harshest environments, utilises progressive scan technology to provide sharp edges on moving subjects and vehicles. The PNP-9200RHs which have been installed at the entrance to the community are equipped with the Wisenet group ANPR solution which provides the opportunity to automatically control the movement of white listed cars through barriers via camera relay outputs. Developed by Hanwha Techwin in partnership with analytics experts, FF Group, the solution uses camera-tocamera IP communication technology to enable up to 4 Wisenet group ANPR cameras to work together, with data from each simultaneously transmitted to a single web based display.

Wisenet WAVE

I

mages from all 100 cameras will be displayed in the community’s control room via Wisenet WAVE video management SecurityLink India ■ October 2018


application/ case study

a virtual PTZ, which with just simple clicks of a mouse, enables operators to zoom in to see close up detail of any suspicious activity, whilst motion detection and video analytics support can be configured to generate alerts when user defined incidents occur.

Monitoring on the move

I

software (VMS). An intuitive ‘drag & drop’ tool makes it extremely easy for operators to set up a display of live and

recorded images on a single screen or video wall, with customisable layouts and sizes. Other key features include

n addition to the images being displayed in the community’s control room, should an incident occur that needs a rapid response, security personnel on patrol will be able to remotely view any activity via a smartphone or tablet with the help of the secure Wisenet Mobile App.

Provides Advanced CT Explosives Detection Systems To Indianapolis International Airport

S

miths Detection has won a competitive bid from the Transportation Security Administration (TSA) to supply their CTX 9800 explosives detection system to Indianapolis International Airport. The new CTX 9800 systems are the latest generation of CT scanners, helping to advance Indianapolis International’s security screening capabilities. The CTX 9800 is a computed tomography (CT) explosives detection system. It has customized networking solutions, an intuitive user interface, efficient power consumption, and high-resolution 3D imaging capabilities. Certified by several regulatory authorities including the TSA, the CTX 9800 is also approved by the European Civil Aviation Conference as meeting Standard 3 requirements. Shan Hood, President of Smiths Detection Inc. said, “Smiths Detection is committed to providing the latest in detection technology, helping airports, like Indianapolis, to take advantage of cutting-edge solutions which enhance the passenger experience. The TSA’s selection of the CTX 9800 system for Indianapolis International Airport is a testament to Smiths Detection’s position as a global leader in the use of computed tomography, and our long history of partnering with airports and authorities to help keep the traveling public moving safely and efficiently.” SecurityLink India ■ October 2018

63


application/ case study

Powerful Security Camera Delivers Non-Security Benefits Charleston’s Coastal Conservation League Uses Vicon Camera to bring Wildlife up Close

V

icon SN673V-B Cruiser PTZ camera with 20x optical zoom and 1080p HD video has been deployed in Charleston Harbor, South Carolina, as part of the Coastal Conservation League’s novel project, ‘The Pelicam.’ The Pelicam is a weather-resistant Vicon camera, mounted on a pole along with solar panels, battery back-up and a wireless transmission system, on an isolated strip of land within the harbor. Wray Lemke, Founder and Vice President of electronic and security services company Mount Pleasant Radio, volunteered his time to bring this project to fruition. The Pelicam’s location is a popular spot for pelicans and other shore birds to build nests and raise their young because it is inaccessible to raccoons, coy-

64

otes and other natural predators. The Vicon camera’s 20x optical zoom provides closeup video of the birds, allowing biologist from the department of natural resources (DNR) and the public to witness behaviors that would not normally be observable by humans. The Conservation League makes use of the camera’s presets to quickly change between scenes, live-streaming on YouTube video of the most interesting wildlife on display at any given time. Video recorded to the camera’s local SD card is available for DNR biologists to review and study. Andy Hollis, Data and GIS Analyst for the Conservation League said, “The quality of the new camera is great. It pans and zooms exactly as it should and its high magnification gets us in really close.” In addition to supporting the research needs of the DNR, the Pelicam is hugely popular SecurityLink India ■ October 2018

within the community, garnering regular coverage in the local media and receiving more web traffic than any other page within the organization’s website. Mr. Hollis explained, “As an advocacy organization working with local and state level government to enact programs and laws to support conservation, the Pelicam is one of the most highly effective tools we have for building public awareness and enthusiasm for our mission.”


application/ case study

Secures Gilbert Christian Schools Modernizes Access Control and Streamlines Security Operations

L

ocated in the Phoenix suburb of Gilbert, Ariz., Gilbert Christian Schools operates three private school campuses for students ranging in age from pre-kindergarten through high school. The district, which consists of the PK-8 Agritopia Campus, PK-8 Greenfield Campus and a high school campus, is home to more than 1,000 students and nearly 200 staff members. About two years ago, just prior to constructing its Greenfield Campus that opened last fall, Gilbert officials decided it was time to bolster their access control system district wide and began soliciting bids for a solution that could not only streamline security across the campuses but also provide a more modern level of convenience. According to Barry Klontz, IT Manager, Gilbert Christian Schools, the district’s Agritopia and high school campuses were already in operation for a number of years and many of their existing systems had begun to reach the end of their lifecycle. Ultimately, school officials opted to adopt a facial recognition solution they hoped would both improve security and reduce their reliance on physical credentials alone. However, they soon realized that the biometric system by itself would not satisfy their security needs.

The challenge

L

ooking for someone who could provide them with the backend infrastructure necessary to run their stateof-the-art system as well as some of the

more advanced features they desired, the district turned to local systems integrator 365 Technologies who recommended the Vanderbilt SMS access control platform.

The solution

T

hough SMS was initially integrated with the facial recognition solution at the Greenfield Campus, Freddie Haber, President, 365 Technologies said that the school recently decided to do away with the biometric aspect of the system after realizing that Vanderbilt was meeting all of their access needs. The SMS platform has subsequently been deployed at the Agritopia and high school campuses as well, enabling the district to streamline its security operations, such as being able to initiate a district-wide lockdown in an instant. Haber said that both ‘soft’ and ‘hard’ buttons have been installed throughout all three schools which give staff the ability to put the district into lockdown and alert administrators of potential security threats. On the Greenfield Campus, 365 Technologies also integrated a panic alarm with SMS that provides every teacher with a serial numbered button that can give school officials immediate information about who initiated the alert and where an event is taking place in the facility. “The other schools have a wireless button, and if you hit it, the school goes into lockdown, but you really don’t know where that lockdown came from,” Haber explained. “At the new school, if teacher John Doe in room 120, for arguSecurityLink India ■ October 2018

ment’s sake, hits this button, then it will tell us that person so we know where the threat is.” Klontz, who is responsible for managing the system on a day-to-day basis, also said that SMS has given them the ability to set up varying access privileges for different individuals based on time-based restrictions and other variables, which is something they couldn’t do previously. “On the high school campus we’ve given out staff ID badges for pretty much anyone who needs access – everyone from hired staff to coaches who come in on a volunteer basis and we have different time zones (of access) for all of those different types of people,” Klontz said. And while the schools don’t provide credentials to students, Klontz said they do issue four-digit PIN numbers to the parents of children enrolled at the older Agritopia Campus, thereby providing an additional layer of security that people demand in K-12 environments today. Although the facial recognition aspect of the project didn’t work as planned, Haber said they are looking into the possibility of leveraging another biometric system, such as fingerprint, retina or iris scan, with Vanderbilt on the back end in order to provide that “wow” factor for the district moving forward. Aside from ripping and replacing some of the hardware at the two older campuses and getting the new system up and running, both Klontz and Haber said the technical challenges on the project have been minimal. 65


application/ case study

NEC Biometrics Contribute to Security at the 18th Asian Games Reinforced safety with facial recognition and behavior detection systems

N

EC Corporation has provided information and communications technology (ICT) systems for the 18th Asian Games, including a facial recognition system and a behavior detection system, as a supporting sponsor in the category of ICT security. The Asian Games are an international multi-sport event for athletes from across Asia that are held once every four years. This year’s event was held in Jakarta and Palembang in the Republic of Indonesia from August 18 to September 2. NEC offered a facial recognition system utilizing ‘NeoFace,’ NEC’s flagship facial recognition artificial intelligence (AI) engine, featuring the world’s highest recognition precision, and a behavior detection system to the Gelora Bung Karno Stadium in Jakarta, the main stadium of this event. These systems identify suspicious persons, who have been registered in advance, from surveillance camera video as well as detect intrusions to restricted areas and suspicious objects. Systems were provided as part of the official development assistance (ODA) from the Japanese Government to the Indonesian Government. This project was implemented with support from the Ministry of Public Works and Housing of the Republic of Indonesia, which was in charge of infrastructure development projects for the 18th Asian Games, making the Gelora Bung Karno Stadium ideal for 66

hosting international mega events which require enhanced safety and security. In addition, NEC provided a network system that was fundamental to successfully managing the event. This system connected a total of 130 locations including associated offices of the Indonesia Asian Games 2018 Organizing Committee (INASGOC) and all competition venues. NEC also supported system operations during the event. Moreover, NEC provided surveillance cameras, network systems, and

SecurityLink India ■ October 2018

telephone exchanges for competition venues including the athletics stadium, basketball gymnasium, baseball stadium, softball stadium and tennis courts in Jakarta. “NEC is proud to have contributed to the safe, secure and efficient management of the Asian Games,” said Ichiro Kurihara, President Director, PT. NEC Indonesia, “Going forward, NEC will continue to globally provide sophisticated solutions in support of the ‘NEC Safer Cites’ program, including facial recognition systems and behavior detection systems. We aim to take advantage of these experiences with the Asian Games 2018 in order to promote smart city initiatives centered on essential infrastructure that contributes to safe and secure community development through digital transformation.”


#VizagFintechFestival application/ case study

AP: Gateway To

India’s Digital Transformation Vizag Fintech Festival will witness a congregation of India's economic community to discuss industry trends, market insights and challenges including the Indian regulatory framework along with Global Fintech Ecosystem.

Special Keynotes

Sri. N. Chandrababu Naidu

Sri. Nara Lokesh

Sophia

Hon’ble Chief Minister of Andhra Pradesh

Hon'ble Minister for ITE&C, Government of Andhra Pradesh

World's First Humanoid Citizen

Exclusive discount for the readers

Use Code <<VFFDD2010>> to avail 20% on delegate tickets

Discussion On Trending Topics

Discount

YOUR BOOK T NOW E TICK

India and Its First Humanoid Citizen

Making Dollar Sense In Fintech Is Innovation Impacting Risk Management?

Visit the website to explore the complete conference agenda & speakers line-up SecurityLink India ■ October 2018 www.vizagfintechfestival.com

67


white paper

Make Your Network Edge Intelligent and Meet Tomorrow’s Needs Today I

n the new digital business reality, the network edge has at the edge. Cisco delivers solutions and strategic functionalnever been more important. Often overlooked, the network ity to achieve business success. We deliver a new network edge is the cornerstone that determines whether digital sucarchitecture that starts with the end user and continues to cess is realized or lost. where applications are hosted, with a focus on: Today the network is critical in enabling change in virtu●● Enabling faster innovation through better experiences ally all organizations as they take their digital transformation and highly granular insights across users, devices, apjourney. This journey will help organizations innovate faster, plications and threats. reduce cost and complexity, and lower risk. It translates into ●● Lowering cost and complexity to simply establish policy the ability to increase agility, improve employee productivand manage change at scale while reducing hardware Make Your Network Edge Intelligent and across Meet wired, Tomorrow’s Today ity, better engage with customers, and protect key intellectual and software churn wireless,Needs and WAN. White Paper property and assets. ●● Reducing risk with complete threat visibility and protecCisco Public The network edge is sometimes deployed with the belief tion for internal and external risks across wired, wireless, that all network solutions are essentially the same. This isn’t and WAN. true, because new digital business requires vast intelligence The network edge has a pivotal role to play in this trans-

Figure 1.

