September 2018
Volume III • Issue 2 • Monthly • New Delhi (102 pages including 6 for cover) RNI No. DELENG/2016/68892
` 200/-
REDEFINING SECURITY (India’s Leading Monthly Magazine on Security, Safety & Fire)
Facial Recognition Solution Enhancing Safety & Business Intelligence Active (Ethernet) vs Passive (PON) The Importance of Being Earnest
Rituraj Sinha, Chair FICCI Committee on PSI
Shiv Pratap Shukla MoS, Finance
Dharmendra Pradhan MoSD&E
Infinova Wins Recognition for Its Security Expertise Infinova was selected as a Smart City Project Recommended Brand. It received a Golden Tripod Award for its Facial Recognition and Analysis platform and VS210-P series Facial Recognition Camera.
VS Series Low Light Intelligent IP Box Camera and Minidome Camera ● ● ●
Smart face snapshot High resolution and multi-stream Starlight sensitivity
V2200 Network Video Management Software ● ● ● ● ● ●
Support a maximum of 100,000 video inputs Rich functions of video surveillance andmanagement Support real-time video browsing, search and playback Display real-time status of surveillance points and alarms Support E-maps and E-map zooming Support digital matrix functions such as tour, salvo and alarm management
World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com
From the Editor’s Desk
(102 pages including 6 for cover) Volume III • Issue 2 • September 2018
®
®
ISO 9001-2015 CERTIFIED
Dear Readers, Greetings from SecurityLink India! The government has opened a massive opportunity and market for Indian Drone industry with the recent announcement of Drone Policy by the Aviation Ministry. The policy sanctions the commercial use of remotely piloted aircrafts or drones in India under prescribed parameters. The civil use of drones is currently restricted in the country on various security rationales; but this declaration titled as Regulations 1.0, is the first step ahead that qualifies the use of drones with certain checks lawful, effective 1 December 2018. The draft policy was unveiled last year but security concerns delayed the proclamation. Security is a huge matter of apprehensions and comprehension before we set to exploit drone technologies in our daily practices. This technology has been evolving rapidly around the globe, but many countries are still experimenting with their drone regulations. Besides, no pertinent International Civil Aviation Organization (ICAO) rules or standards have yet been established. The Ministry also cites these justifications for the delay. They state it was necessary to develop regulations at par with the global standards. Therefore, after deliberations for over a year, the Director General of Civil Aviation (DGCA) released this policy that defines what are classified as remotely piloted aircrafts, their mode of operations, and the restrictions wherein they will operate. Drones are of diverse benefits today, which may be used in various domains including but not limited to agriculture, damage assessment of property and life in areas affected by natural calamities, surveys, infrastructure monitoring and surveillance etc. They are also proliferating into recreational field, commercial photography, aerial mapping, and are likely to be used in many other domains. Drones can profoundly aid police, security and investigation personnel to discharge their assignments in terms of surveillance, collecting evidence and so on. For now, the policy does not allow their use in all, and beyond the set limits, but the Ministry is open to upgrading the regulations as the technology advances. The government has certainly taken precautions in drafting clauses at the level of Regulations 1.0; however, their implementation commands extra attention and preparedness. Just after Delhi Police banned flying objects ahead of Independence Day a drone was spotted near IGI Airport by the pilot of a Chennai-Delhi flight, and that was not the first incidence. In the case of violations of regulations, we need the technology and readiness to address them. India doesn’t have the technology to shoot down a drone or disable it. The regulations allowing kids to fly nano-drones of less than 250 grams as toys may also sometimes become dangerous, if not administered under stipulated supervision. The police and intelligence agencies have been reiterating that India’s security environment necessitates extra precautions. Though the move is welcome, we wish the stakeholders all the best and advise them to reinforce the basis and mechanism of execution before the regulations come into force. This issue of SecurityLink India also carries a related INTERPOL article, we trust that would help substantiate your knowledge on the issue from INTERPOL perspective. Till we meet next month, stay safe and happy reading! With warm regards,
10
Santosh Pathak Mob: +91 9968172237
Editor-in-Chief Santosh Pathak Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Vibha Dixit Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
NATIONAL ROUNDUP
SEPTEMBER 2018
CONTENTS NATIONAL ROUNDUP 20
FICCI Private Security Industry Conclave (PSIC) 2018
32
22
Interview – Rituraj Sinha
24
Delhi High Court Orders Unfreezing of SSSDC Bank Accounts
25
Hikvision Participates in FSAI Seminar
33 34 36 37
26
Axis Eye Connect 2018
27
What is Cascading?
28
SIS India Acquires SLV Security Services
30
Hikvision Wins PSI Premier Awards 2018
31
38 39 40
Wavesight Helps Monitor 10 Districts in Karnataka
41 42
InfoSec Foundation Security Symposium 2018 MHA Launches PSARA Web Portal X-Ray Scanners for Premise Security Axis Solutions Day 2018 COM-SUR Helps Protect Bosch, Bengaluru Synology Latest 18-Series NAS Products for India Fortinet Signs Agreement with IBM • Ozone Enterprise Acquires Wallcam • Orbi RBK20 Tri-Band Wi-Fi System for India eInfochips Eragon 660 & 625 Modules India Vulnerable to SamSam Ransomware
REPORT PRIVATE SECURITY INDUSTRY Job Creation & Skill Development
44
FEATURE ARTICLES Facial Recognition Solution Enhancing Safety & Business Intelligence
Active (Ethernet) vs Passive (PON)
12
66 68
SecurityLink India ■ September 2018
Safe & Stress-free Key Management by Smartphone The Importance of Being Earnest School Security Systems Industry
69 83 84
NATIONAL ROUNDUP
SecurityLink India â– September 2018
13
NATIONAL ROUNDUP
SEPTEMBER 2018
CONTENTS APPLICATION/ CASE STUDIES 54
Dahua ITS Solution for Mongolia’s Capital
60
Lenel Secures Little League Baseball World Series
55
OTS Enhances Transmission System for Royal Oman Police Station
61
ST MEMS Sensor Supports Positioning & Control for Cars
56
March’s New Hosted Video Solution for Convenience Stores
62
Arecont Vision Upgrades Security at Monterey Bay Aquarium
57
BrainChip Delivers AI-powered VAs to Police Across Scandinavia
63
March Secures Canadian Retail Cannabis Dispensaries
58
Hikvision Secures Swatantryaveer Savarkar Rashtriya Smarak
• Vicon Enhances Security at County Public Schools
Matrix Secures National Referral Hospital Bhutan
59
64
INTERNATIONAL UPDATES PRODUCT SHOWCASE
14
• IndigoVision Helps Catching Bad Guys in the Dark
72-81 86-97
SecurityLink SecurityLink India India■ ■September August 2018 2018
NATIONAL ROUNDUP
SecurityLink SecurityLink India India■ ■September August 2018 2018
15
Audio made smart & easy.
AXIS C1004-E Network Cabinet Speaker
AXIS C3003-E Network Horn Speaker
AXIS C2005 Network Ceiling Speaker
Axis network speakers are complete high-quality audio systems in a single unit. And because they’re based on open standards, they’re easy to integrate with other systems. Our ceiling and cabinet speakers are perfect for public address system and background music in stores and other settings, such as schools. And with our horn speaker you have a cost-efficient way to deter crime by complementing your video surveillance solution in outdoor settings.
Learn more about our network audio systems at www.axis.com/products/audio
500 MANAGING DIRECTORS OF PSAs 200 CORPORATE SECURITY & INTELLIGENCE PROFESSIONALS WILL EVOLVE A JOINT STRATEGY TO SECURE PEOPLE AND PROPERTIES
13th Annual Conference of CAPSI & APDI 15-16 November 2018
PHD House August Kranti Marg, Hauz Khas, New Delhi For Registration & Queries Please Contact: Regd. Office: 276, Sultan Sadan, West End Marg, Saidullajab, New Delhi – 110030, INDIA Mob. : 9871103074, 9582333948 Landline: +91-11-40820070, 40820071 Email: registration@capsi.in
w w w. c a p s i . i n
w w w. a p d i . i n
We are Guardsmen to the Nation. Media Partner
NATIONAL ROUNDUP
Private Security Industry Conclave (PSIC) 2018 Government Assured Relief in GST • MoUs Signed under RPL Scheme
T
he private security industry is a crucial component of security and safety which is responsible for protecting not only critical infrastructure systems, but also intellectual property and sensitive corporate information. Business establishments rely heavily on private security for a wide range of functions including protecting employees and property, site security, cash logistics operations, conducting investigations, providing information technology security, and many other functions. FICCI has recently organized the sixth edition of Private Security Industry Conclave (PSIC) 2018 with an objective to bring together experts from the government, industry, controlling authorities, user agencies and other stakeholders to discuss and debate various policy and regulatory issues concerning the private security industry. The theme of the event was ‘Job Creation and Skill Development in Private Security Sector.’ The PSIC 2018 was inaugurated by Shiv Pratap Shukla, Minister of State for Finance, GoI, who also released a FICCI-BDO report on ‘Private Security Industry: Job Creation and Skill Development,’ which dwells upon the skill development and jobs creation, policy issues, GST implication and its impact, shift from the unorganised to organised sector, and the need of integration of manpower and technology. Cmdr. Gautam Nanda (Retd.), Associate Partner, BDO India, the knowledge partner for the conclave, gave an overview of the industry, underlining 20
the vital roles of PSI in skill development and job creation. He said that the industry was the largest employer with 8.9 million personnel with a potential to employ 3.1 million more by 2022. The estimated market size of the industry was Rs.57,000 crore and was expected to rise to Rs.1.5 lakh crore by 2022.