Network Layers and Their Functions

Figure 1: Network Layers and Their Functions

Branch Edge Secure and validate user access | Mobile and IoT endpoint recognition | Deliver data via applications to end user device | Segmentation | Provide user, device, location and threat analytics | Quickly deploy new branches | Prioritize application and user data | Make performance vs. cost WAN decisions | Virtualize network functions | Cache commonly used applications | Threat containment

Campus Edge Secure and validate user access | Mobile and IoT endpoint recognition | Deliver data via applications to end user device | Segmentation | Provide user, device, location and threat analytics | Quickly scale up or down | Prioritize application and user data | Support/power non-user or IoT devices | Threat containment

Core Quickly move application and user traffic to and from the edge and cloud/data center

Data Center Optimize compute power | Quickly deploy apps. | Deliver consistent connectivity | Automate processes 68

SecurityLink India ■ October 2018

• It’s the conduit that delivers heavily invested

Data about users, applications, devices, and


white paper

formation and carries perhaps the broadest set of responsibilities when compared to the core and to data center networks. As shown in Figure 1, when comparing the various layers of the network, the network edge has a broad responsibility in the campus. This is also true for the branch.

The Role of the Network Edge

D

igital transformation makes the network edge more important than ever before. Consider everything that happens at the edge of the network:

It’s the first line of defense

T

he edge is where policy is applied and validated, without limiting your ability to access the things you need. If access is not properly managed, then your business can be susceptible to infiltration or threat proliferation, and the criticality grows as the threat landscape increases. The device, firmware, and even the operating system are all points of compromise.

It’s the conduit that delivers heavily invested applications

T

he network edge is where prioritization occurs. A poor experience at the edge will slow application adoption, reducing return on investment.

It’s a strategic gateway to the widely distributed organizations to connect

P

roviding a seamless experience to your employees, partners, and customers – wherever they happen to be – is most important. A second-class network will deliver deviating levels of services to key audiences.

It is the bridge between the organization and their customers

I

f you’re a part of a retail or hospitality business, subpar access will stunt your ability to connect with customers on a personal level and negatively impact your brand.

It is built to power and support growing IoT device demands

T

he network edge adapts the physical environment by moving virtually all industries into the digital age by improving operations and lowering costs. Without the right functionality at the edge, organizations can be left behind in terms of cost reduction and operational efficiencies.

It is the optimal place to understand what is happening with the business

I

n a distributed network, only the edge sees all the data traffic, by harvesting data and analytics from the edge. Data about users, applications, devices, and threats businesses can derive insights that truly help in making better decisions to support employees, reduce risk and cost, and deliver information to the targeted audience. Without the right level of consistent granularity, this data becomes skewed and untrusted.

Is Commoditization of the Edge a Good Thing?

M

any organizations are being tasked with becoming digital-first to deliver faster innovation, better experience, and higher security. However, refreshing the network to meet these demands is a daunting task because the network foundation established today will need to support the business in the coming years. Choosing a networking vendor is a critical decision that will dictate whether you keep innovating and saying yes to the business or slow down while struggling with poor capabilities. With digital transformation, no one really knows what the future holds, but one thing is clear – the demand on your network will grow exponentially. Whether it’s IoT, the cloud, sophisticated security threats, or even augmented reality, digital transformation will change how you operate and serve the business. What is good enough today, will not be acceptable in the near future – and it all starts with the network. You have to innovate faster, reduce cost and complexity, and control risk. Organizations that are truly digital ready know that as they drive toward these changes they can’t compromise on what matters.

What is the Risk?

B

eing ready for the digital-first world is not about addressing a single place in the network. It is about starting at the network access edge and using common functionality in the core and the WAN with a digital-ready architectural approach. Why is this broad approach so critical? It’s because today’s digital-first world moves faster and pivots quicker, which means you and your network need to be ready. Organizations that are ready for the digital world don’t take unnecessary risk by compromising on what matters. They know that:

SecurityLink India ■ October 2018

69


white paper

It takes only one bad experience to render your latest innovation useless

I

nside your business, it’s all about innovation. But at the edge, where your apps meet the real world and where new IoT devices will drive fundamental business change, inconsistent connectivity and slow performance could turn off users for good. This affects device performance and cuts off the insights you need to stay competitive. With Cisco, insight is in your DNA – not only insight into the network that improves performance, but also real-time consumer insights that create more personalized experiences.

ple. Cisco DNA is focused on protecting, simplifying, and enabling the business, end to end. Only Cisco can deliver this because Cisco DNA is the only solution that allows you to:

Provide better experiences and gain highly granular insights across users, devices, applications and threats

B

Y

eing digital ready means delivering the right experience to empower employees, engage customers, and deliver valuable insight to optimize the user experience, develop new revenue streams, and control costs. The high-availability infrastructure identifies changes and automatically adapts to support increased capacity. As the only strategic network partner with Apple, Cisco allows organizations to deliver up to a 20 percent increase in audio quality, up to a 90 percent reduction in web browser failures, and up to an 86% reduction in network message load from iOS devices during roaming. Industry-leading location accuracy up to 1 meter and the ability to use real-time NetFlow data gives a concise understanding of user interaction and threat impact. This provides a real-world depiction of what is truly happening in your environment.

It takes only one incident to become everyone’s problem

Simply establish policy and manage change at scale while reducing hardware and software churn across wired, wireless and WAN

It takes only one ‘no’ to ruin your reputation our world is moving fast, and if you can’t keep up you will be discarded, essentially making you a fourth utility. Adding to this complexity is that resources and budgets are slim. Configuring and reconfiguring your network branch by branch and device by device can turn a ‘simple’ update into a TCO sinkhole. With Cisco, automation is in your DNA. This allows you to automate and manage your entire network – wired or wireless at your campus, through the WAN, and in your branches – as a single entity from a single place.

W

e don’t need to tell you what network downtime costs. Nor do we need to talk about how cybersecurity plays an important role in ensuring uptime by keeping malware from threatening your network services. So why would you buy networking infrastructure that doesn’t control access, prevent attacks, and detect and contain breaches? How can you trust a company with building your foundational network when it is unable to make that network secure? With Cisco, you can turn your network into a sensor of threats and enforcer of security policy, at the branch and HQ, wired and wireless. Don’t leave security to the other guys.

Cisco Delivers Intelligence at the Edge igital-ready organizations build on the Cisco® digital network architecture (DNA) that delivers innovation and intelligence everywhere in the network. Why? It is sim-

D 70

T

he ability to manage all network domains as a single network fabric from a centralized location speeds up the time to adapt the network and optimize the user experience, with organizations achieving a 79 percent reduction in deployment costs. An open and programmable infrastructure that delivers APIs across the LAN, WLAN and WAN and within other strategic data stores allows you to collect, develop, and deploy new applications and control mechanisms on their own. A wide community of developers exists to learn from and co-create with to gain the benefit of best practices and Cisco guidance to meet any use case. Completive solutions are able to manage one or two network domains such as wired and wireless, but do not deliver end-to-end centralized management. Competitive solutions that just use APIs do not have the tight community and expertise that Cisco delivers.

SecurityLink India ■ October 2018


white paper

Complete threat visibility and protection for internal and external risks across wired, wireless and WAN

Gain always-on, always-ready reliability at the network, access, and end-device level for zero user impact

T

C

he network acts as a sensor and an enforcer by validating traffic against policy at every network hop. This ability allows the network to identify and remediate potential threats quickly, reduce risk, and uphold compliance. In turn, organizations avoid 99.2 percent of threats and adapt their network to new threats 98 percent faster than with traditional methods. They also achieve a 140 percent return on investment. Other solutions look for threats only at the access layer and use information from known malware. This means modern malware can infiltrate the network disguised as normal traffic and then conduct malicious activity from the interior of the network. The organization is left to puzzle information from disparate sampled data to try to identify where impact occurs so they can remedy it. Digital organizations are also breaking down silos, knowing that the production network and data center need to work in unison to deliver better user, device, and application experiences. Cisco DNA is focused on analyzing, simplifying, automating, and protecting the business by delivering innovation and intelligence from where the users begin to where the applications end.

Provide Better Experiences and Gain Highly Granular Insights

T

he network edge is the point at which employees are empowered, customers are engaged, and IoT devices are enabled, and it is a source of valuable insights.

Provide the very best user experience for iPhone and iPad on a corporate network

W

ith new features in iOS 10 combined with the latest networking software and hardware from Cisco, businesses everywhere can take full advantage of their infrastructure to deliver a great user experience for apps, calling and collaboration. Cisco and Apple have joined together on development efforts to deliver the best wireless connection for your mobile employees and to offer an easy way for IT to prioritize the apps that matter most to business when using iOS devices on a Cisco network. No other vendors in the industry are providing this level of interoperability.

isco solutions deliver networks with multitiered resilience to deliver confidence that the network is there when it is needed, and that you and IoT devices are powered and working for your business.

Automatically adapt the Wi-Fi network when and where it is needed

D

eliver a constant high quality experience with wireless innovations that go beyond the wireless standard. Cisco networks improve the capabilities of legacy and the latest mobile devices, remove interference, and adapt capacity to meet varying demands.

Better support IoT devices with failsafe power to assure availability and improve performance

C

isco networks have failsafe power built into the switches that IoT devices connect to, coupled with fog computing that provides the ability to automatically decide the optimal place to process data from IoT devices . Cisco networks are prepared for the new connected world. The difference between being business relevant and being just another utility is dependent on how well the user experience is delivered, and on data accuracy. Enterprises can expect a higher reliability for real-time apps, with up to a 20 percent increase in audio quality for Wi-Fi calling, a 50 percent reduction in network management overhead due to fewer service set identifiers (SSIDs), and enhanced performance with up to an 86 percent reduction in network message load from iOS devices, while roaming end users can benefit from longer battery life, when using iOS devices on a Cisco network.

Gain a realistic view of users, devices, applications and threats with up to 1-meter accuracy

C

isco provides industry-leading location-based data granularity to better understand how users interact with the environment to make better business decisions. Business-to-consumer (B2C) organizations such as retail, hospitality and education have been able to achieve less than 1-meter location accuracy with Wi-Fi plus bluetooth low energy (BLE), and produce direct revenue increases.

SecurityLink India â– October 2018

71


white paper

Some examples include a 20 percent increase in non-room revenue by Hyatt Regency, a threefold increase in customer dwell time, and an 80 percent improvement in user experience at the Starry Bowar mall – all while delivering personalized mobile experiences.

tionality when it becomes available without performance impact.

Achieve simple license management and portability for infrastructure upgrades

T

Simply Establish Policy and Manage Change at Scale

O

rganizations struggle to get away from the costly and the time-consuming act of constantly reconfiguring and adapting the network device by device to meet the everincreasing demands of the business. Cisco provides a way to simply manage the network, whether it is one or many sites. The digital business requires the network to be more agile, which means the network needs to automate processes and new services with day-zero and day-one capabilities, and remove the need for manual intervention. This capability enables the digital business to deploy and maintain a network suitable for today’s quickly evolving landscape.

ake advantage of new capabilities important to your business without going through the time consuming process of license management. Transfer existing software licenses to new hardware when upgrading infrastructure.

Expand functionality by using your existing wireless access point footprint and power to meet new use cases

A

dd new functionality via modules to existing access points to add new industry standard functionality or functionality from third party ecosystem partners. Cisco is able to speed the deployment and reduce deployment costs by 79 percent by decoupling software from hardware and virtualizing the WAN edge.

Manage a single quality-of-service (QoS) policy and adapt based on performance across the network

Complete Threat Visibility and Protection for Internal and External Risk

C

he network edge is the number one point for unauthorized or hostile access, because it’s where users and devices are on-boarded within both the campus and the branch. It has to be trusted to identify and control what’s getting onto the network. It also needs to work in unison with security solutions in the core and branch to defend against the latest malware attacks With the Cisco identity services engine, Cisco TrustSec®, and Cisco StealthWatch, you can turn your network into a sensor and enforcer to improve protection and response time. Meaning you are able to avoid, identify, and remediate threats as they enter the network or, if they get past the initial access, as they proliferate through the network. Cisco DNA allows you to:

isco solutions use the same QoS policy across the LAN, WLAN, and WAN to provide better application handling from end to end. They can automatically prioritize key applications such as latency-sensitive voice and collaboration, based on usage and service ratings, with application visibility and control taking into account changes in the environment along with QoS definitions to make sure businesscritical applications receive a high priority.

Turn up new network segments and branches faster and at a lower cost with zero-touch deployment

T

he plug-and-play application of the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) reduces resource consumption and time needed to configure, deploy, and turn up new network branches and segments with zero-touch deployment for Cisco Enterprise Networks routers, switches and wireless controllers.

Add new software and hardware functionality without replacing equipment

C 72

isco networks allow organizations to use existing access points, controllers and switches to add new func-

T

Manage user and device access with software segmentation, not lots of static VPNs and SSIDs

A

ssure that employees, guests, contractors, temporary workers and customers have access to the things they need and not to information they don’t. This software-based user and device group approach offers greater scale and allows you to reduce configuration errors, add more devices

SecurityLink India ■ October 2018


white paper

faster, and properly classify users and devices better than with traditional manual approaches, resulting in the ability to make changes 98 percent faster.

Embed security everywhere to detect and contain threats at the access and within the network

V

alidate traffic at every network intersection in the access, core and branch. Even if the malware is introduced via a user device or an IoT device, or someone is purposely trying to steal data, a Cisco network infrastructure can identify where the threat exists and take action to stop or limit the impact.

Quickly analyze and remediate threat impact using real-time NetFlow data

G

o beyond conventional threat detection and harness the power of NetFlow. With it, you get advanced network visibility, analytics and protection. You see everything happening across your network. You can uncover attacks that bypass the perimeter and infiltrate your internal environment.

Use a global ecosystem to keep ahead of the latest threats throughout the entire network

K

eep updated on the latest threats to avoid or rapidly eliminate threats across the entire network from a single place, using threat data shared from around the globe, to stop attacks even if you cannot see them, promptly notify you of their existence, and close the door to prevent it from accessing data stores or other devices in the network.

Defending critical assets at the edge

O

rganizations can avert 100% of network breaches by using the network as both a sensor and an enforcer. This can be done while also delivering deeper insights to improve protection and achieve faster response. A recent Forrester research paper shows that Cisco TrustSec allows IT to implement changes 98 percent faster, lower cost by up to 80 percent, and deliver a return on investment of 140 percent.

Continued Innovation at the Network Edge

W

ith the expected explosion of connectivity bringing significant opportunity, companies are start-

ing to recognize that this transformation will require fundamental changes to their network infrastructure and the ability to manage and analyze the data. We are leading the way through this transformation by driving innovation in network infrastructure, management of infrastructure, and analytics to extract actionable insights from the data. Cisco aims to transform troubleshooting that is reactive to proactive, and reduce resolution time from days to minutes. We will do so by treating every device in the network as a sensor and a distributed data processing element. By getting data from devices in the edge, distributing processing closer to the source of the data, we can perform analytics at line speed to generate actionable insights through machine learning. With the largest installed base and custom ASIC solutions, Cisco is uniquely positioned to design hardware and software optimized for analytics. Harness the power of installed base. Wired and wireless combined in one network will mean that intelligence on the edge can help you troubleshoot problems, whether they happen at the edge or not, in seconds; and over time, correct potential problems even before they occur. This will help IT departments deliver on the service-level agreement (SLA) for the network and application performance required for the future.

Conclusion

W

ith so much depending on the network edge, the commoditization of the wired and wireless LAN and WAN introduces risk that could result in security breaches, loss of productivity and revenue, loss of opportunity, and lack of visibility. The Cisco network edge allows organizations to go beyond an off-the shelf, standard-bound approach, delivering high value intelligence at the edge to innovate faster, reduce cost and complexity and lower risk. This approach allows organization to: ●● Protect the business with a strong first line of defense. ●● Confidently deliver applications to target audiences. ●● Deliver a seamless experience to employees anywhere. ●● Engage with customers to drive new revenue streams. ●● Better manage IoT devices and optimize the physical environment. ●● Provide the optimal view as to what is truly happening in the business.

SecurityLink India ■ October 2018

73


International Updates

INTERPOL-Europol Conference Calls for Global Response to Cybercrime C

lectively. Only through a concerted globalized effort which maximizes our expertise and minimizes the gaps will we be the best prepared to tackle emerging cyberthreats.” He highlighted several recent activities including the INTERPOL digital security challenge where participants investigated a simulated cyberattack launched through an ‘Internet of Things’ connected device, and a working group meeting on the darknet and cryptocurrencies which identified emerging threats such as the rise of new forms of virtual currencies. Following the 2017 INTERPOL-Europol conference, the two organizations have made notable progress in addressing the key identified areas of ransomware, the criminal abuse of the darknet, and the implementation of a proactive approach to increase public awareness of online safety. In this respect, the two organizations have discussed the need for a strategy to combat the illegal darknet economy through information sharing, operational support, training and awareness raising. “2018 has seen greater law enforcement success in fighting cybercrime on a global basis and increased public awareness of the threat, but cybercriminals are becoming smarter and more targeted in their approach and presenting an ever-increasing threat,” said Steven Wilson, Head of the European Cybercrime Centre (EC3), “The annual INTERPOL-Europol Cybercrime Conference is an important event to bring

74

SecurityLink India ■ October 2018

yber experts from law enforcement, the private sector and academia recently gathered in Singapore to devise strategies for promoting the global cybersecurity agenda. With cybercriminals using increasingly sophisticated methods and technologies to carry out their illicit activities, the 6th INTERPOL-Europol Cybercrime Conference focused on the most pressing cyberthreats today and in the future, which include attacks against the financial and government sectors, the rise of ‘cybercrime as a service,’ denial of service (DNS) attacks, and business e-mail compromise scams. Under the theme of ‘Globalized efforts to tackle cybercrime,’ the three-day (18-20 September) conference looked at ways in which stakeholders from all sectors can combine their expertise to make the internet a more secure environment. Key areas of discussion included developing actionable cyberthreat intelligence, identifying cybercriminals through their online behaviour, defining the role of digital forensics, implementing national and regional legislations to tackle cybercrime, and crisis response planning. “The accelerated pace of technological innovation presents truly exciting opportunities. However, each new evolution also presents potential security gaps which cybercriminals are bound to probe,” said Tim Morris, Executive Director of Police Services, INTERPOL, “We must not only remain ahead of the technological curve, we must do so col-

together not just global law enforcement partners but thought leaders from industry and academia to ensure that there is a cross sector approach to tackling this threat.” Several high-level delegates attending the conference included the European Union (EU) Ambassador to Singapore, Barbara Plinkert. In recent months, the EU has been working towards implementing a new EU Cybersecurity Crisis Response Framework, allowing authorities to react quickly, operationally and in unison in the event of a major cross-border cyberattack. The EU Law Enforcement Emergency Response Protocol, the police contribution to the crisis management structure, was presented during the event in Singapore. The conference, which brought together 198 delegates from 50 countries, also provided an opportunity for Europol and INTERPOL to reconfirm their strong commitment to continue their collaboration in the fight against cybercrime, building on successful examples such as the Global Airline Action Days targeting individuals purchasing airline tickets with stolen or fake credit card details, and the No More Ransom initiative which provides free public access to tools for decrypting data locked by ransomware. The INTERPOL-Europol Cybercrime Conference is a joint initiative launched in 2013. Held annually, it is hosted in alternate years by Europol and INTERPOL.


International Updates

Over Half of Global Exports Come from Countries that Fail to Punish Foreign Bribery T

ransparency International has recently revealed most of the world’s biggest exporters are failing to punish corporations paying bribes overseas. The anti-corruption organisation has released the 2018 edition of its Exporting Corruption report, rating countries based on their enforcement against foreign bribery under the OECD Anti-Bribery Convention. The report finds that only 11 of the 44 jurisdictions rated conduct active or moderate enforcement against companies bribing abroad. These are Germany, Israel, Italy, Norway, Switzerland, the United Kingdom and the United States (active enforcement); and Australia, Brazil, Portugal and Sweden (moderate enforcement). Together, these countries are responsible for 30.8 per cent of world exports. Brazil and Israel have dramatically improved their ratings, up from little or no enforcement in 2015. Four countries, accounting for 6.7 per cent of world exports, have declining levels of enforcement – Austria, Canada, Finland and South Korea – with the biggest slide in Finland. For the first time, this year’s report evaluates China, the world’s largest exporter, as well as India, Singapore and Hong Kong, which are each responsible for more than two per cent of global exports but are not signatories to the OECD

Convention. They are, however, parties to the UN Convention against Corruption, which also calls for enforcement against foreign bribery. Transparency International urges them to join the OECD Anti-Bribery Convention. These four exporters, all non-signatories to the OECD Convention, are in the ‘Little or No Enforcement’ category. All together, the 33 countries in the ‘Limited’ and ‘Little or No Enforcement’ categories account for approximately 52 per cent of world exports. China alone contributes 10.8 per cent of the total. “It is unacceptable that so much of world trade is susceptible to consequence-free corruption,” said Delia Ferreira Rubio, Chair of Transparency International, “Governments have promised to implement and enforce laws against bribing foreign officials under the OECD and UN conventions. Yet many are not even investigating major cases of grand corruption, which involve state owned enterprises and senior politicians. These have an especially corrosive effect, and ultimately impact the ordinary citizens of the country the hardest.” The OECD Convention requires signatory countries to criminalise bribery of foreign public officials and introduce related measures. Transparency International examined the countries’ enforcement according to available data from the SecurityLink India ■ October 2018

past four years, relative to their share of global exports, and ranked them in four categories – ‘Active,’ ‘Moderate,’ ‘Limited,’ and ‘Little or No’ enforcement. The countries reviewed are responsible for more than 80 per cent of world exports. Gillian Dell, Author of the Report said, “Authorities not only need a strong legal framework for going after businesses that pay bribes abroad, but proper resources for the agencies responsible. In many countries, the courts, as well as investigators and prosecutors of cross-border corruption crimes, have inadequate means to do their job.” Besides stepping up enforcement efforts, Transparency International recommends that governments: ●● Improve accountability and deterrence, by publishing up-todate data and case information. ●● Facilitate cross-border investigations with improved mutual legal assistance to other countries. ●● Ensure even-handed, dissuasive sanctions by applying transparency, accountability and due process in settlements of foreign bribery cases. In addition, the OECD working group on bribery should make greater use of public announcements to name and shame countries that are not enforcing against foreign bribery, related money laundering offences and false accounting violations. 75