GST issue
A
mongst various others, the issue of Goods and Services Tax (GST) imposition on the private security industry was strongly raised on the forum. The FICCI Committee on Private Security Industry sought relief in GST for PSI and put forth three options to resolve the issue. 1. Impose GST only on the service charge, not on total invoice value (18% GST on 10% of invoice value): Private security sector operates
SecurityLink India ■ September 2018
on a cost plus pricing model. Bases for the calculation of per head cost are the applicable minimum wage, and statutory obligations like PF, ESIC, leave, bonus, gratuity etc. The agencies charge 10% or less as their service charge on above mentioned cost structure. Therefore, charging GST on invoice value results in taxing statutory payments. With the payment cycle of 90-180 days, this leads to significant cash flow pressure and even risk of default on statutory compliances. Charging GST on 10% of invoice value would not only enhance compliance but also ease pressure on thousands of MSME entities in private security sector. 2. Shift obligation to discharge GST to the recipient of service: Shifting of GST compliance obligation from PSAs to the service users would significantly ease cash flow pressure and risk of default under high interest burden. The change will also lead to timely GST compliance and eliminate possibility of leakage of revenue for the government. 3. Reduce GST rate from 18% to 5%: Private security has emerged as an essential service to support the government machinery in homeland security activities. With reduction in the GST tax rate from 18% to 5%, pressure from customers on manpower reduction is likely to ease significantly resulting in job protection
NATIONAL ROUNDUP
for private security guards. Lower GST rate is also likely to boost volume of work orders, thereby paving the way for demand expansion and resultant increase in skill development activities, as well as employment generation by private security sector. The minister assured that the Finance Ministry is actively considering FICCI’s recommendations to reduce the GST rate to minimise its impact on the industry and capitalise on its job-creation potential. He said that the government acknowledges the contributions of the private security industry in creating jobs for the poor, ex-servicemen and those who have migrated from villages, and promised that he would do the best possible to reduce the tax. He invited a FICCI delegation to his office to discuss and take the matter further. Rituraj Sinha, Chair of the FICCI Committee on Private Security Industry pointed out that based on the Committee’s discussions with the Finance Minister and the MoS for Finance, there is
a conviction and genuine intent on the part of the government to give GST relief to the industry. Such relief would greatly benefit the small players who have to bear the burden of interest costs, as they have to borrow to deposit GST in advance. The Co-Chair of FICCI Committee on PSI & Chairman, Peregrine Guarding, Maj. Manjit Rajain (Retd.) also expressed optimism towards the serious inclination on the part of the government to give GST relief to PSI.
Skill Development & RPL issue
A
t the forum of PSIC 2018, seventeen MoUs were signed between the Management and Entrepreneurship & Professional Skills Council (MEPSC) and private security companies to impart training to over 3.17 lakhs security guards under the government’s ‘Recognition of Prior Learning’ (RPL) scheme. Addressing the gathering of security professionals Dharmendra Pradhan, Minister of Skill Development and En-
SecurityLink India ■ September 2018
trepreneurship, GoI, said that skilling of manpower is critical for private security industry which is growing at an annual rate of 20-25 per cent. The industry must partner with the government in skilling, reskilling and upskilling of the workforce in order to meet the challenges of new RPL 4.0. He further said that there is a need to make the economy more formal. In other developed countries, skilling, reskilling and upskilling are the jobs of the industry, and the respective governments undergo partnership with the private sector for this purpose. Government of India has shown conviction in the industry and hence has changed the policy to RPL 4.0. There is a need to increase the employable workforce in the country and bring them under the skilling ecosystem. On the occasion, the Minister also felicitated controlling authority of NCT of Delhi, Uttar Pradesh and Haryana for the best practices in the proper enforcement and implementation of PSARA under various categories. Himachal Pradesh was given the special jury award. 21
NATIONAL ROUNDUP
“There’s a long list of issues that we want government to look into, and skilling is one of them. Apart from construction and logistics, the private security industry is among the top five sectors to create jobs in the country,”
said Rituraj Sinha, “The sector has about 53 million security personnel registered with the government’s provident fund scheme. Ms. Manjari Jaruhar, Honorary Advisor, FICCI Committee on Pri-
vate Security; and Rajeev Sharma, Member, FICCI, Private Security Committee and Country Managing Director, G4S India also shared their perspective on the private security sector.
SecurityLink India had an opportunity to interact one-to-one with Rituraj Sinha on the forum. Here are the excerpts:
INTERVIEW Rituraj Sinha Chair – FICCI Committee on PSI SecurityLink India (SLI): What are the achievements of FICCI’s Committee on Private Security Industry over past 6 years apropos addressing the industry issues? Rituraj Sinha: FICCI Private Security Industry Committee has worked relentlessly over the last 6 years to highlight policy challenges that the private security sector has been facing. The Committee has engaged at regular intervals with the Ministry of Home Affairs, Ministry of Labour and Employment, Ministry of Skill Development and Entrepreneurship, and the Ministry of Finance to create enabling policy framework for the growth of the security sector. Our annual industry events have also met with great success and helped highlight the issues of the industry amongst stakeholders. SLI: What has been the success rate of the issues raised by the FICCI Committee to the government authorities? Rituraj Sinha: FICCI Private Security Industry Committee could claim some degree of contributions in terms of securing re-categorization of the security workers as skilled workers under the Minimum Wages Act; notifica22
tion of model rules for cash management operations under Private Security Agencies (Regulation) Act; reduction of GST rate on the fire and electronic equipment from 28% to 18%, amongst others. SLI: What are the impacts of the Goods and Services Tax (GST) on the private security industry and what steps has the Committee taken to assuage it? Rituraj Sinha: By and large, the security industry welcomes one nation one tax policy introduced by the Government of India. Even before the introduction of GST, the private security industry was largely compliant with Service Tax. We believe that the real issue with GST is the 18% slab rate. Security-as-a-service is a basic necessity, and it also has a very significant contribution in terms of job creation. As a matter of fact, it is supporting the government law enforcing agencies in a meaningful way. Keeping all these aspects in view, the GST rate for security services should be reduced to 5% from the existing 18% slab. A lower tax rate shall not only boost demand and aid job creation but also reduce the working
SecurityLink India ■ September 2018
NATIONAL ROUNDUP
capital burden on the security companies caused by the GST compliance. SLI: What are the hindrances which are delaying the success on GST issue, even when the current Government believes that security is the basic necessity for the development of the economy? Rituraj Sinha: The FICCI Private Security Industry Committee has strived very hard to establish credibility with the policy makers. On the basis of several rounds of discussions that we have had with them, one can say with reasonable confidence that Ministry of Finance has this issue at hand. However, it would not be appropriate for anyone outside the government to forecast any such decisions related to the sector, and by when the decision will be taken. . SLI: What are the scope and benefits of the Recognition of Prior Learning (RPL) scheme and how has it impacted/ benefitted the private security industry so far? Rituraj Sinha: Private Security Sector is amongst top 5 employment generating sector in the country. Training and retraining are essential components of the security services. Lacs of guards have been working in the sector for years and have acquired all the relevant skills to perform their duties to an acceptable standard. However, most of them remain uncertified thereby hampering their career growth prospects. The Recognition of Prior Learning (RPL) scheme is a great initiative taken by the Government of India. It would bring dignity and career progression avenues to millions. At this Private Security Industry Conclave 2018, 17 small, medium and large companies executed MoU independently with the National Skill Development Council (NSDC) to certify over 3 lacs manpower under this scheme. SLI: This year, the PSIC forum has included the concept of ManTech collaboration. What is its scope for the industry? Rituraj Sinha: As the minimum wage escalates each year, the cost of security services has also been ramping up aggressively; and at the same time electronic security technology is getting better and cheaper. Customers’ inclination to adapt electronic security technology both for enhancing security apparatus, as well as for optimising loss is very natural. In the prevailing circumstances, it is essential for the private security companies to reinvent themselves from manpower providers to integrated security solution providers. At
the current event, we discussed emerging trends in technology and we were pleased to have a very thought-provoking deliberation on ManTech at the event. SLI: What is your take on the PSAR Act in terms of its viability and effective implementation for the industry? Rituraj Sinha: The Private Security Agencies (Regulation) Act 2005 has given private security industry a level playing field. It has also provided us recognition in the eyes of the government agencies, media and public at large. However, in a vast country like India, the percolation of any central legislation down to the grass root level is a gradual process. Over the last several years, one has witnessed the structured approach adapted by the Ministry of Home Affairs to plug the loop holes and bring to fore the Private Security Agencies (Regulation) Act enforcement as an important agenda. We are hopeful that through greater engagements, PSAR Act enforcement across the country shall bring further tractions. SLI: The recent RBI notification towards minimum operating standards for conducting cash logistics activities is causing abrupt incompetence to a majority of existing players in the field who have been competent so far. How do you address the issue? Rituraj Sinha: We welcome the RBI guidelines for outsourcing of cash logistic operations. Over the last many years, incidents of internal fraud, looting and similar events have brought disrepute to the industry. This situation has prevailed because there was complete absence of minimum operating standards. Even as the Reserve Bank of India notification implementation will cause interim pain in terms of additional CAPEX and OPEX for the sector, this is in larger good for the industry, as well as for the country. SLI: What are the future plans of the FICCI Committee for the private security sector? Rituraj Sinha: The FICCI Private Security Industry Committee will continue to engage with nodal agencies to pursue agenda that will bring out a more conducing level playing environment for the private security companies to operate and thrive in. Private security is a 10 billion dollar sector and has a potential to grow at 20% YoY over the next decade. Our efforts will be to see that the policy environment is enabling, and for this policy reform would be an ongoing pursuit.