International Updates

GSX Leads the Way in Security Innovation, Attracting 20,000 Global Registrants C

utting-edge technology, over 350 immersive and experiential education sessions, thousands of innovative security products and services, and countless quality and lead-generating networking opportunities attracted 20,000 registered attendees and 550 exhibitors from more than 113 countries under one roof at the newly rebranded Global Security Exchange (GSX). With more than 15 percent growth in paid registration, ASIS International, one of the world’s largest associations for security management professionals, hosted their 64th annual conference during September 23-27, 2018 in Las Vegas in partnership with InfraGard, ISSA, and the Cyber Security Summit. “ASIS International really took this year’s show up a notch – the quality of the networking alone that happened the very first night of GSX set the stage for some solid leads that brought great follow-up and product demonstration on the show floor,” said Janet Fenner, Chief Marketing Officer, Intelligent Security Systems, “We’ve met end user after end

76

user at this show and have been doing nothing but following up with all of the leads we’ve brought in. Our team will be extremely busy working to secure business for months to come.” GSX delivered on ASIS International’s promise of investing in and rebuilding a stronger and more expansive holistic security conference, bringing proven security best practices and education to the show and fostering much needed collaboration between operational and cyber security professionals. Education sessions featuring chief security officers from Amazon, Snapchat, Facebook, and MillerCoors had standing room only and covered critical topics including soft target protection, developing smart cities, preventing workplace violence, school security best practices, threats to critical infrastructure, and the future of AI and cybersecurity. “The excitement, innovation and exceptional events this past week are just the beginning,” said Richard E. Chase, CPP, PCI, PSP, 2018 President, ASIS International, “Global Security Exchange, like our industry, will continually evolve. In fact, GSX is not just an event that will reconvene twelve months from now in Chicago. GSX is a brand that will continue to engage ASIS members, attendees and vendor partners as a security community all year long.” SecurityLink India ■ October 2018

The reimagined expo hall upended the traditional trade show experience, featuring immersive learning opportunities on three new X-Learning stages and experiential demos in the D3: Drones, Droids, and Defense learning theater. Scott Smith, Hardware Engineering Program Manager, Fortem Technologies shared, “GSX worked with us to create an exhibit and demo area where we could successfully demonstrate airspace safety, security, and the relevant threats. The consequent discussions, exploration, and debates on the topic have been very advantageous to Fortem Technologies, and we were able to get directly in front of our target buyers. We have found GSX to be tremendously valuable and look forward to continuing our relationship.” Given the massive buying power of the GSX audience and the thousands of innovative products and services highlighted on the exposition floor, exhibitors and attendees engaged in substantive discussions about opportunities to purchase products and services, forge


International Updates

business relationships and establish partnerships. In fact, 86.4 percent of 2018’s GSX attendees are involved in their organization’s direct purchase of security technology, products and/ or services, and 40.5 percent have budgets in excess of $1 million. “In the many years that our company has partnered with ASIS International, this year’s event was by far the best one to date,” said Steve Jones, CEO, Allied Universal, “From the quality of the customer and prospect engagement around our exhibit space to the terrific education our team participated in to the excellent

networking receptions, the return on our investment far exceeded our already high expectations. We’re already looking forward to another outstanding event in Chicago next year.” Event feedback has been extremely positive, with the security industry embracing the new show format. Michael S. D’Angelo CPP, CSC, CHPA, Security Consultant, Secure Direction Consulting, LLC noted, “Unlike many other security conferences, GSX brings together industry experts as well as end-users, technology providers and even the clients we serve. It’s

great to see so many old colleagues and be introduced to several more. I’m heading back to work with increased knowledge and feeling genuinely at the top of my game.” GSX heads to Chicago next year, where Peter J. O’Neil, FASAE, CAE, Chief Executive Officer, ASIS International promises, “In 2019, attendees will see even more experiential learning on our X stages, expanded partnerships and education programming, and an expo floor that provides an unparalleled experience for attendees and our vendor partners alike.”

CP PLUS Showcases it’s Latest Technologies at the Vietnam Show 2018 C

P PLUS showcased its latest technologies in a recently held elaborate show held at the Exhibition Center, Ho Chi Min City, Vietnam. The three day event saw a packed audience with system integrators and industry patrons from across the country. “It was a great and successful show. Vietnam has been a budding market for us and we were really looking forward to this show. It was extremely heartening and satisfying to see the immense response and high footfall. We had some of our best solutions on display such as IoT cameras and solutions, access control solutions, IP mobile surveillance solutions, and home automation solutions, among others. We look forward to showcasing more of our technologies in the years to come,” said Yogesh B. Dutta, COO, CP PLUS. CP Plus also showcased the latest HD analog solutions, state-of-the-art command and control center solutions and architecture, time & attendance biometric solutions, law & enforcement solutions, CP PLUS smart surveillance monitors, PoE switches, intelligent network solutions and so on. Moreover, seminars and live demonstrations were also conducted during the event to provide insights on the discrete features of IP cameras and NVRs, latest technological updates on analog HD solution; H.265 smart compression, smart analytics, time & attendance, bodyworn cameras, Mobile DVR/NVRs, and control room. The show concluded with immense commendation from system integrators and partners alike who took keen interest in acquainting themselves with the latest technologies. SecurityLink India ■ October 2018

77


International Updates

Anti-Terrorist Vehicle Access Control Systems Receive SAFETY Act Certification Curtails insurance risks to customers/ certification retroactive to 1984

D

elta Scientific, the leading manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has recently announced that in a review of its top selling products to the government, the United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. This certification minimizes insurance risks for organizations that deploy authorized Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorized to carry the SAFETY Act Designated mark. “By minimizing insurance risks to deploying authorized Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security,” emphasizes Keith Bobrosky, Delta Scientific Senior Vice President, “As the only manufacturer having such certification for wedge barriers, beam barriers and crash gates, this announcement should encourage com78

mercial organizations to more fully explore using such life-saving products in their anti-terrorist and safety vehicle access solutions.” Delta certified products include the DSC501, DSC2000 and HD300 wedge barriers; MP5000 portable wedge barrier; DSC720-1M and DSC800 deep foundation bollards; DSC1200 surface mounted barrier; DSC7000 beam barrier; DSC600 and DSC650 shallow foundation fixed bollards and DSC288 crash gate. To illustrate the dependability of these products, the HD300 barrier stops a 15,000 pound (66.7 Km) vehicle travelling 50 mph (80 kpm) and has a demonstrated ability for continuous operation of 1 million cycles in independent test lab testing that took place over 14 months in an SecurityLink India ■ October 2018

outdoor setting while exposed to full sunlight and the effects of climatic conditions. Congress enacted the SAFETY Act to bestow liability protections for providers of certain antiterrorism technologies and provide incentives for the development and deployment of these technologies by creating a system of risk and litigation management. Certification means that the authorized Delta products have been reviewed comprehensively by DHS and it has found that the unit(s) will perform as intended, conforms to the Seller’s specifications, and is safe for use as intended. To pass review, each product had to demonstrate prior U.S. government use with substantial utility and effectiveness, provide immediate deployment, show that it would create risk to the public if the technology is not deployed, demonstrate effectiveness of the technology in defending against acts of terrorism and obtain determinations made by federal, state or local officials that the technology is appropriate for preventing, detecting, identifying or deterring acts of terrorism or limiting the harm that such acts might otherwise cause.


International Updates

Wins Two New Product of the Year Awards in AI Categories D

ahua Technology, a leading solution provider in the global video surveillance industry, has announced that the company’s 256-Channel AI NVR (DHIIVSS7016DR) and 3MP Dual-Sensor People Counting AI Camera (DH-IPCHDW8341XN-3D) have been recognized as Security Today’s New Product of the Year award winners in the AI NVR and AI Video Surveillance Camera categories. The New Product of the Year Award, presented by Security Today, is now in its 10th successful year. The award program honors the outstanding product development achievements of security equipment manufacturers whose products are considered particularly noteworthy in their ability to improve security. Dahua 3MP dual-lens people counting camera offers artificial intelligence at the edge by utilizing complex realtime people counting algorithms to deliver accurate flow statistics. The camera uses an advanced vision processor unit (VPU) to deliver high-performance machine vision and visual awareness that enables advanced applications which are impossible with conventional ISPs. The dual 3MP sensors work in combination to deliver a single video stream that captures 3D depth in the image with 98% accuracy. Dual-sensor technology captures a target’s height, allowing the cam-

Dahua Technology Wins Two New Product of the Year Awards by Security Today

era to better distinguish between people and other objects. With two distinct functionalities, Line Crossing and Regional, the camera can count the number of people crossing a defined line while offering a maximum/ minimum height detection to help filter objects that are too tall or too small. The Regional function counts the number of people in ten distinct user-defined regions. The 3MP dual-sensor people counting AI camera is ideal for business reporting, while simultaneously ensuring the safety of customers. As Dahua Technology’s first AI NVR, the DHI-IVSS7016DR-4T 256-channel AI NVR is based on high performing CPU and GPU architecture that combines video management functions with traditional video storage operations, all in one intelligent video surveillance server (IVSS). The H.265/ SecurityLink India ■ October 2018

H.264 backwards compatible IVSS supports 4K ultra HD resolution for recording, live viewing and playback. With an integrated GPU module and Dahua Technology’s advanced deep learning algorithms, the device performs powerful video structure analysis utilizing metadata to achieve realtime, high-precision facial analysis on up to 16 channels simultaneously. IVSS technology captures, records and categorizes various facial features including age, gender, expression, and whether the target face wears glasses or sports facial hair; compares the data to up to 100,000 faces in the database, and displays realtime facial recognition data. “We are honored to have received not one, but two New Product of the Year Awards, recognizing our advancements in the field of AI,” said Jennifer Hackenburg, Sr. Product Manager, “With these high-performing AI solutions we are constantly striving to provide multifaceted systems that create safer environments.” Winning two New Product of the Year awards in AI categories is a strong recognition to Dahua Technology’s achievements in the field of AI. With a mission of ‘enabling a safer society and smarter living,’ Dahua Technology will continue to focus on ‘innovation, quality, and service,’ to serve partners and customers around the world. 79


International Updates

Can Blockchain Help the Identity Management Area? With investment on the rise, blockchain is expected to transform a wide variety of industries in the coming years

T

he identity and access management may be able to benefit from blockchain technology. Individuals generally have little or no control over the information that comprises their identities. Without visibility into the exchange of identity attributes across the enterprise for authentication, verification and authorization, individuals are vulnerable to identity fraud. Another challenge is that identity data is typically decentralized. For example in the United States, the Department of Motor Vehicles issues driver’s licenses, for example, while the Department of Homeland Security issues passports, banks track financial histories, and so on. Most of these organizations have isolated and centralized identity management systems, but the current landscape demands federation and single sign-on (SSO). This makes identity management, protection and verification very cumbersome, costly and risky for all industry enterprises and government agencies. Blockchain has the potential to introduce improvements that can make security more accessible and budget friendly. With smart contract capabilities, these can even have a secondary market where users can benefit from sharing resources back to the network. Smart contracts can automatically execute pieces of code that carry valuable data, or other such condition-based execution. IHS Markit believes that one way to implement the distributed trust model for decentralised identity management 80

is to use distributed ledger technology (blockchain). A permissioned blockchain technology provides core capabilities that enable a trusted digital identity network to build and operate: ●● A shared, append-only ledger with one version of the truth shared across all permissioned network participants in real time; ●● Smart contracts that ensure that verifiable and signed business logic is executed in each transaction; ●● Trust between known participants to verify transactions and ensure records are valid; and ●● Privacy and security measures that grant access only to permissioned parties. These capabilities deliver the following required values for trusted digital identity: ●● User-centric design, which allows users to control their identity profiles and attributes; ●● Dynamic validation of identity and transaction data and ongoing validation of information leveraging smart contracts to update trusted data in real time; ●● Trusted digitization, which enables processes to become fully digital while maintaining trust in the data items; ●● Auditable records to provide for validation; ●● Controlled visibility, or the ability to verify identity without disclosing actual data; and SecurityLink India ■ October 2018

●● No hierarchy – unlike a database with a single point of control, all participants have the same capabilities. Due to identity theft and fraud, industry enterprises and government agencies have been tasked with a risky, time-consuming and costly undertaking – verifying, managing and protecting the identities of the individuals in their business networks. Many organizations see blockchain as a new way to handle these responsibilities because it can allow individuals to consent and control access to their data as well as provide businesses a trusted view of a person’s identity.