SecurityLink India â– September 2018
23
NATIONAL ROUNDUP
Delhi High Court Orders Unfreezing of SSSDC Bank Accounts Maintains that the NSDC order to freeze the accounts is unlawful
T
he Court of Hon’ble Justice Vibhu Bakhruup held that the communication issued by National Skill Develop Corporation (NSDC) on 9 January 2018 to the AXIS Bank directing it to freeze the bank accounts of the petitioner i.e., Security Sector Skill Development Council (SSSDC), was plainly without any authority of law, and accordingly that has been set aside. The Court asked Abhinav Vashisht, the senior counsel appearing for NSDC, to indicate any provision of law that authorises his client to take such action. Mr Vashisht contended that as the petitioner was diverting the funds, and the action was taken in pursuant to the direction issued by the Government of India, it was justified. However, he was unable to cite any provision of law which authorises the Corporation to direct the bank to freeze the accounts. The principal reason for NSDC to have taken the said action stems from an allegation that the petitioner had diverted the grant given by the Government of India. SSSDC does agree that the grant was provided to them some years ago, however, they also confirm that it was fully utilised for the purpose it was given for. At the given stage, the Court didn’t consider whether the allegations made were correct or not; it just examined whether NSDC had any authority in law to direct freezing of the bank accounts of any other entity. The court, however, clarified that the order does not pre-
24
clude the Corporation from initiating any action in accordance with the law including for recovering any amount, which as it claims is recoverable from the petitioner. On the other hand, the court also reserved all rights of SSSDC including their right to pursue remedies in respect to other prayers which were not processed at the stage. A notice issued by the Court in this connection was accepted by the counsel of respondents. Earlier, SSSDC filed the petition, inter alia, praying as under: a. Issue an appropriate writ of Mandamus and/ or such other appropriate writ, order or direction quashing and setting aside the impugned order dated 05.01.2018 and 09.01.2018 issued by the Ministry of Skill Development & Entrepreneurship; and/ or b. Issue an appropriate writ of Mandamus and/ or such other appropriate writ, order or direction quashing and setting aside the impugned order dated 09.01.2018 passed by NSDC. Arvind Datar, the senior counsel appearing for SSSDC, however, restricted the relief in the present petition to the second prayer by which SSSDC challenged the NSDC order whereby they had directed AXIS Bank to freeze the bank accounts of SSSDC. Vaibhav Gaggar, Partner, Gaggar & Partners, who represented SSSDC in the High Court commented, “The way the proceedings went and the judgment of the hon’ble court showed in no uncertain terms that certain bodies are clearly targeting SSSDC and are willing to resort to means which are well beyond their powers under law in order to hurt them. It was inconceivable as to how the bodies concerned were able to get the bank to freeze accounts of SSSDC without following any law whatsoever. The judgment should go a long way in eradicating the arbitrary and strong arm measures which are sought to be resorted to by the concerned parties.”
SecurityLink India ■ September 2018
NATIONAL ROUNDUP
Participates in FSAI Seminar On Hospitality & Banking Security Challenges Pledges Support for Girls’ Schools Security Initiative by FSAI
H
ikvision participated in the recently held one day seminar organized by Fire & Security Association of India (FSAI) on the theme ‘Hospitality and Banking Security Challenges’ at the Lalit, Mumbai. Prabhat Rahangdale, Chief Fire Officer, Mumbai Fire Brigade, and Director – Maharashtra Fire Service was the chief guest at the seminar. Special guest of the event, Maroof Raza, who is the strategic affairs expert on hospitality and banking security challenges delivered the pivotal speech. At the event Hikvision pledged its support for FSAI girls’ schools security initiative where by it will provide CCTV cameras and NVRs to the girls’ schools. The lighting of the lamp ceremony was conducted by Suresh Menon, National Secretary – FSAI; Mahroof Raza; K.P. Dominic, National President, FSAI; Pankaj Dharkar, International President, FSAI: Ashwin Ijantkar, Mumbai Chapter President, FSAI; and Jitu Mahnot,
Mumbai Chapter Secretary, FSAI. “We at Hikvision have the latest AI enabled solutions, which can help resolve most of the banking security challenges. Deep learning technology has empowered the face recognition solutions and banks can apply it for enhancing bank security and business intelligence functions. The advanced video analytics can be used to enhance the customer experience by identifying the VIP customer as he steps inside the bank,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd., “We thank FSAI for organizing a seminar with thought provoking discussions on the hospitality and banking security challenges. We had a good platform to exchange ideas with some of the leading consultants and stakeholders.” He was speaking while participating in a panel discussion on security in banking industry moderated by Pramoud Rao, MD, ZICOM Electronic Security
SecurityLink India ■ September 2018
Systems. The other key panellists were Rahul Yadav – ICICI Bank, Ajit Kulkarni – IDFC Bank, Vinayak Sane, Principal Consultant – Elmark Engineers, Sandesh Kaup, Country Manager – Allied Telesis, Gautam Goradia – Hayagriva Software, and Hariom Sharma – Solus Security Systems. The panel discussion on the security in hospitality industry was moderated by Puneet Garkhel, PwC. The esteemed panel included Manish Kar (ITC, Mumbai), Rajkishore Mahto (Hyatt), Deepankar Chaudhary (Catterpillar), Anup Pimple (Magnetic Auto Control India), Kalpesh Khania – Milestone Systems, Vishwanath Kulkarni (HID), and Ravinder Pal. At the event a special book was released on the draft CCTV codes and standards by Pankaj Dharkar, Suresh Menon, Mahroof Raza, K.P. Dominic and Garry Singh, President IIRIS and Chairman – FSAI Security Committe.
25
NATIONAL ROUNDUP
EYE CONNECT 2018
A
xis Communications and its Alliance Partners recently concluded the three day event – ‘Eye Connect 2018.’ In its 4th edition, the objective of the event was to showcase the latest tech innovation in physical security information management solutions. This year, the theme was ‘Integrated Security Solution – From Myth to Reality’ focused on solutions to address end customer requirements. The event saw participation of 8 vendors and eighty end customers. Commenting on the occasion, Sudhindra Holla, Sales Director, India &
Physical Security Information Management (PSIM) Partners ●● Axis Communications (Video Surveillance). ●● Allied Telesis (Network Infrastructure). ●● Milestone Systems (Video Management Software). ●● Solus (Access Control). ●● Veracity (Transmission, Storage and Display). ●● Herta (Facial Recognition). ●● Pivot3 (Storage). ●● Lenovo.
26
SAARC Axis Communications said, “Eye Connect is a one-of-a-kind event model to bring OEMs, physical security information management partners and end customers together. This year, the event created opportunities, latest innovation updates and success stories for end customers. It presented a holistic system of surveillance including network cameras, analytics, storage, VMS and switches. We showcased our end to end capabilities supporting Indian customers across different industry segments using disparate security systems.” “Eye Connect is an approach to offer an integrated security solution, rather than selling products in isolation. By collaborating with industry leading OEMs and integrators of the PSIM industry, we have been able to integrate CCTV, PID, access control, fire alarms and other HSE systems under one roof,” said alliance partner,
SecurityLink India ■ September 2018
Sudhindra Holla, Sales Director, India & SAARC, Axis Communications giving the presentation
Amit Sarkar, Country Manager, Milestone Systems. Some of the latest innovations showcased within PSIM segments included retail, hospitality, education, critical infrastructure, manufacturing, oil & gas, transportation and smart cities. Surveillance is moving beyond security to other applications. The role of a camera has moved on from passive to intelligent surveillance. As a result, intelligent video is not only used as a security tool, but is emerging as a tool for gathering business intelligence and other applications. With the development and application of technology, it further brings with it a range of challenges for end users, installers and consultants. Additionally, these challenges demand a complete clarity around how one can proactively use technology to manage a seamless integration of various security components.
NATIONAL ROUNDUP
What is Cascading? C
ost of a server is one of the major concerns while considering a multi-location video surveillance solution. Moreover, it is complex to operate server from a central location while monitoring different locations. Matrix video surveillance solution has a special feature
cameras installed at various locations. It follows the architecture of multiple masters and multiple slaves. Hence, one organization can make several master NVRs, sharing their respective camera streams among themselves. For example, a company having two CEOs at dif-
What are the Benefits? ●● Cascading totally eliminates the cost of a server for centralized management and monitoring. ●● There is no need to enter credentials and other settings every time the user restarts.
called Cascading, which eliminates the need of a server for centralized management and monitoring. Cascading is a feature of adding multiple devices on a single network in a user interface (UI) so that all devices can be accessed from one location. This is done by configuring one of the SATATYA devices as master device and the rest as slave devices. Cascading is configured in the monitor connected locally with the device, as well as in the Matrix SATATYA Device Client when the devices are connected on the same network. Network video recorders can cascade up to 20 devices and can receive their camera streams without the need of a server. The master NVR at the central location can receive streams from all the
ferent locations can have access to all camera streams of their branches using their local NVR. Cameras are categorized into three different types in accordance to their configuration in Matrix network video recorders: 1. Branded cameras: The brand and model names of these devices are available in SATATAYA NVR database. 2. ONVIF supported cameras: Open Network Video Interface Forum defines a common protocol for exchange of information like automatic device discovery, video streaming and intelligent metadata between network video devices. 3. Generic cameras: These cameras stream the video on specific HTTP or RTSP URL.
●● It simplifies monitoring by grouping important cameras from different locations on a single screen. ●● If the number of cameras is higher, it also allows sequencing of cameras.