Conclusions

●● Although identity management is not a vertical market, it is an application area that is used in many vertical markets. With the projected increase in the number of blockchain projects that are launched and become commercially deployed, the business value within the identity management sector is projected to reach $200 billion by 2030. The ID2020 initiative continues to promote and support blockchain technology to help the 1.1 billion people who live without an officially recognized identity. ●● Digital identity is one of the oldest and hardest problems on the Internet. However, the World Wide Web Consortium is now standardizing the format for digitally signed credentials, and public blockchains can


International Updates

provide the decentralized registration and discovery of public keys needed to verify digital signatures. ●● Using blockchain within the identity management space not only eliminates usernames and passwords in favor of cryptographic authentication, but it adds the ability to exchange verifiable digital credentials

for stronger, more flexible, and more resilient identity verification and access control. ●● It can standardize and automate how the vast majority of identity management functions are handled not just for consumers but within the enterprise as well. ●● Blockchain in the identity manage-

ment space can prove that decentralization works for self-sovereign identity (SSI) and verifiable claims. With self-sovereign identity, the data is more up-to-date and more valuable than third party data. Since the data comes directly from the customer, it is fully permissioned within an identity management solution.

Enhances Cybersecurity for ASEAN Member States With Training System in Thailand Contributing to the capabilities of government and infrastructure company employees

N

EC Corporation has announced the building and operation of a system in cooperation with NEC Thailand for the ASEAN Japan Cybersecurity Capacity Building Centre (AJCCBC), which develops cybersecurity human resources for ASEAN member states at the request of the Electronic Transactions Development Agency (Public Organization) or ETDA, a Thailand government agency. NEC will hold a variety of cybersecurity exercises at the AJCCBC through May 2019, including incident response exercises for approximately 150 government and critical infrastructure company employees belonging to ASEAN member states. This human resource development project is promoted by the Ministry of Internal Affairs and Communications as part of a Japan ASEAN Integration Fund (JAIF) project. Damage from cyberattacks is already a global issue and the sophistication of attacks is evolving rapidly. Moreover, there is a worldwide shortage of human resources capable of effectively responding to cyberattacks, in addition to a lack of human resource development and enhancement. Under these circumstances, NEC is undertaking the following operations: 1. System building in the AJCCBC: Introducing a variety of IT equipment required to implement cybersecurity exercises in the classroom, server room and offices of the ETDA. 2. Development and provision of cybersecurity exercises: Jointly developing forensic exercises to investigate the content and causes of attacks including malware analysis exercises to examine computer viruses with LAC Co., Ltd. In addition to development of these cybersecurity exercise environments, an environment of a practical cyber defense exercise is being implemented and provided in the cloud. 3. Holding of cybersecurity exercises: Instructors and tutors will be dispatched from NEC and LAC to periodically hold exercises through May 2019. Approximately 150 employees will participate each time including two to four employees from the government and critical infrastructure companies of each ASEAN member state. Furthermore, a series of ‘Cyber South East Asia Games’ (Cyber SEA Games) will be held in which young engineers and students selected from each ASEAN member state compete on cyberattack coping skills. NEC’s focus on the social solutions business includes ongoing development of cybersecurity human resources in the ASEAN region such as the provision of cybersecurity exercises in the Philippines in October 2017 for employees from the ministries of ASEAN member states responsible for cybersecurity. Going forward, NEC will continue to contribute to enhancing cybersecurity capabilities through the provision of cyber-defensive exercises, products and services to domestic and international government agencies and critical infrastructure companies. SecurityLink India ■ October 2018

81


International Updates

A Ground Breaking Collaboration Enabling Value Added Innovations in Security and Safety B

osch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco™ by Schneider Electric, and VIVOTEK Inc. are founding members supporting the launch of the Open Security & Safety Alliance. This alliance repre-

and safety solutions which are accessible for everyone.

Background

T

he Alliance was formed in reaction to today’s market characterized by

on technical topics that do not necessarily make a significant difference for customers. The market needs a new direction, a framework that will enable the industry to focus on innovation and developments that add real value for customers.

Purpose

T

Open Security & Safety Alliance Board

sents leading companies in the security, safety, building automation solutions and associated industries. The Open Security & Safety Alliance (‘the Alliance’) is a non-profit, non-stock corporation that brings together like-minded organizations in order to outline specifications for a common standardized platform for security 82

the continued evolution of the Internet of Things and the aggregation of data. Security and safety solutions are fragmented due to lack of collaborative approach to common challenges including cyber security and common operating systems. This is holding back innovation and seamless integration. Many market players are competing SecurityLink India ■ October 2018

he Alliance brings together organizations that recognize the need for a new market direction and who are willing to contribute to the framework, providing standards and specifications for common components including an industry specific operating system, IoT infrastructure, collective approach for data security and privacy, and a drive for improved levels of performance. This framework will help the market and parties involved to focus on the aspects that really add value for their customers and open up new application possibilities, even beyond security and safety. The key tasks of the Alliance are: ●● Create and promote the use of commonly-agreed standards, best practices and specifications. ●● Address commonly agreed challenges shared by the players in the industry, like data security and privacy. ●● Enable market players to focus on innovative solutions which their customers find of higher value. Members will see accelerated innovation, more commercial opportunities,


International Updates

and an enhanced level of trust for security and safety solutions.

For the industry, by the industry

O

ver the last year, the founding members have been working closely together and discussing with over 50 companies, varying from early adopters to established technology companies, to verify initial concepts. System integrators and distributors

have been consulted to ensure that the Alliance covers the needs of all relevant parties. This initial input will help shape the standards and specifications that will eventually be consolidated in the Alliance framework. Starting off with the five founding members Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco™ by Schneider Electric and VIVOTEK Inc. and early adopters including Ambarella Inc., Anixter Inc.,

AndroVideo, Kings Security Systems Ltd and NetApp, the global alliance will focus on building standards, specifications, best practices, references and implementation guidelines. Together, the members of the Alliance can combine knowledge, expertise and experience in order to achieve mutual goals and create a new approach to the market. Membership is now open for organizations interested in joining the Open Security & Safety Alliance.

Successful Conclusion of Matrix Maiden Solution Conference Insight in Indonesia M

atrix successfully concluded its maiden solution conference ‘Insight’ in Indonesia on 13 September 2018. Matrix has been conducting its solution conference – Insight – across various geographical locations. They aim to have their products endorsed in different markets and understand how they can efficiently meet the ever increasing communication and security challenges that the organizations are facing today. Matrix exhibited their recently launched security solutions along with the telecom communications. Their unified communications, media gateways and IP phones were well received at the event. The entrepreneurs attending the conference were also interested in the multi-collaboration solutions along with the business IP-PBX. The attendees also showed inter-

ests in their security solutions such as visitor and cafeteria management solutions. They displayed multi spectral fingerprint devices along with other time-attendance and access control solutions that were also well received at the event. Entrepreneurs looking for video surveillance solutions appeared positively inclined towards the recently SecurityLink India ■ October 2018

launched Extreme series of the NVRs and the Professional series cameras equipped with Sony Exmor technology. Several attendees during the events approached Matrix solution experts to get the details of the solutions. Some prominent system integrators and end customers were also present at the event. 83


feature

No Compromise Wireless By Scott Penno – Regional Marketing Manager, APAC, Allied Telesis

T

he wireless edge of the network has become ubiquitous, and so have been the expectations of a reliable and secure connection. Users have become used to the convenience of connecting wherever and however they want. They tolerate the flaws in a typical Wi-Fi connection – pauses in downloads, occasional drop-outs where we must re-connect, and lengthy waits as we try to join a public Wi-Fi network. For personal browsing, we make a conscious compromise between convenience and reliability because apart from being frustrating at times, no real harm is done. But in a business environment, reliable wireless connectivity can’t be a compromise for critical operations, especially where it can be the difference between life and death.

Why multi-channel is not always the best choice

M

ost Wi-Fi networks operate on a multi-channel architecture (aka micro-cell), where each wireless access point (AP) connects to a mobile client using one of several radio channels. To achieve optimal throughput to each client, it’s important to have good signal strength but minimal radio

84

interference by ensuring that the APs are not too close, and the same radio channels do not overlap (called ‘co-channel interference’). However, this can be difficult when there may be physical layout constraints, and there are only a few channels to choose from, and even harder in a multi-tenancy building when your neighbour chooses the same channels as you. To assist with this, tools are used to survey the physical site to plan the channel map for the optimal experience, but these tools can be expensive and time consuming to use effectively. This is how typical Wi-Fi networks are designed, and why they occasionally exhibit reliability glitches. Some years ago, an alternative architecture was proposed that utilised the same radio channel for all APs in the network. In this model, placement of the APs was no longer critical because they all used the same channel, so interference was not an issue. If coverage was poor in one location, then additional APs could be easily deployed without worrying about introducing bandwidth-destroying interference. Although the single-channel architecture solved one of the biggest challenges of Wi-Fi network design, it too had some limitations, the main one being that its total network throughput was usually lower than multi-channel. Since then, multi-channel Wi-Fi has become the predominant architecture and most of the time, it does a great job. However, there are some situations where multi-channel is not the best choice, and alternative solutions can provide a better experience. Applications of this type usually fall into three categories: 1. Dynamic physical environments, like warehouses, where radio coverage is continuously being changed as objects are moved and removed. This makes multi-channel planning almost impossible, so the workaround is to deploy more APs. Unfortunately, this not

SecurityLink India ■ October 2018


feature

only increases cost, but it introduces more radio interference, which reduces data throughput. 2. Environments that must have reliable connectivity to mobile devices, like hospitals, where even a momentary loss of data connectivity can have a serious effect. As a wireless client moves, its connection will ‘roam’ to another AP when it perceives a significantly more attractive signal. Unfortunately, this roaming process can sometimes be slow and disruptive as security credentials must be established or re-negotiated. Often this can manifest as an annoying lag on a VoIP call, or random artefacts in video. One solution is to use only wireless clients that support ‘fast-roaming’ protocols, or intelligent bridging devices that handle the roaming on behalf of the client. Both these solutions add complexity and cost. 3. Environments where there are many roaming wireless users, like schools, hospitals, public venues etc. Multichannel struggles to cope in these situations because

only one client can talk to an AP at a time. So, having more clients associated with an AP means there is less time for each client to talk, so the effective bandwidth to each client is reduced. Adding more APs doesn’t always help because co-channel interference increases, which also reduces bandwidth. The answer to these challenges is a cost-effective Wi-Fi solution that combines the best features of both architectures – multi-channel’s throughput with single-channel’s easy deployment, and reliable, seamless roaming connectivity. Previously, users had to choose one architecture or another, and where it was desirable to run both multi-channel and singlechannel systems on premises, they had to manage two different networks with different tools. Administration efforts were increased because firmware updates had to be applied twice, and engineers had two different systems to learn and maintain. Today there is a solution that allows the user to select multi-channel, single channel or both, for the optimal Wi-Fi experience.