SecurityLink India ■ September 2018
Applications ●● Monitoring a building with multifloors. ●● Monitoring multiple buildings with multiple floors. ●● Monitoring multiple buildings at a single location. ●● Monitoring multiple buildings at multiple locations. ●● Monitoring multiple buildings with multiple central locations. ●● Monitoring multiple buildings with a single central location. 27
NATIONAL ROUNDUP
SIS India Acquires SLV Security Services S
ecurity & Intelliname in the security sergence Services (Invices space with several dia) Limited has recently marquee clients being entered into a strategic served over the last many partnership with SLV Seyears. With this strategic curity Services Private partnership with SIS, we Limited whereby it acwill enhance our ability quires a stake of 51% in to service existing clients SLV. through new solutions, as Headquartered in Guwell as increase our presrugram, SLV was founded ence with new customers The Indian security market is estimated by Vishal Swara and Shyand in new geographies. to be of the worth of Rs.70,000 crores, and it am Swara, and was incorTogether, we believe that is growing at a rate of 20% per annum, as per porated in 1986. The comwe can achieve a higher a Frost & Sullivan Report. The NCR market is pany provides physical growth rate and capture growing at a faster clip with the concentration security, electronic sura larger share of the huge of economic activities, residential veillance, event security/ security market in India.” developments and infrastructure spends by management, and security Rituraj Sinha, Grouthe Central and State governments. consulting services. The up Managing Director, SIS has been looking to consolidate its business currently generSIS Group said, “SLV is market share in key geographies like these ates annual revenues of a well-recognised brand over Rs.240 crores with with a strong franchise in with an objective to emerge as India’s largest majority of them coming the NCR region and seversecurity services provider from the National Capital al blue chip clients. We are Rituraj Sinha Region (NCR). The comglad to have SLV in SIS Group Managing Director, SIS Group pany has 11300 employGroup and we look forees and over 650 customward to leveraging on our ers, and operates at 1,575 partnership to become a sites. It has a good client base comprising both Indian and much more dominant player in the region which will take us international majors in key segments including retail, incloser to our goal of being the No. 1 security services comdustrial, residential, hospitals, automobiles etc. pany in India. Our M&A strategy is focussed on becoming As per the understanding, Vishal Swara will continue the leader in key micro markets and NCR market is one of as the Managing Director of SLV to drive the growth of the them. Through this strategic partnership, the SIS-SLV comcompany further. He will be responsible for the day to day bine shall secure the highest market share in the Gurugrammanagement, and will also determine the strategic direcNCR market.” tions of the business together with the Board. Over the next Earlier, SIS had launched its first B2C service in Gufew years, SIS will increase its shareholding in SLV in a rugram in 2017, under the brand name vProtect which is a mutually agreed manner. home alarms, monitoring and response solution. The SISThis is the first strategic transaction for SIS since its SLV partnership is also expected to offer valuable synerIPO. Last year, the company had notified the stock market gies in targeting the residential market in Gurugram. about its Rs.1000 crore acquisition/ investment corpus. KPMG acted as the transaction advisor to SLV for this Mr. Swara said, “SLV has been a well-recognized strategic partnership. 28
SecurityLink India ■ September 2018
NATIONAL ROUNDUP
With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.
Soft Facility Management
Hard Facility Management
Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.
Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.
Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.
www.sisindia.com A 5000 crore Indian multinational company
SecurityLink India ■ September 2018
29
NATIONAL ROUNDUP
WINS PSI PREMIER AWARDS 2018 Hikvision has recently won two PSI Awards, one each in the categories of Intruder Product of the Year and CCTV Product of the Year 2018
PSI Intruder Product of the Year
P
yronix Enforcer with Hikvision integration has recently won the PSI Intruder Product of the Year 2018 Award for the second consecutive year in a row. “Winning the Intruder Product of the Year is a great accolade, but to have won it for two years consecutively is such a fantastic achievement,” said Laurence Kenny, Marketing Manager, Pyronix, “We are extremely pleased that the Enforcer has once again been recognized as the market-leading intruder product by the installers. We are very proud and appreciative for this.”
Since winning the award in 2017, many developments have been made that have contributed to this success, including the addition of ProControl+, Hik-Connect and Hikvision’s iVMS-4200 integration. These add great value to the Enforcer allowing installers to extend their offerings, compete in new markets, remain competitive, and provide new and desired solutions to end users in a converging industry. Now, installers can offer the best of both worlds in one solution – market-leading intrusion and video combined in one Enforcer system. 30
PSI CCTV Product of the Year
H
ikvision also won the PSI Premier ‘CCTV Product of The Year’ Awards 2018 for the third year in a row. The honoured Hikvision product was the PanoVu mini-series IR network PTZ camera (DS-2PT3326IZ-DE3), which integrates four cameras into one to provide both panoramic video images for general observation or detection and closeups of any areas where more detail is required. The Hikvision DS-2PT3326IZ-DE3 was chosen by PSI readers – mostly surveillance systems designers and installers – who voted on the PSI website. With more than 1,000 surveillance professionals voting each year, PSI’s CCTV Product of the Year category is strongly contested, making Hikvision’s achievement even more gratifying. Gary Harmer, Sales Director for Hikvision UK & Ireland said, “Thanks to everyone who voted for Hikvision, and to PSI for running and hosting the awards. We’re constantly innovating to create surveillance products that provide installers and end customers high performance, industry leading features, and excellent value for money. With a keen balance of wide-angle video, close-up footage, and 3D positioning, the DS-2PT3326IZ-DE3 offers all of these benefits – a fact that was recognised by PSI’s readers this year.”
Former English Footballer Ray Parlour presented the PSI Award for CCTV Product of the year 2018
SecurityLink India ■ September 2018
NATIONAL ROUNDUP
The features behind the award
T
he DS-2PT3326IZ-DE3 offers a range of innovative technology features that are likely to have appealed to PSI’s informed readership. These include 3x fixed lenses that capture panoramic views and 1x central PTZ for capturing more zoomed in views, which collectively support both wide-angle and close-up video. All cameras that are integrated into the product feature crystal-clear video imaging. In addition to these features, the Hikvision DS2PT3326IZ-DE3 provides a range of industry leading security features that installers and customers value. These include user authentication and IP address filtering, and protection against voltage surges.
Finally, but of equal importance, the Hikvision DS2PT3326IZ-DE3 supports highly efficient audio and video compression. This helps customers minimize their data transmission and storage costs, and lower their overall OPEX. PSI is an industry-leading professional security magazine based in the UK, which annually hosts its PSI Premier Awards. This year the event was attended by Ray Parlour, the former England and Arsenal midfielder. The PSI Premier Awards ask industry professionals to nominate and vote for the solutions which catch the attention of the market. By allowing installers to vote for their favourite products and determine the winner, makes it a highlycoveted accolade in the industry.
Helping Police Monitor 10 Districts in Karnataka, India T
he scope of the project included the supply, delivery at site and installation, on a turnkey basis of 90 pan-tilt-zoom (PTZ) cameras across 6 districts in the state of Karnataka. The scope also included: ●● A district control room with four 60 inch LED screens for monitoring and controlling operations. ●● Desktop computer systems with necessary monitoring software for cameras along with UPS to be at every location. ●● A digital video recorder also needed to provide a storage capacity for a minimum of 40 days recording.
Connectivity
T
he cameras at each of the locations in a district are connected to the control room within the district using a wireless network provided by Wavesight such that stream-
ing of the video at each of the locations could be provided consistently and efficiently. The transmission rate was sufficient to ensure that the network bandwidth and network input/ output buffers were optimized. The solution also provided a back haul plan which allowed all installed devices to transmit video to the district control rooms – using open architecture and open standards.
SecurityLink India ■ September 2018
31
NATIONAL ROUNDUP
Enterprise CISOs converge at
InfoSec Foundation Security Symposium 2018 Engages government and enterprise security leaders at the New Delhi summit
A
fter the conclusion of two city security symposiums in Bangalore and Kolkata, Enterprise IT along with InfoSec Foundation, organized its third City Security Symposium and Awards 2018 in hotel The Lalit, Delhi on 9 August 2018. Designed for the CISO, the event was aimed at bridging the knowledge gap among the CISOs. The main feature of the events was the convergence
Besides, cyber security roadmap for financial sector, Industry 4.0, AI and blockchain, startups in IT security ecosystem, agility and flexibility in adopting cyber security for telecom, cloud, infra providers etc., were among the key topics discussed during the event. The theme of the event was ‘Evolving Roles and Responsibilities for CISO in Protecting Digital World.’ The
Dignitaries at the inauguration of the Symposium
of leading cyber security thought leaders under one roof to exchange knowledge, discuss challenges and widen the cyber security solutions landscape for Indian enterprises. The daylong summit featured tech talks and panel discussions focusing on the current security landscape in the country, present and future threats, and the future of information security technologies. 32
event was inaugurated by the Chief Editor of Enterprise IT World Sanjay Mohapatra along with eminent personalities including Sushobhan Mukherjee, Chairman, InfoSec Foundation & CEO, Prime Infoserv; Dr. Sanjay Bahl, Director General, Indian Computer Emergency Response Team (CERT-In); Dr. Ajeet Bajpai, DG, National Critical Information Infrastructure Protection SecurityLink India ■ September 2018
Centre, Govt. of India; Dr. J S Sodhi, Group CIO & SVP, Amity Education Group & Executive Director-Cyborg Cyber-Forensics & Info Security. Dr. Bahl said, “In order to monitor, hunt and detect, apart from issuing alerts and advisories, we also give you the implementation of the best security practices and standards. We have in place the Cyber Swatchta Kendra – the botnet cleaning and malware analysis Kendra. This centre provides you information about whether any of your devices in your organizations have botnets, or malware or any vulnerable services. If you share your external IP range with us, we will be able to give you this information on a daily basis so that you can start taking action. This is a citizencentric service and we also provide free tools to downloading and cleaning your systems.” Prof. Triveni Singh (IPS), Additional Superintendent of Police, Cyber Crime, STF, UP Police, said, “Uttar Pradesh Govt. is more focused on cybersecurity. We have created two cyber crime police stations with jurisdiction area of the entire state. It has 23 cyber labs. We are working on capacity and ecosystem building in order to fight cybercrime. We also have got our trainers trained by various organizations including the premier organizations like CBI and NCRP. Last year we have recorded more than 3000 cases. Now we are thinking of creating a separate vertical to deal with cybercrime.
NATIONAL ROUNDUP
The government of Uttar Pradesh is also thinking of setting up Cybercrime University in Lucknow. In order to tackle the social media spreading wrong news, we are also contrastingly monitoring the social media.” Regarding this event, he said, “It is a good event for spreading awareness. Besides, it is also a place where a lot of solutions are available from the vendors. I would suggest, apart from the Tier-1 cities, you need to do in Tier-2 cities.” Dr. Sodhi said, “Technology and Information have become the new mantra of the digital transformation. We are witnessing a connected world with new business and culture orientation. Business is being transacted at the speed of light and billions of dollars are transferred across the globe. This transition from the industrial to the in-
formation era has created a new security paradigm – new threats to national and human security. With large scale of automation and rapid penetration of ICT, developed nations are enjoying a much better-quality life but this also makes them more vulnerable to cyber interventions. On the other hand, the rising aspirations, easy access and low cost of ICT of the developing nations have created different kinds of security issues. New threats of cybercrime and cyber terrorism, cyber espionage and Cyberwar have emerged making Cybersecurity a strategic imperative at the regional, national and international levels.” The highlight of the evening, however, was Cyber Sentinels Awards 2018 which were given to recognize the work of leading CISOs and security leaders from across sectors for being an able
custodian to their organization’s data by implementing the right security tools and policies. The award winners had been finalized by a jury consisting of eminent cyber security experts, veteran CISOs, and information security journalists. This event was concluded by Sanjib Mohapatra, Publisher, Accent Infomedia Group who gave away the vote of thanks. He concluded by saying, “It was a matter of pride to see the large amount of Cyber Security leaders that formed a part of the event. The event was designed to address the challenges faced by India’s Cyber Security community today and reinforce the infrastructure and domain knowledge through insightful tech talks and panel discussions featuring renowned Enterprise CISOs and Security Experts.”
MHA Launches PSARA Web Portal (www.psara.gov.in)
T
he Ministry of Home Affairs, GoI has recently launched a website www.psara.gov.in on the Private Security Agencies (Regulation) Act 2005, which regulates the private security sector in India. The objective of the portal is to enable individuals, and public and private offices to easily access the provisions of the Act and know whether a particular agency has a valid license. This portal will help enhance the enforcement of licensing provisions and effectively curb the existence of unlicensed agencies. This will also help in improving compliance relating to the verification of antecedents of the employees of these agencies.
This website makes it convenient for the general public to access the Private Security Agency (Regulation) Act, 2005 and Private Security Agencies Central Model Rules along with various instructions/ clarifications issued by the Ministry of Home Affairs time to time. It carries information in regards to the Controlling Authorities, licensed agencies, agencies whose licenses have been cancelled and the reasons thereof, model rules framed under the Act by the states/ UTs, details of valid training institutions, and other related information. Prospective entrepreneurs, who intend to set up an agency in this sector, can extract deSecurityLink India ■ September 2018
tails of their relevance from the website and act accordingly. The portal was launched in a meeting presided over by Rajiv Gauba, Union Home Secretary. Other dignitaries present there were Vivek Bharadwaj, IAS, Joint Secretary (PM), MHA who briefed the Home Secretary about the various issues being faced by the Controlling Authorities and PSAs, Kunwar Vikram Singh, Chairman, CAPSI who made a brief presentation on the size, growth and issues of the private security sector, along with Mahesh Sharma, Secretary General, Jasbir Wasu, and Anil Puri, Vice Presidents, CAPSI. 33
NATIONAL ROUNDUP
X-Ray Baggage Scanners – A Must Have for Premise Security By Kapil Bardeja – CEO, Vehant Technologies
G
lobalization has not only brought people together, it has also introduced extremism at our door steps. The storm of terrorism challenges the current trends of public safety. The places which are accessible to general public such as public transport system, temples, mosques and churches etc., are highly vulnerable in the hands of anti-
social elements who want to create an atmosphere of terror and social unrest. This gives rise to the need of identifying these malicious activities beforehand. Technology renders a solution in the form of X-ray scanning equipment which has come as a boon to the security staff making baggage scanning,
and explosives and weapon detection a cake walk. Apart from security and surveillance, X-ray baggage scanning also plays a crucial role in anti-narcotics, keeping a check on illicit trading and smuggling at international and national borders, to name a few. X-ray baggage scanner is a technological genius which smartly classifies the material scanned on the basis of its composition. It displays either black and white or colour images. The different colors reflected by the machine on the screen are determined by the atomic number of the materials scanned. This helps the operator to easily differentiate between the types of material inside the baggage such as metals, powder, plastic, liquid etc. The main challenge for the operators is to determine what is it that they are looking at, and color imaging helps them do that in a better way.
New technologies in X-ray baggage scanners
T 34
SecurityLink India ■ September 2018
raditional baggage scanners are based on X-ray attenuation tech-
NATIONAL ROUNDUP
nology whereby the detection of the threat objects relies on how various objects differently attenuate the X-ray beam going through them. But, in recent times this capability is enhanced by the use of dual-energy/ view X-ray scanners. Dual view technology produces two screening perspectives that enhance the operator’s ability to identify potential security threats with increased accuracy and speed. It generates a horizontal and vertical (multi-dimensional) view of the object under inspection, which helps in enhanced detection of contraband objects. It is a compact Xray baggage scanning system ideal for checkpoints and small baggage scanning at high security premises such as airports, government offices, railways, MRTS and other baggage scanning applications. Further, numerous optional features such as threat image projection (TIP), network supervisory workstation (NSW), and video management for effective operation can be linked with these new age X-ray baggage scanning systems.
Future X-ray baggage scanners
T
echnology has taken giant strides over the last few years, paving the way for innovations in every field. 3D and artificial intelligence (AI) are some of the new technologies which are rapidly driving changes in many domains like health-care, defence, architecture and entertainment (VR). However, the field of security and surveillance is still in its nascent phase in adopting these new technologies. One such example is the usage of 3D technology. X-ray baggage scanners have shown promising advances for enhanced inspection by providing extra visibility using 3D technology.
Vehant offerings
V
ehant offers two promising X-ray baggage scanners with 3D technology – KritiScan™ 6040R and KritiScan™ 6040DV. KritiScan™ 6040R provides highly accurate virtual images, with isometric view of the scanned baggage by generating three dimensional image of the object resulting into detailed images for enhanced detection capabilities. This enables the security and surveillance personal to view and inspect minute details in baggage scanning. KritiScan™ 6040DV on the other hand has been designed and developed in tunnel size – 600(W)x400(H)mm2. It uses innovative dual view technology to generate a horizontal and vertical view of the object under inspection. Dual view system provide multi-dimensional view of the save object which helps in SecurityLink India ■ September 2018
enhanced detection of contraband objects. KritiScan offers numerous optional features such as threat image projection (TIP), network supervisory workstation (NSW) and video management for effective operation. Technological advancement and standard industry practices have effectively managed to keep security threats at bay. However, it must also be borne in mind that technology is just an aid and in itself, it is a puppet in the hands of its operator. In order to ensure a full-proof security system, the credentials and track record of the equipment manufacturer must be cross verified. Moreover, the installed base of the equipment and service network of the OEM are some of the underlying factors that need to be taken into consideration while choosing and procuring security equipment. 35
NATIONAL ROUNDUP
Axis Solutions Day 2018 Showcasing innovative and intelligent products and technologies for a smarter, safer tomorrow
A
t recently held Axis Solutions Day 2018, Axis Communications, shared implementation details of their large-scale community CCTV Nenu Saitham project in Hyderabad City. The annual event showcased their integrated smart solutions in IP audio, retail suite and thermal cameras. Centered on the theme, The Future in Integrated Security Solutions, the event brought to fore Axis’ recent India success stories and their key takeaways from prestigious surveillance implementations across the country including the Mysore City Palace project. The Government of Telangana has been proactive in adopting a one-of-its kind smart surveillance implementation. With this community CCTV programme, the Hyderabad City Police is encouraging enterprises, public sectors, residential associations and individuals to invest in CCTVs procured from government empaneled firms. They will then setup a monitoring centre in their own colonies which in
36
Axis carries a rich lineage of over 35 years in India and during this time, we have understood the pulse of the India market. With an estimated budget of ₹2.09 lakh crores for smart city programmes by the Government, we are upbeat that high end surveillance solutions are the need of the hour Sudhindra Holla Sales Director – India and SAARC, Axis Communications turn can be integrated with the nearest police stations and the central command center. This will track, monitor
SecurityLink India ■ September 2018
and analyse the video feed for detecting criminal activities, traffic violations and road conditions in real time. According to the project, an entity or individual can buy a CCTV system that will cover the premise entry, exit and parking areas to the extent of 50 yards on the road, along with storage and video screen for self-monitoring within the colony. The Government of Telangana will provide the back-end connectivity to the police stations, command control centre along with real-time video analytics. M. Mahender Reddy, the Director General of Hyderabad Police asserted, “The impact of CCTV installations in Hyderabad City police jurisdiction has been astounding, leading to a huge reduction in overall crime rate by 32% in the last three years (2014-17) and reduction of 90.6% in chain-snatchings incidents during this period. Additionally, the Govt of Telangana is planning to install 15 lakh cameras across the state in the next three years.” Highlighting the efforts that led to the success of the Hyderabad implementation, Sudhindra Holla, Sales Director – India and SAARC, Axis Communications said, “We are proud to be a partner of choice for the Hyderabad community CCTV project. This is an example of community participation towards building a safer and secured smart city. We have 1,500 camera installations across the city to track, monitor and analyze the video feed for detecting criminal activities, traffic violations, and road conditions. With our strong portfolio of product line-up, we
NATIONAL ROUNDUP
aim to support the authorities to deliver high surveillance and build a model smart city and eagerly look forward to the phase two implementation.” Speaking on the Mysore Palace implementation, Sudhindra emphasized, “The project was challenging as the site continued to operate even during the installation. Mysore Palace, being one of the most visited heritage sites of India, we had to ensure that the work was seamless with minimum disruption. We also had to create a multi-point wireless network to ensure the infrastructure had the ability to support new cameras as well as the management software across the area for crowd and queue management.” Axis ‘Smart’ security implementation not only provides a better quality of life with clean and sustainable environment, but also promises a safer city. Some of the major smart city implementations include Aurangabad, Bhavnagar, Kolhapur and Junagadh. In the retail and hospitality segments Axis smart implementation includes Café Coffee Day and Novotel Goa Shrem Hotels, respectively. One of the prominent installations in the education segment is Dayalbagh Educational Institute. Video surveillance has seen a paradigm shift in India with security becoming a priority for both the Government and enterprises. With an increase in the number of cyber-attacks which exposes vulnerabilities, dealing with well-resourced cybercriminals becomes a challenge. If left unaddressed, these could lead to networks being breached, ransomware to be planted or, be responsible for costly downtime. The answer is to be proactive and systematic for ensuring that patches are implemented as soon as they are available. Recording high-resolution videos with in-built compression is what today’s IP video surveillance capable of. There are multiple benefits of using IP-based surveillance to provide efficient security in the smart cities arena, like video analytics, environmental sensors and support in law enforcement for departments to gather evidence during investigations. Further integrated, with IP Audio, it can be used to make scheduled or live announcements, and to track security violation in manufacturing/ industrial sites. On the other hand, thermal cameras using thermal imaging and enhanced low-light capabilities have taken the smart surveillance a step ahead. With built-in analytics, such as Video Motion Detection helps detect motion from moving objects within a predefined area, these intelligent solutions are useful for environments where privacy is of utmost importance like – schools and care homes.