Apollo Security Emphasizes Customization with New Controller Series E

veryone can agree the convergence trend is in full force in the electronic security industry, and organizations are pushing more and more for integrated solutions that can not only enhance ROI but also solve problems that have traditionally been out of the realm of electronic physical security systems. This leaves system integrators and other solution providers in a difficult position as they scramble to be competitive especially when faced with an industry dominated by a few power players. Tackling this problem can now be a matter of survival for small to medium players especially in regional markets. To address this need, Apollo se-

curity access control has introduced a new ASP series controllers that promise to set a new standard for secure, scalable and customizable solutions. For 30 years, Apollo has been known for producing some of the most robust hardware in the industry, and with the ASP series a new layer of flexibility has been added by allowing ‘post-factory’ customization in addition to many other feature upgrades. This will help put more control in the hands of integrators, and even end-users so they are not locked into hardware solutions that are ‘off the shelf ’ and don’t provide any ability to adapt to customer specific needs for the present or the future. SecurityLink India ■ October 2018

The flagship of Apollo’s new controller series, the ASP-4 is an intelligent access controller designed to provide high performance security solution with ability to solve non-standard problems. Natively, the ASP-4 can support four readers and four doors, but when clustered with 32 other ASPs devices it can secure up to 128 doors in one management unit by utilizing inter-device communication across standard IT networks. Each ASP-4 can also support up to 16 additional readers by utilizing OSDP secure channel communications, supporting configurations such as 4 doors with in/ out (8 readers) or even more doors by adding input/ output modules for door 85


feature

control. Enterprise capacity of 250,000+ cardholders, 300 access levels with up to 50 access levels per card is provided at each device, providing total cardholders access rights database redundancy, preventing reduced functionality modes such as ‘facility code check only.’ The ASP’s real power lies, however, with the ability to customize the functions of the controller by loading customized App scripts and third-party protocols. Using industry standard ‘Clike’ programming language, the ASP can have new functions designed by the integrator. Running customizations at the hardware level instead of software offers the benefits of drastically reduced time/ cost of implementation, as well as superior reliability. Earlier if an organization wanted to integrate a new device such as an alarm panel, fire system or similar, they would have to request software customization which could take months and costed tens of thousands of dollars; however, with the ASP such a task can take days or weeks and be completed within a budget of hundreds of dollars. An example of how effective this customization works was provided by a subsidiary of a large multi-national that was struggling to comply with strict labor regulations. Under these rules, workers in their factory can only work six consecutive days, requiring the seventh day for rest. The HR department struggled to keep track of this as each employee’s rest day was prior to when six days was expired; in addition to workers switching shifts and other complications the tracking was too difficult to be done manually, so an automated solution was necessary. The current access control solution the company was using didn’t provide any solution for this so the only possibil86

ity was expensive customization which would take 3-4 months and then there was no guarantee what would happen in the future if needs would change. With ASP-4, Apollo’s local partner was able to offer a much more rapid solution. The requirements were programmed into a logic script that was loaded to the controller. This script checks every cardholder at time of access for any violation of the rules and deny access if necessary, displaying a reason on an LCD display as well as flash an indicator light so that the cardholder will know it is not simply an access level error that has denied their entry. This customization took less than one man-day to program and was tested over the course of one week before it was ready to deploy. The ability to do this customization gave the partner the edge needed to provide a timely, cost effective solution to a problem that could have costed the company greatly if a work-related accident resulted in legal action. In the future, the logic script can be easily changed, for example if the company would like to move to a five-day work week in the future. Additional customization possibilities are possible using the serial connections of the ASP. This allows integration of input devices such as scales or barcode scanners, or interface to any device that has a serial interface such as displays, mimic panels, entry phone systems and more. Protocols for these devices can be embedded in scripts and the devices can assume alarm input/ output functions, or even new card reader types can be supported such as wireless locks or long-range RFID readers. In addition to being customizable, the ASP of course is designed with security in mind. With all communication channels being secured with 128-bit TLS SecurityLink India ■ October 2018

encryption which prevents attempts to intercept or forge data. Security goes all the way down to the reader using OSDP secure channel to protect card reader data transmission lines. Being able to communicate simultaneously with up to five software hosts also gives the ASP ability to be monitored in real-time by redundant systems, ensuring that important alarms are always delivered in time for the security team to react. The ASP series has been designed from the ground up to be friendly to software OEMs and system integrators using other systems in place of or addition to Apollo Security’s software platform. A native open platform SDK allows tight integration with all the ASP’s standard features in addition to the customizations available through scripting and embedded software. The SDK comes with several integration pathways including .NET and Python and includes sample code, tutorials and online developer support. To better support software OEM partners, Apollo Security’s parent company, ADME INC., has recently announced a new division, ApolloEM which will provide support for partners that utilize the ASP hardware platform in their own software solutions. William Lorber, Vice President of Sales and Marketing said, “Establishing a separate division to strengthen our role as an access hardware OEM became logical as more partners are coming on board to utilize our new product line. We are excited to see the solutions that our partners develop on this platform.” Lorber added that partners will be able to share and market their solutions on the upcoming App Script Library platform that Apollo will roll out later this year to expand the effectiveness of ASP solutions.


International Updates

SecurityLink India â– October 2018

87


product showcase

Integration Partner Program (DIPP) Launched at Security Essen 2018

D

ahua Technology, a leading solution provider in the global video surveillance industry, advocates openness and believes that an industry ecosystem can benefit all industry players. At Security Essen 2018, it launches the Dahua Integration Partner Program (DIPP), aiming to extend collaboration with 3rd party partners in technology integration and business development.

Dahua Integration Partner Program (DIPP) DIPP focuses on creating comprehensive and integrated solutions with 3rd party partners for wider customer and enduser base. Featuring three partner levels – Strategic Partner, Golden Partner and Silver Partner – DIPP ensures that its partners enjoy multiple benefits through Dahua Technology’s global network. Partners who specialize in video management software, access control system, video analytics, physical security information management, alarm systems, cloud-based services and other vertical systems that involve security surveillance are most welcome to join the program.

is that Dahua Technology ensures considerable benefits at project part including end-to-end support, opportunities for projects pipelines sharing and product recommendation etc. So far, some 3rd party partners have joined DIPP like Ivideon, AxxonSoft, to name just a few. “We’re happy to launch DIPP, a program aiming to better serve our partners and achieve win-win results,” said James Wang, Deputy General Manager of Overseas Business at Dahua Technology. “We were the first to implement a solution on Dahua open platform, and we’re very happy to be among the first companies to participate in the Dahua Integration Partner Program. Dahua Technology’s innovative technologies, particularly its development of deep-learning video analytics, completely aligns with our vision of how video surveillance should develop. I’m confident that, together, we will create products that grow our value proposition for both our partners and clients,” Said Alan Ataev, Global Sales Director at AxxonSoft.

14TB Data Storage Portfolio New feature-rich drives provide unmatched performance, allowing customers to maximize the value of their data

S DIPP benefits partners on both technical and business sides including in-depth marketing, project and technical support. Marketing-wise, DIPP partners enjoy dedicated marketing support including co-marketing opportunities at Dahua Technology’s global events, recommendation in Dahua 3rd party partner solution catalogue etc. Technically, Dahua Technology guarantees feedback within 24h, dedicated technical support, opportunities for sample borrowing, roadmap sharing and product introduction, and free training regarding Dahua Technology integration protocols. The key 88

eagate Technology has recently launched the industry’s widest range of advanced 14TB hard drives, enhancing the company’s enterprise and specialty drive portfolio. Consisting of IronWolf® and IronWolf® Pro for network attached storage (NAS) applications, the BarraCuda® Pro desktop drive, surveillance-optimized SkyHawk™, and Exos™ X14 for hyperscale data centers, this purpose-built portfolio empowers customers to consume, manage and utilize digital data more effectively and efficiently while establishing new benchmarks in speed and capacity. With this offering, Seagate continues to lead the industry in driving data storage technology toward a lower cost per terabyte through hard drive optimization, versatility of application, and unmatched capacity. Whether for personal use, creative and design computing, online gaming, or large-scale

SecurityLink India ■ October 2018


product showcase

surveillance systems and hyperscale environments, Seagate drives are opening up new data management opportunities across a wide range of markets. “Data protection, management and archiving are no longer strictly the realm of IT departments, but are now essential responsibilities for business owners, creative professionals, online gamers and PC users alike,” said Matt Rutledge, Senior Vice President of Devices at Seagate, “We understand the critical nature of data in unlocking opportunities to efficiency. From the largest data center to the personal user, our goal is to ensure every customer can access, store and transfer data quickly and reliably, whenever they need it and wherever they are.”

formance, high capacity and reliability – the three most important needs for surveillance customers and integrators. With the ability to store over 9000 hours of HD video and up to 64 HD cameras, the SkyHawk 14TB is optimized for DVRs and NVRs, tuned for 24/7 workloads, and equipped with ImagePerfect™ firmware to minimize dropped frames and downtime. Supported by a 3-year limited warranty, customers can also benefit from unique SkyHawk health management technology that actively monitors and analyzes drive health, empowering users to prevent, intervene and recover from potential anomalies.

IronWolf & IronWolf Pro 14TB – the leader in NAS

I

ronWolf and IronWolf Pro drives have continued to push boundaries for NAS applications, providing best-in-class reliability and performance for always-on environments. Trusted by the world’s top NAS vendors, IronWolf drives are built with multi-user environments in mind, which allows a workload rating up to 300TB/ year allowing users to do more with their data and their NAS. The drives are optimized with AgileArray™ firmware for NAS servers to provide the customer with a host of benefits including RAID performance, dual-plane balance, rotational vibration (RV) sensors, advanced power management and error recovery control. “For many companies, data storage has become one of the fastest-growing parts of their IT infrastructure. Synology users will be excited by the new Seagate 14TB IronWolf drives,” said Vincent Tsai, Product Marketing Manager at Synology Inc., “By collaborating seamlessly, Seagate and Synology deliver a reliable storage and backup solution for businesses to safeguard their valuable data.”

SkyHawk 14TB – optimized for surveillance

T

he surveillance industry is rapidly evolving and the demand for higher video resolution, analytics and longer retention requires much greater storage capacities. Seagate SkyHawk drives provide the optimum combination of per-

Exos X14 – hyperscale ready

B

uilt for the efficiency, reliability and security demands of the world’s most advanced hyperscale data centers, Exos X14 drives offer enhanced areal density to deliver higher storage capabilities in a compact 3.5-inch form factor. Combined with the industry’s lowest power consumption and best performance in its class, the Exos X14 enables data centers to maximize storage capabilities while reducing complexity and operational costs. As the need for hyperscale and cloud storage increases exponentially, Seagate’s new Exos X14 drives deliver 40% more petabytes per rack compared to Exos 10TB drives, while maintaining the same small footprint. The heliumbased Exos X14 also provides a 10% reduction in weight versus air nearline drives, and flexible formatting for wider integration options and support for a greater number of workloads. Exos X14 also ships in a modular enterprise system (Exos E 4U106) for easy scaling up to an unprecedented 1.4PB density. Anticipating global security demands, Exos X14 drives feature ‘always-on’ Seagate Secure™ protection, effectively encrypting all data without performance degradation. Exos X14 drives offer a 5-year limited warranty, and are designed to meet US Government Federal Information Processing Standard (FIPS) 140-2, Level 2 Security certification, as well as the Common Criteria for Information Technology Security Evaluation (CC) ISO/EIC 15408 compliance standard.