COM-SUR Helps Protect Bosch, Bengaluru A
fter great success in Chennai, COM-SUR has once again joined hands with Bosch India to help protect their Bengaluru factory. COM-SUR, the CCTV video footage auditing, smart backup and intelligent reporting software, has been deployed by Bosch India for the second time to complete workflow of video surveillance. “This is a great honour for us at COM-SUR that Bosch which is a camera manufacturer themselves has once again recognised the value and potential of our technology. The ability to audit their video footage regularly with such ease and efficiency was of prime importance to them. It has been a pleasure working with their team, who also share our philosophy,” says Gautam Goradia, CEO & MD, COM-SUR. With the regular and dedicated use of COM-SUR, Bosch has far greater prospects of: 1. Achieving crime, fraud and loss prevention. 2. Solving crime faster. 3. Improving processes, compliance, safety. 4. Improving employee performance, customer satisfaction, and sales. 5. Gaining situational awareness, actionable intelligence. 6. Reducing data size and remote storage. 7. Standardizing multiple activities related to CCTV/ surveillance. Besides, they shall also be able to audit hours of video footage from multiple cameras in minutes; remotely store huge amounts of relevant data; search, tag and retrieve data easily, quickly create videos from multiple cameras in single MP4 file; create and share intelligent audit/ incident reports and gain business intelligence based on patterns etc.
SecurityLink India ■ September 2018
37
NATIONAL ROUNDUP
Latest 18-Series of Products in India Diversify their product range for enterprise models in the market
S
ynology has launches their latest series of products in India; adding to its existing 18-series. The series includes DS118, DS218, DS218play, DS1618+, RS818(RP)+, RS2418(RP)+, RS2818RP+, RS3618xs and RX418. “Following on from the success of the first batch of 18-series release in April, we are elated to announce the launch of latest 18-series products in India. This launch will diversify our product range of 18-series in the market, especially for enterprise models, and therefore can provide customers with more choices for suitable storage solution,” said Mike Shay, Sales Manager of Synology Inc.
New 18-series Synology NAS products
D
S118, DS218: These 1 and 2 bay 18-series entry-level NAS servers are ideal for small offices and home users. Equipped with Intel®quad-core 1.4 GHz processor, these versatile yet budget-friendly NAS servers can provide good performance for not only personal cloud storage but also data backup and synchronization, media streaming, photo management, file sharing, and other tasks. The intuitive interface of
38
DSM allows you to manage, protect and share all your digital assets easily and efficiently. DS218play: DS218play supports real-time transcoding of 4K Ultra HD source content, which made it ideal for serving as the home multimedia center. With the availability of centralized management, DS218play is ideal for fast file sharing and reliable backup for all types of devices. Besides, DS218play is an ecofriendly solution with the consumption of only 16.79 W in regular operation. RS818(RP)+, RX418, RS2418(RP)+, RS2818RP+: These three high-performance and scalable plus series rack stations are specifically engineered for growing small- and medium-sized businesses. RS818+/ RS818RP+ comes with a quad-core processor with the AESNI hardware encryption engine, quad 1GbE LAN ports, and optional 10GbE NIC support. The storage capacity of RS818+/ RS818RP+ can be further expanded with Synology expansion unit RX418, providing up to 8 drives for flexible data management and backup.
SecurityLink India ■ September 2018
Powered by Intel® C3538 CPU, Atom® RS2418+/ RS2418RP+ offers great flexibility in terms of expandable storage capacity (up to 24 drives with one RX1217/ RX1217RP) and upgradable memory (built-in 4GB DDR4 UDIMM, up to 64GB). Equipped with a PCIe 3.0 slot, RS2418+ supports installing an M.2 SSD adapter card or 10GbE NIC for a high-IOPS system cache and ultra-fast data transmission. RS2818RP+ is Synology’s first 3U RackStation NAS in the Plus Series product line. RS2818RP+ is powered by an Intel® Xeon® D-1521 quad-core CPU and 4GB DDR4 non-ECC UDIMM RAM (expandable up to 64GB). The four plug-and-play Gigabit Ethernet LAN ports can be expanded with higher performance 10GbE NICs. The 3U chassis design accommodates up to 16 drives and the storage capacity can be further scaled up to 28 drives when connected to one expansion unit RX1217(RP). RS3618xs: Synology RS3618xs is a 12-bay rackmount NAS providing excellent performance, effortless capacity scaling and optimized virtualization solutions for expanding businesses with demanding business applications. Features an Intel® Xeon® D-1521 quad-core CPU and 8GB DDR4 ECC UDIMM RAM (expandable up to 64GB), RS3618xs has high scalability with up to 36 drives. Complete virtualization solution with Synology Virtual Machine Manager is supported in this model too.
NATIONAL ROUNDUP
Signs Cyber Threat Information Sharing Agreement with Proactive threat sharing collaboration to provide enhanced protection for customers
F
ortinet and IBM Security will collaborate through the bi-directional sharing of cyber threat information. The goal of the agreement is to proactively combat cyberthreats and threats to privacy globally through the sharing of contextual threat information generated by the Fortinet FortiGuard Labs threat research team and IBM Security’s X-Force research team. IBM Security and Fortinet will directly collaborate through bi-directional sharing of threat intelligence using secure channels. Joint threat information sharing will deliver deep security research expertise and global threat intelligence for increased protection for the customers of each company. IBM Security and Fortinet global threat research teams monitor and analyze security threats from a variety of sources, providing valuable and near real-time threat intelligence. By integrating the threat intelligence feeds from each company, customers will now benefit from more thorough data being available.
Ongoing cooperation between Fortinet & IBM
W
hile the agreement formalizes the cooperation between Fortinet
and IBM Security in regards to threat information sharing, both organizations have already been working together in regards to comprehensive security protections. IBM Security has been a Fortinet fabric-ready partner since 2017. Fortinet’s open approach extends the broad visibility, integrated threat prevention, and automated response of its security fabric architecture through well-defined APIs to IBM for unified security management and security incident response. SecurityLink India ■ September 2018
In addition, Fortinet earlier this year announced collaboration with IBM on its IBM X-Force Threat Management Services. Working with IBM Security on X-Force Threat Management Services enables both organizations to further provide mutual customers with threat insight, attack detection and prevention, and an integrated defensein-depth strategy designed to seamlessly span across an organization’s entire attack surface. Caleb Barlow, Vice President threat intelligence, IBM Security said, “By entering relationships with trusted partners like Fortinet, IBM is able to construct a clearer picture of the global threat landscape. Today, threat actors are highly skilled, organized, well resourced, and able to operate globally and swiftly. In order to defend effectively, we must operate with that same speed and develop informed, accurate counter-measures. The kind of collective defense we’ve formed with Fortinet helps IBM better protect clients and communities by equipping us with additional intelligence that enables us to respond to emerging threats more quickly and more completely.” 39
NATIONAL ROUNDUP
Ozone Enterprise Acquires WallCam Diversifies into the fast growing Security and Surveillance business
O
zone Enterprise Group, an Everstone PE Capital funded company and leading player in the Architectural Hardware industry, announced its acquisition of ‘WallCam,’ a company engaged in security and surveillance business in India. The acquisition will make ‘WallCam’ a fully owned subsidiary of Ozone. The acquisition process, which is in its final stage, will be completed soon. Ozone sees a lot of synergies in the business with its existing business lines, and will accelerate and strengthen WallCam’s model of working through its R&D, manufacturing and re-seller partners. Ozone has a diversified The idea behind acquiring Wallpresence in architectural Cam was to give a head-start to our hardware, safes & vaults, diversification plans, get accesses to WallCam’s existing business, the locks, fire & safety doors brand, sales & distribution network. and urban furniture. The We are excited about this new move brand is among the top 3 as it is in synergy with our growth ambitions and abilities players in safes and locks in – Alok Aggarwal the country. The group has Founder & Managing Director, Ozone Enterprise Group been actively exploring options to diversify into new businesses, security and surveillance being one of them. Talking about its business aspirations, with its aggressive growth and diversification plans, the group is eyeing Rs.1,000Cr turnover by FY 2021. The company plans to invest over Rs.100Cr in next 2 years on diversification primarily on building manufacturing capability for CCTV cameras and other security and surveillance products and IoT in India. Ozone Group already has international tie ups for product and software and are also looking at fresh equity influx to fund expansion in electronic security and surveillance business. A significant amount of this equity influx will be dedicated for a greenfield manufacturing unit for electronic security and surveillance under the ‘Make in India’ initiative of the Government. “Security and surveillance is one of the fastest growing industry in India. The market size of the industry from the current $1Bn is likely to grow 2.5 to 3 folds by the end of 2021. We have been actively exploring options to diversify into this industry and after contemplating both organic and inorganic options, we finally narrowed down on taking the inorganic route with the WallCam acquisition. We are all geared up to make the most of the market opportunity and will soon be seen as one of the prominent players in the market,” said Mr Aggarwal. Ozone’s solution centric approach has enabled them to grow from a start-up to becoming India’s most popular architectural hardware solution provider, which has been able to prove its worth in international markets. The company has a global presence across 15 countries, 4 R&D centres in Israel, Korea, China and India, and 4 state-ofthe-art factories in India and China. Ozone offers internationally certified products & solutions through its product portfolio of more than 3000 SKUs across various product categories. Ozone has strong presence internationally with offices in India, Canada, Australia, Dubai and distributor’s network in Poland and Saudi Arabia. 40
SecurityLink India ■ September 2018
Introducing Orbi RBK20 Tri-Band Wi-Fi System in India Designed for a broader range of homes and budgets
N
ETGEAR Inc., has introduced NETGEAR Orbi RBK20 Wi-Fi Router and Satellite that delivers unparalleled Wi-Fi coverage. It covers homes up to 4,000 square feet with strong Wi-Fi signals, and the innovative Tri-band WiFi helps maximize the Internet speeds available at home. Orbi RBK20 has a unique, industry-first tri-band architecture with a dedicated 5GHz wireless connection between the router and satellite, which provides both reliable Wi-Fi coverage and maximum internet speed throughout
NATIONAL ROUNDUP
Eragon 660 and 625 Modules Based on Qualcomm Technologies’ Processors for Applications Requiring On-device Artificial Intelligence (AI) Deliver new and advanced capabilities that developers can use to participate in the large and growing IoT opportunity
e
the home with a single network name. The new Orbi systems deliver industryleading 802.11ac AC2200 Wi-Fi speeds up to 2.2Gbps. “Wi-Fi is now considered to be a necessity for every household. People are not expected to be contended with a wireless network that does not deliver the required coverage and performance. With the introduction of new Orbi RBK20 Tri-band WiFi systems, we aim to provide a broader range of Wi-Fi solutions with maximum Internet speed,” comments Marthesh Nagendra, Country Manager – India & SAARC, NETGEAR. With the increase in demand for better Wi-Fi throughout home, the Orbi RBK20 addresses a broad range of home environments, from apartments to sprawling estates. The 2.2Gbps WiFi is enhanced by FastLane3, and the coverage increased by four high-gain internal antennas. It has dedicated TriBand Wi-Fi and works on a single network name.