SecurityLink India ■ October 2018

89


product showcase

Device Pack 9.9 Milestone Systems Steps up Device Support

M

ilestone Systems has released Device Pack 9.9 for partners and customers using Milestone XProtect® video solutions. The bi-monthly device packs contain software updates for XProtect VMS to support new hardware. 209 new devices have been added to this release, bringing the total of supported devices to more than 7,500.

Enhanced support for the ONVIF industry standard

M

ilestone works closely with device manufacturers in the Milestone community to achieve optimal interaction between their devices and XProtect VMS. The same rigorous testing applies to driver standards like ONVIF – a priority for Milestone.

tested to ensure 100% functionality with the XProtect open platform technology. This enables the Milestone community to pick the best devices for their end-customers, from the market’s broadest selection. They can be assured of the functionality of any supported device.

Additional cyber security on Bosch cameras

T

hey have added support for SRTP to Bosch cameras. Secure Real-Time Protocol (Secure RTP or SRTP) is an extension of the RTP protocol, with an enhanced security mechanism. It provides encryption, authentication and integrity verification of data and messages passed through the RTP-based communication protocol.

Rugged Spectra Professional IR PTZ Camera This Device Pack has a particular focus on cybersecurity for ONVIF. Support has been added for more types of security certificates. This enables better authentication of devices. Automated retrieval of recordings from devices with edge storage is another new feature, primarily aimed at body worn cameras. When a body worn camera is docked, XProtect can detect it and download high-quality video recordings from the device’s internal storage. Before ONVIF-supported devices are listed in the supported hardware list on milestonesys.com, they have been 90

Features ‘Above the Horizon’ Viewing for Greater Coverage with Easier Mounting elco™ by Schneider Electric has released the Spectra Professional IR – a rugged camera ideal for transportation, city surveillance, airports, seaports and commercial markets. The Spectra Professional IR features ‘above the horizon’ viewing capability providing greater coverage of bridges, overpasses and building exteriors without mounting additional cameras. The camera also provides built-in IR illumination on areas of interest such as roadways, ports, park-

P

SecurityLink India ■ October 2018


product showcase

ing lots and building perimeters up to 150 meters away offering a solution for customers who are frustrated with the inability of typical PTZ cameras to capture key image details in poorly lit environments. “With extensive research and development, Pelco has honed the technology to capture critical details in low light situations,” said Todd Dunning, Sr. Product Manager, Pelco, “Spectra Professional IR also features a bubble-less design, a new feature to Pelco’s line of surveillance technology.”

fected by high vehicle traffic or strong winds like bridges and light poles. ●● Simple installation: Using only one wire to connect, the Spectra Professional IR comes with three power options and an embedded hinge design, making it easy to connect to and providing greater flexibility during installation. ●● Full integration with Pelco’s VideoXpert and leading ONVIF-Compliant video management systems (VMS): Seamlessly presented in video management systems allowing operators to easily track objects moving in the scene and zoom in for greater detail.

Lumidigm® Multispectral Fingerprint Technology

Benefits

A

ssuring coverage of large areas, the Spectra Professional IR camera is designed for use in round-the-clock surveillance. Key features include: ●● Lookup: The Spectra Professional IR can view 15 degrees above the horizon that enables customers to see areas that are difficult to view when using typical mounting locations including bridge supports and cables, higher floors of commercial buildings as well as ships at a distance from seaport. ●● Outstanding image quality in poorly lit areas: Primarily used for outdoor applications with poor lighting conditions, the IR technology allows operators to see details up to 150 meters away, where external visible lighting is not wanted or is unavailable. The technology also provides control of the illumination intensity and exposure in the camera; enabling people and vehicles to be tracked with clarity wherever they move in the field of coverage, near or far. ●● Smart compression technology: Featuring H.265 and Pelco’s Smart Compression technology, the Spectra Professional IR lowers bandwidth and storage requirements between 30 and 70 percent, depending on the amount of motion in the scene, especially important for 24x7 surveillance. ●● Digital image stabilization: Reducing blurring associated with camera motion, this feature allows the camera to maintain a smooth image ideal for surveilling areas af-

Earns First Perfect Score in International Fake-Finger Certification Tests ID Global® patented Lumidigm® multispectral imaging solution is the first fingerprint technology certified to the ISO/ IEC 30107-3 Presentation Attack Detection (PAD) standard, which focuses on anti-spoofing and liveness detection to determine whether fingerprint data captured from the sensor is from a real, living person or from a plastic fake or other artificial copy. Since the specification’s release more than a year ago, only the Lumidigm V-Series solution has stopped all fake-finger attacks to receive a perfect certification score in a Level 1 test, which was administered by iBeta Quality Assurance and certified by the National Institute of Standards and Technology (NIST) National Voluntary Laboratory Accreditation Program (NVLAP). “This industry certification is an important accomplishment which validates the security- and privacy-enhancing capabilities of our multispectral fingerprint capture technology,” said Michael Chaudoin, Vice President of Product Management and Marketing, Extended Access Technologies business unit with HID Global, “Deployed globally, these fingerprint sensors authenticate billions of transactions annually. They provide trust whenever they are used to validate a person’s identity to grant access, deliver services or distrib-

H

SecurityLink India ■ October 2018

91


product showcase

ute funds, because each time they ensure that fingerprint data is from a real person rather than a fake or stolen sample.” The independent test result is based on the global ISO/ IEC 30107-3 standard, which established procedures for testing and reporting a device’s level of susceptibility to fake fingerprints, also called spoofing attacks. During these tests, the fake fingerprint is presented to a biometric capture device by an imposter to gain unauthorized access, steal an identity for fraudulent use, or evade a watch list. Receiving a perfect score during Level 1 certification testing means the Lumidigm technology detected 100 percent of spoof attempts while correctly authenticating legitimate users. “Liveness detection is a critical component of a trusted fingerprint biometric security architecture that also includes capture and template-matching capabilities,” said Michael Thieme, Novetta Vice President of Special Projects and Editor of ISO/ IEC 30107-3, “Organizations deploying biometric systems should consider independently-validated PAD solutions to help ensure the biometric products they deploy defend against these types of attacks.” Liveness detection is increasingly important for ensuring the integrity of what Acuity Market Intelligence forecasts will be more than one trillion cloud-based biometric transactions annually by 2022. In 2015, more than 21.5 million people were affected by a breach of the U.S. Office of Personnel Management (OPM) systems that compromised 15 years of biometric fingerprint identity data. This and other breaches at companies in financial services, healthcare, and other industries have fueled concerns about the fraudulent use of stolen biometric data, which liveness detection can help prevent. According to Acuity’s principal analyst, Maxine Most, “One of the main challenges ahead is educating markets about what constitutes the integrity of a biometric system, including how to apply best practices for liveness detection.” The firm said in its September 2017 financial services white paper that liveness detection is a critical component of a secure, well-architected biometric solution, and one of the most important countermeasures to biometric spoofing and presentation attacks. HID Global’s patented multispectral fingerprint imaging technology captures unique characteristics from the surface and subsurface of the finger, providing the most reliable fingerprint capture technology available today. Multispectral fingerprinting works reliably for a broad range of people with normal, wet, dry or damaged fingers, across a wide range of conditions – from dirt and grease to sunlight to wet 92

or cold conditions. These devices provide field-updatable ‘liveness detection’ that helps future-proof deployed systems against new threats as criminals continue to escalate their attacks and techniques. The sensors use a top-ranked NIST certified MINEX III minutia algorithm for proven interoperability with industry standard fingerprint template databases.

SecuriTEST IP CCTV Tester To Showcase Latest Tester Developments at GITEX 2018 from 14-18 October 2018 in Dubai

I

DEAL Networks will present their newly launched or recently updated products including network, data cable and IP CCTV testers at GITEX 2018, Dubai during 14-18 October 2018 to provide intuitive and flexible test solutions for cable installers, network technicians and systems integrators.

The show is one of the first opportunities to see the new range of touchscreen network and data cable testers from IDEAL Networks. NaviTEK NT Plus and Pro network troubleshooters, SignalTEK CT data cable transmission testers and SignalTEK NT network transmission testers are all now available with an LCD capacitive touchscreen as standard to enable fast and responsive data input which helps save time and increase efficiency on every job. The new SecuriTEST IP CCTV tester, an installation and troubleshooting tester for digital/ IP, HD coax and analogue CCTV camera systems designed to increase productivity, will also be on the show. The handheld device is multi-func-

SecurityLink India ■ October 2018


product showcase

tion, so technicians do not need to take varied equipment to each installation or maintenance job. It connects quickly to cameras via in-built RJ-45, Wi-Fi and BNC ports and features a 7-inch hi-res touchscreen and simple to use functions, so even on complex jobs only a single tester is needed. In addition, IDEAL Networks will present the latest upgrades to the popular LanTEK III cable certifier. To support fast and straightforward cable certification for busy cable installers, the tester has been upgraded with a new Quick Setup feature which enables almost all configuration and testing to be performed on just one intuitive screen. The software for LanTEK III has also recently been updated to help installers certify Modular Plug Terminated Links (MPTLs) using their existing cat 6A Permanent Link and Channel Adapters. This provides a flexible solution for installers using cat 6A cable for wireless access points, AV equipment and CCTV cameras, where MPTLs are likely to be used. IDEAL Networks offers easy to use data cable testers for cable installers and network testers to assist IT technicians with troubleshooting. The data cable tester range includes copper and fibre testers for cable verification, Ethernet transmission testing and cable certification that provide proof of performance. The unique network tester range helps pinpoint and solve networking issues quickly. They decrease downtime by allowing field technicians to discover the root cause of network connectivity issues such as incorrect IP configuration, rogue network services, network bandwidth issues and PoE supply problems.

New Urban-X Luminaires

R

aytec has launched Urban-X – a new range of high performance general area luminaires designed for a range of industrial applications, as well as pathways, street lighting and perimeter fence lines. The Urban-X family delivers a number of performance advantages compared to traditional lighting.

High performance

A

vailable with a lumen output up to 14,000lm, the Urban-X range achieves incredibly powerful illumina-

tion from a small platform through the use of PLATINUM multi-core LED technology. In addition, excellent thermal performance ensures the luminaires run cool, providing long-life and reliability – all supported with the Raytec 5 year warranty. With a range of different beam patterns available, Urban-X can target light where it is needed most with minimal wastage, while achieving highly even light distribution.

Saving money

U

rban-X products are designed with easy installation and maintenance in mind to reduce costs. The smallest product in the range, the Urban-X Mini, weighs in at just 2kg which makes installation safer and easier while a contractor-friendly design with tool-less access makes maintenance straightforward. Thanks to the luminaire’s excellent thermal management and efficient optics, outstanding performance is combined with low power consumption to deliver excellent efficacy of up to 140lm/w. This means significant energy savings can be made when compared to conventional luminaires. Managing heat effectively also means a long-life time is achieved, which when combined with easy installation and low power consumption means Urban-X delivers excellent value for money.

X-treme durability

F

eaturing a lightweight, compact design which is focused on durability, Urban-X luminaires are the ideal lighting solution for more challenging environments. Manufactured

SecurityLink India ■ October 2018

93


product showcase

using marine grade aluminium and offering a wide operating temperature range, Urban-X excels where other luminaires may struggle. Urban X products are environmentally protected (IP66) and carry a temperature rating of -30°C and +60°c (-22° to 140°F), further adding to their suitability to demanding environments. An inbuilt automatic thermal control system (ATC) ensures sustained performance over the lifetime of the luminaire.

Clever network control

D

ALI enabled and fully programmable standard UrbanX is a fully connected lighting solution which brings new opportunities in the way lighting systems can function and be controlled. Luminaires can be controlled and monitored remotely, while groups of luminaires can also be controlled together as a network, providing the ultimate level of flexibility. This also helps to improve maintenance efficiency, further reducing costs when it comes to servicing. “The new Urban X range provides us with a tough, high quality solution for general area lighting applications, making use of Raytec’s field proven technology and further builds on our portfolio of class leading safety and security lighting” adds David Lambert, Managing Director, Raytec.

access control to secure IoT environments and provides enhanced visibility, control and automated response capabilities. FortiNAC provides detailed profiling of each device on the network and enables granular network segmentation and automated responses for changes in device status or behavior. This ensures each device has only access to approved items on the network.

Unsecure IoT devices are leaving organizations vulnerable

A

ccording to Gartner, “Internet of Things endpoints will grow at a 32% CAGR from 2016 through 2021, reaching an installed base of 25.1 billion units.” The sheer volume of devices – including IoT, corporate, and BYOD – seeking wired and wireless network access are exponentially enlarging the attack surface and raising internal provisioning, management and compliance costs. The responsibility of connecting and securing access has shifted from a networkled issue to a security-led issue and poses a challenge for organizations. Security managers need to secure every single device every single time, while cybercriminals only need one open port, one compromised or unknown device or one uncontained threat to circumvent all of the effort going into securing the network.

FortiNAC secures networks accessed by unsecure devices

F

FortiNAC New Network Access Control Solution for IoT Security FortiNAC provides visibility and control of IoT devices and automated response to threats, controls access at scale in multi-vendor environments ortinet®, a leading global player in broad, integrated and automated cybersecurity solutions, has recently introduced FortiNAC, a new network access control product line that delivers network segmentation and automated repsonses for IoT security. The massive rise of unsecure, headless IoT devices including industrial and medical IoT requires new tools for securing networks. Fortinet’s new FortiNAC product line delivers network

F

94

ortinet’s new network access controller, FortiNAC, diminishes the security risks associated with unsecured devices accessing the network by giving organizations total visibility of endpoints, users, trusted and untrusted devices and applications. Once visibility has been achieved, FortiNAC establishes dynamic controls that ensure that all devices, whether wired or wirelessly connected, are authenticated or authorized, and are subject to a context-driven policy that defines who, what, when and where connectivity is permitted. This ensures that only the appropriate people and devices can connect to and access appropriate applications, infrastructure and assets. Additionally, FortiNAC can enforce company policies on device patching and firmware version. FortiNAC also contains powerful network orchestration capabilities for delivering automated responses to identified threats and can perform threat containment in seconds, where a manual process could take days or weeks. Networks are in constant flux with new devices connecting and disconnecting, controlling the network by control-

SecurityLink India ■ October 2018


product showcase

ling access to any device seeking access is a key part for ensuring the integrity of a network. Such an approach – where no unknown devices ever gain access to the corporate infrastructure, permitted devices are automatically segmented based on policies and roles and connected devices that begin to violate profiles are immediately quarantined from the network – becomes the foundation for a comprehensive security posture. Furthermore, the FortiNAC network access control solution is cost-effective and highly scalable, extending visibility and protection to an unlimited number of devices and eliminating the need for deployment at every location of a multi-site installation.

NAC and IoT security solutions bolster the Fortinet security fabric

F

ortinet strengthens its security fabric by extending its ability to engage network devices beyond the fabricready partner program to a wider multi-vendor environment, including third-party firewalls, switches, wireless access points and endpoints. FortiNAC is also integrated with the FortiGate Next-Generation Firewall, FortiSwitch, FortiWLC Wireless Controllers, FortiSIEM and FortiAP to minimize the risk and impact of cyber threats and provide broader visibility and security for complex networks. In the world of IoT, FortiNAC answers the question ‘what’s on your network’ and then enables the user to protect it.

crime scene investigators and security managers. It is ideal for real time capturing and diagramming of 2D floor plans for threat assessment, pre-incident planning and fire protection engineering across a range of places and activities that includes sporting and cultural events, shopping malls, critical infrastructure and schools and college campuses. A process that used to take hours can now be completed in just minutes. ●● Walk through the building or scene at normal speed and simply point the device at walls to capture a 2D floor plan – both in daylight and at night. ●● Add notes and photographs of critical details to the plan while mapping. ●● Capture floor plans on multiple levels and organize them into one project. ●● Take measurements, view photos, add pre-drawn symbols for details found in the building. ●● Create finished 2D or 3D diagrams quickly with smart tools that snaps to points for fast drawing or even automatically generate lines from the floor plan.

A complete solution

T ScanPlan™ Handheld Floor Mapper Enables Fast Mapping of Floorplans for Public Safety Professionals

ARO®, one of the world’s most trusted sources for 3D measurement and imaging solutions for public safety forensics and factory metrology, has introduced FARO®ScanPlan™ – a solution for fast and easy mapping of floor plans. This next generation 2D handheld mapper is specifically designed to enhance the effectiveness of public safety professionals such as emergency responders, fire and

F

he ScanPlan is a fully integrated solution that includes both the lightweight ScanPlan handheld 2D mapper and FARO Zone 2D diagramming software. This enables end users to configure the captured floor plan into a comprehensive pre-incident diagram. In addition, it delivers actionable in the moment information as users can seamlessly mount an iOS or Android smartphone of their choice to visualize the floor plan taking shape in real time. This includes the ability to take photos for such items as control panels, sprinklers and hydrants, and have them automatically added and geolocated to the correct location.

Easy to use

T

he ScanPlan advances the concept of ease of use. Not only can users actually see the floor plan taking shape in real time but operation is as simple as walk, point and cap-

SecurityLink India ■ October 2018

95


product showcase

ture. As a result, the level of expertise and training required is at a minimum so it can be easily used across the breadth of personnel within an organization. “As we have stated previously, FARO has a strong strategic focus on the public safety community for federal, municipal and private concerns. This is our third new introduction within the last twelve months with solutions specifically designed to optimize productivity for this community and their ability to service their constituents,” states Jeff Ruiz, Vice President Public Safety Forensics, “We are encouraged and excited by the enthusiasm in which the community is embracing the ScanPlan solution.”

●● The duration of an alarm before the sensor reset is now fully adjustable. The key new feature of the RLS-3060SH version 8.0 is the extended detection range up to 50m radius. In horizontal mode the 30-50m area is ideal as a pre-warning zone as it detects objects over 60cm wide. In vertical mode it can create a 100m wide virtual wall detecting walking or squatting people.

Highly Integrated MobileSecurity Chip Combining NFC Controller, Secure Element, and eSIM

REDSCAN RLS-3060 Version 8.0

V

ersion 8.0 of Optex long-range Redscan RLS-3060 series and Redscan Manager software now come as standard and bring a number of new features. Both RLS-3060 models have enhanced flexibility to manage dry contacts, with selectable form C outputs. The RLS-3060L version 8.0 provides 30m radius detection range with the following new features: ●● Area allocation: on IP connection, up to eight individual detection areas can be assigned within the detection range and programmed using Redscan Manager, and four areas when using analogue connection. ●● Area masking: Non-detection areas can be assigned so the sensor ignores activity in those areas.

96

S

TMicroelectronics revealed its highly integrated mobilesecurity solution, the ST54J, a system-on-chip (SoC) containing an NFC (Near-Field Communication) controller, Secure Element, and eSIM. The SoC delivers performance-boosting integration for mobile and IoT devices, with the added benefit of ST’s software-partner ecosystem for smoother user experiences in mobile payments and e-ticketing transactions, as well as more convenient, remote, mobile provisioning to support multiple operator subscriptions. “As mobile devices require more security and connectivity in an ever-shrinking PCB footprint, the ST54J will help designers simplify assembly and reduce bill-of-material costs,” said Laurent Degauque, Marketing Director, Secure Microcontroller Division, STMicroelectronics, “ST’s established ecosystem of third-party software partners provides access to eSIM and eSE solutions that are not only EMVCo and GSMA-SAS certifiable, but also tested for interoperability and validated with numerous mobile network operators (MNOs), custom profiles and application providers worldwide.” Spearheading the fourth generation of ST’s proven embedded Secure Element family, the single-chip ST54J ensures faster contactless interaction than a discrete chipset by eliminating performance-limiting off-chip data exchanges between the Secure Element and NFC controller. In addition,

SecurityLink India ■ October 2018


product showcase

a faster, state-of-the-art core for each function further accelerates contactless transactions with mobile terminals and enhances roaming by supporting secure-element cryptographic protocols used worldwide, including FeliCa® and MIFARE®. Packaging and design flexibility comes from the space savings of integrating three key functions onto a single chip. In addition, ST used its NFC booster technology to enhance the performance of the NFC controller, allowing it to establish robust contactless connections with a small-size antenna, allowing designers even more generous freedom to manage space inside the device and minimize the thickness of new smartphone generations.

WCCTV’s Managed Service Packages offer a solution to these challenges by providing an experienced, qualified and dedicated extension to internal teams. WCCTV’s support team are SIA accredited CCTV operators who work as an extension to the CCTV team, providing all the assistance required to run the surveillance operations seamlessly and effectively.

Appearance Search Technology Integrates with Access Control Manager System

Managed Service Packages Take Control of Your Surveillance

A

vigilon Corporation has recently launched its new Identity Search feature with the upcoming release of its latest version of Avigilon Control Center (ACC) 6.12 software.

W

CCTV has launched a range of Managed Service Packages that have been designed to help users of the Company’s mobile surveillance systems effectively meet their objectives and maximise their investment. Investment in CCTV equipment is critical for many organisations, but in certain cases the ongoing management of the technology can present a headache for teams working on limited time and human resources. With multiple objectives and targets to meet, whether it be responding to footage requests, producing statistics and reports, monitoring cameras or training new team members, the job of running a surveillance programme can be timeconsuming, labour intensive and prohibitive.

Powerful new Identity Search feature utilizes access control cardholder information with advanced AI and video analytics technology to enhance security

Unifying ACC™ software and Access Control Manager™ system, the new Identity Search feature will enable operators to quickly search for a person of interest across an entire site by their access control cardholder information and immediately view linked video clips of door activity. The operator can then use Avigilon Appearance Search™ technology to locate that person’s current or previous location in the facility. “We developed our new Identity Search feature so that our customers can quickly answer the questions ‘who, what, where and when’ and take decisive action,” said Dr. Mahesh Saptharishi, Avigilon’s Chief Technology Officer, “By combining our video surveillance, access control and AI technologies, we’re providing our customers with a powerful and unified security solution to help them proactively monitor and secure their facilities.”

SecurityLink India ■ October 2018

97




National Roundup

Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)

“Security Link India” payable at New Delhi dated__________

* Please subscribe through admin@securitylinkindia.com

WE ARE UPDATING OUR DATABASE For free listing in Database:

For

Advertisement Contact: editor@securitylinkindia.com

* Send your detail to admin@securitylinkindia.com

Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 100

SecurityLink India ■ October 2018




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.