Infochips (an Arrow Company) has launched Eragon 660 and 625 modules for companies to accelerate the time-to-market for products using the Qualcomm SDA660 and Qualcomm APQ8053 processors, respectively. The addition of these Qualcomm Technologies’ processors to the Eragon 600 series allows eInfochips to address the growing demand in advanced computing and video processing on handheld devices. “This work with eInfochips allows large numbers of innovators to create exciting products and solutions using the technologies that transform how the world connects, computes and communicates,” said Joseph Bousaba, Vice President of product management at Qualcomm Technologies, Inc., “These Eragon 660 and 625 modules from eInfochips deliver new and advanced capabilities that developers can use to participate in the large and growing IoT opportunity.” Eragon 660 and Eragon 625 modules can work as building blocks for embedded products requiring solutions for gaming, 4K camera, smart HMI, digital signage, medical imaging, and more using on-device AI. The Qualcomm SDA660 processor at the heart of Eragon 600 is a powerful processor, featuring the Qualcomm® AI Engine, Qualcomm Spectra ™ 160 ISP, Qualcomm ® Kryo ™ 260 CPU and Qualcomm® Hexagon™ 680 DSP with vector extensions. At the same time, the Qualcomm APQ8053 which powers Eragon 625 is designed to provide fast connectivity, vibrant visuals, and exceptional performance for immersive experiences. The Eragon 660 and 625 modules come pre-integrated with Android, making them ideal for prototyping and parallel development of hardware and software solutions. “eInfochips offers custom hardware design and manufacturing solutions, based on Qualcomm Technologies’ processors, by leveraging comprehensive experience of 200+ designs and a strong ecosystem of contract manufacturers associated with Arrow Electronics. As an early adopter of technology, eInfochips is already engaged with its customers in the design and development of Smart HMI and IoT solutions based on the Qualcomm SDA660 processor,” said Parag Mehta, Chief Business Development Officer at eInfochips. eInfochips, an Arrow company, is a leading global provider of product engineering and semiconductor design services. The company’s service offerings include digital transformation and connected IoT solutions across various cloud platforms, including AWS and Azure. SecurityLink India ■ September 2018
41
NATIONAL ROUNDUP
New Report by Skybox Research Lab Claims
India as One of the Most Vulnerable to SamSam Ransomware
A
new report from Sophos says that since its first appearance in December 2015, the SamSam ransomware has raked in almost $6 million by targeting organisations and individuals around the world, including those in India. According to the 47-page report, 74 percent of the known victims are based in the United States. Other regions known to have suffered attacks include Canada, the U.K. and the Middle East, with India ranking sixth among the top victim countries across the world. The cybersecurity firm also revealed in a separate survey that 90 percent of the businesses in India have been either hit or expected to be hit by ransomware, and it’s expecting that Indian business will see an increase in cyber attacks in the near future, and SamSam ransomware could be one of them.
es should be the first line of defense. Preventing an attack (or being able to respond and isolate it quickly) requires a strong security foundation that is built on the complete visibility of the network. This pervasive visibility gives IT teams the ability to quickly identify potential exposures and attack paths. Skybox gives that visibility by consolidating data from more than 120 networking and security technologies that organizations have in use. The Skybox® SecuritySuite uses this information to create a dynamic model of an attack surface including physical, multi-cloud and OT networks where needed. The model provides context around all of the ingress/ egress points and complexities of the network and assets, thereby giving a detailed understanding of what a user is trying to defend. After building the model of the environment, Skybox will conduct a risk analysis to identify and prioritize weaknesses and vulnerabilities such as unprotected ingress/ egress points, misconfigured network devices, firewalls with overly permissive rules, exposed assets, exploitable attack vectors etc. Following the initial resilience assessment, the riskiest characteristics of the environment can be remediated to reduce risk quickly and in a demonstrable way – for example by addressing parts of the infrastructure for which there are no firewalls or where these are configured incorrectly; filling in vulnerability scanning blind spots; and recommending remediation and mitigation for high-risk vulnerabilities. Acting on this insight, the environment will immediately be more secure and resilient. If an attack or malware outbreak does occur, the user has a greater context to contain the attack quickly and eliminate the vectors.
90 percent of the businesses in India have been either hit or expected to be hit by ransomware, and it’s expecting that Indian business will see an increase in cyber attacks One is not like the in the near future, and others ifferent from the traditional SamSam ransomware ransomware attacks, SamSam’s thorough encryption renders could be one of not only personal and work data files unthem usable but also any program nonessential to
D
Windows operation, most of which are not routinely backed up. Unlike nearly all other ransomware attacks, much of the attack process is manual. Once inside a system, the attacker spread a payload laterally across the network; a sleeper cell awaits instructions to begin encrypting. The result of SamSam attacks is often that numerous victims are unable to recover adequately or quickly enough, and therefore decide to pay the ransom.
You can’t secure what you can’t see
W
hile the infection method of the SamSam ransomware is still unclear, as always, cyber hygiene practic-
42
SecurityLink India ■ September 2018
NATIONAL ROUNDUP
SecurityLink India â– September 2018
43
REPORT
Private Security Industry Job Creation and Skill Development T
he demand for security services is increasing due to rising urbanisation, the real and perceived risks of crime and terrorism, belief that public safety measures are insufficient, and the growth of a middle class with assets to protect and means to pay for supplementary security measures. The security service market is also supported by an improved economic environment and building construction activity. The Indian personal security market was estimated at INR 57,000 crore (USD 8.8 billion) in 2016 and is likely to touch INR 99,000 crore (USD 15.2 billion) by 2020, and INR 1.5 lakh crores (USD 23.1 billion) by 2022. Apart from revenue growth, the private security industry (PSI) is also evolving in its employment practices. Leading industry players are setting new standards by focusing on training and skill development of their people and customer satisfaction, establishing employee
welfare funds, ensuring timely payment of salaries, and defining career progression paths for high-performing employees. The private security industry is amongst the largest employers in India, employing almost 8.9 million people, with the potential to employ 3.1 million more by 2022. The PSI also has a unique distinction of being the largest corporate tax contributor to the national exchequer. As per a study by The Guardian, the global market in the year 2017 was USD 180 billion and is expected to be worth USD 240 billion by 2020. In contrast, the Indian private security industry (PSI) is expected to grow faster at about 20% CAGR owing to the changing landscape of the sector in India. However, there remains a shortfall of manpower of about 30% with a potential to generate a number of jobs for the rural and urban poor.
T
he private security sector has emerged as a major industry by virtue of the employment of large manpower, both skilled and unskilled, to meet the burgeoning demands of the corporate sector. With national security assuming greater criticality and lower police to people ratio in the country, private security industry can act as extended arms of the law enforcement agencies. This will help relieve police forces from non-critical duties to focus on core areas. With the anticipated growth of the industry, the employment opportunities are tremendous. Since, majority of the workforce employed is in the unorganized sector, the potential for skilling is evident. Current time requires private security personnel to multitask and use technology to perform security, safety and facilitation functions. Skill development, especially Recognition of Prior Learning (RPL), reskilling and upskilling are key issues, and therefore, investment in human capital is vital in preparing this industry to take on greater responsibilities. The regulatory framework governing this industry also needs proper enforcement. Unorganized segment has largely remained unchecked and players usually skip adhering to mandatory compliance requirements, which creates a detrimental impact for all stakeholders including employees and clients. It is imperative for the governments to ensure strict enforcement of the regulations that will improve service delivery quality levels as well as work environment for the security personnel. – DILIP CHENOY, Secretary General, FICCI 44
SecurityLink India â– September 2018
REPORT
T
he Indian economy, as per the latest World Bank figures, is now the world’s 6th largest economy, and is expected to grow at 7.4% in 2018 and 7.8% in 2019. With the economy and businesses growing, security needs are also expanding, which is further necessitated by the ever-increasing security risks and related threat perceptions. Deployment of specialised personnel and systems to prevent and manage security risks and threats including accidents and incidents are vital for peaceful operations at a place. Therefore, the need for implementing security measures and systems at public places such as airports, railways and metro stations, shopping malls and markets, hotels and public utilities, as well as industrial complexes, commercial spaces, offices and residential blocks has risen multi-fold. Indian Private Security Industry (PSI) has also expanded at a compounded annual growth rate (CAGR) of around 20% over the last decade by adding new players in the field as well as scaling their operational capabilities. In fact, private security in India is the 2nd largest sector, after agriculture, in terms of employment, with close to 9 million employees. Traditionally, it has been an unorganised sector with only around 40% of the market share with the organised players. However, the industry is progressing towards being organised as the consumer demand for security is gradually evolving from a mere guard to a professional and skilled guard, trained for movement of men and material, fire incidents, medical exigencies etc. Further, technology is progressively playing an ever-increasing role in the valueadded services being offered by the industry that include artificial intelligence, internet of things, hi-tech surveillance systems, biometric technologies, remote sensors, cyber security etc. CDR GAUTAM NANDA Leader - Aerospace, Defence & Security Associate Partner - Government Advisory, BDO India LLP
Workforce size of PSI is more than the combined strength of the Army, Navy, Air force and Police put together. With 8.9 million security guards and 1.9 million police officers, India has 5 times as many private security guards than police officers. The sanctioned strength of police personnel (civil and armed) in 2016 was just 2,464,484, which the employment in the PSI far exceeds. The following table shows data derived from Forbes and Statista estimates, depicting the ratio of personnel employed in private security to that in police force in selected countries. Country
Ratio of personnel in Private Security to Police Force
India
83:17
South Africa
71:29
Brazil
71:29
Japan
65:35
China
65:35
United Kingdom
61:39
United States
58:42
Russia
57:423
Germany
50:50
The figures show that India whilst topping the list, far exceeds other countries in terms of the divide between personnel employed in PSI and police force. Clearly, there is a vast potential for the large workforce in PSI to provide allied police services along with the law enforcement agencies to fill up the current gap. However, it would require an appropriate policy framework. Some of the allied police services which are globally outsourced to private security are: ●● Security of the outer periphery of prisons and transportation of prisoners. ●● Senior citizen preventive security services. ●● Street surveillance and video control room management. ●● Assist police in handling emergencies and disasters. ●● Background verification of employment applicants. ●● Security management for events and festivals. ●● First-level response to home security alarm activations. ●● Delivery of summons, and chip-based tracking of the prisoners on parole. Identification of different job roles under the PSARA, streamlining of recognition of prior learning, empowering of service providers to be a part of the training effort under PSARA administered by states, and ensuring quality of trainers, assessors and the training being imparted through
SecurityLink India ■ September 2018
45
REPORT
NSDC will further boost the growth of the industry by giving an identified progress path to the candidates seeking to make a career in this industry. With the highest growth being in the security industry compared to any other industry, GoI schemes to boost the skilling effort by way of provisioning of subsidies through schemes like PMKVY should be introduced. KEY GROWTH DRIVERS
Increase in crime rate & terrorism
Exponential rise in the number of banks and expanding ATM network
Rising urbanisation spike in demand of tier-I & tier-II cities Low police to people ratio of 150:100,000 Penetration of organised players, foreign players through FDI
Growth in security solutions Institutional and organisational change Government initiatives like Smart Cities & Make in India Increased concern for personal safety Potential for increase in security advisory services & low cost services
Industry structure
T
he Private security industry can be broadly divided into 2 major segments – security services and allied services.
Security service industry
A
major part of the security services industry is the manned guarding followed by cash and electronic security. Manned guarding accounts for nearly 75% of the industry followed by cash services management and electronic security services having nearly 20-25% share. ●● Manned guarding: A major part of the security services industry is the manned guarding where they have the highest employment rate and the highest revenue share in the PSI. Key users of manned guarding services are IT/ ITES, retail, commercial, and manufacturing wherein 41% of the manned guarding services are utilised in the commercial sector and 39% in the residential sector. Further, 70% of the residential sector demands is coming 46
from major cities like New Delhi, Chennai, Bangalore, Pune, Chandigarh, Lucknow, Ahmedabad and Jaipur. ●● Cash management services: This is predominantly organised, with 7-8 players controlling 75-80% of the market share owing to high level of security concerns associated with operations in this area. The market is not yet mature as there are issues related to licensing of arms, and transfer of liability and insurance, which are making this segment a high risk and low return business. However, there has been an increase in demand for cash management services in view of expanding bank branch network, increase in number and spread of ATMs across the country, and growing use of debit cards. The cash management services offered by PSI are: ²² Cash replenishment services for ATM network of banks. ²² Movement of cash and high value items within bank’s branch network. ²² Cash pick-up and delivery for large corporate houses, retail outlets etc.
Allied services
T
he Allied services aid the segments in provision of security services. It consists of Event Security Management and Security Guard Training. ●● Event security management: Event security service providers employ unique command and control methodology enabling the client to focus on their event without worrying about security. Major activities under event security management are crowd control and VIP protection services. These services aid in security and emergency management planning also. ●● Security guard training services: The introduction of the Private Security Agencies (Regulation) Act, 2005 has led private security agencies to adopt in-house training practices which are certified under PSARA by respective states. States have authorised the opening of training institutes recognised by them under PSARA. Sector skill council which is the authority on NOS/ QPs related to the subject, also has a number of training partners (TPs), who undertake the training; however, the trainees need to be certified by a PSARA certified training agency to be employed as a security guard. The training sector, due to PSARA not recognizing the training conducted by private TPs affiliated to sector skill council, is unorganised and fragmented.
SecurityLink India ■ September 2018
REPORT Report | Private Security Industry 06
Skill Development and Job Creation
little or no relevant experience. The private security services industry is mainly unorganised and only 10% workforce is employed in the organised sector. With the anticipated growth potential of industry, the employment potential is evident. Further, considering that majority of the workforce is being employed in the unorganised sector, skilling potential is also evident.
Industry size & employment potential
G INDUSTRY SIZE AND EMPLOYMENT POTENTIAL
lobally, and in India, manned guarding forms a major part of the private security service industry, constituting almost 75% of the private security services industry. The 8.9 million private security guards and supervisors are employed in more than 22,000 private security agencies (PSAs) in India, mostly managed and run by ex-servicemen as their resettlement projects. Report | Private Security Industry 06 Workforce is largely sourced from northern, central and eastern ofIndia, India,manned with states like Bihar, Pradesh, Globally,parts and in guarding forms Uttar a major Madhya Rajasthan and industry, Assam contributing part of thePradesh, private security service constituting the almost 75% ofRegions the private services industry. maximum. withsecurity significant population ofInex-serIndia, the private security industry is one of the largest vicemen, paramilitary personnel and unemployed youth are employment generating industry; it currently employs biggest nearly 8.9contributors. million people and as per a conservative estimate has the potential to employ million more by Security guards constitute 90% 3.1 of the private security 2022. industry workforce. They form the base of the pyramid with
AND EMPLOYMENT POTENTIAL
The 8.9 million private security guards and supervisors are
ms a major employed in more than 22,000 Private Security Agencies constituting ndustry. In (PSAs) in India, mostly managed and run by Ex-Servicemen the largest as their resettlement projects. y employs rvative lion more byWork force is largely sourced from Northern, Central and
Eastern parts of India, with states like Bihar, Uttar Pradesh, Madhya Pradesh, Rajasthan and Assam upervisors are contributing the maximum. Regions with significant ity Agencies population of ex-servicemen, paramilitary personnel and Ex-Servicemen unemployed youth are biggest contributors.
Central and Security guards constitute 90% of the private security , Uttar industry workforce; they form the base of the pyramid am nificant with little or no relevant experience. The private security ersonnel andservices industry is mainly unorganised and only 10%
workforce is employed in the organised sector. With the
e security anticipated growth potential of industry, the employment e pyramid potential is evident. Further, considering that majority of ivate security the workforce is being employed in the unorganised only 10% Primary source of workforce or. With the sector, skilling potential is also evident. e employment at majority of ganised Source:http://www.nsda.gov.in/skill%20gap%20report/sector%20skill%20gap%20repor
Skilling landscape
National Skill Development Corporation (NSDC)
A
n industry with such a large size and employment potential, requires appropriate skilling to ensure job creation as well as presence of appropriately skilled manpower. The Security Sector Skills Development Council (SSSDC) under NSDC, till Jan 2018 before it got subsumed into Management Sector Skills Council, identified the following 8 job roles for the sector: ●● Unarmed Security Guard ●● Armed Security Guard ●● Security Supervisor ●● CCTV Supervisor ●● Security Officer ●● Personal Security Officer ●● Assignment Manager ●● Investigator The training curricula and skills assessment frameworks were defined by the sector skills council under the aegis of the National Skill Development Corporation (NSDC) and accordingly, qualification packs (QPs)/ national occupation Primary source of workforce standards (NOS) were developed for the above mentioned job roles. The NOS provides scope of the job roles in addition to prescribing the performance criteria, technical/ doSource:http://www.nsda.gov.in/skill%20gap%20report/sector%20skill%20gap%20repor t/Private_Security_Services.pdf main knowledge required for the specific job role, as well
t/Private_Security_Services.pdf
HUMAN RESOURCE TREND - PSI
HUMAN RESOURCE TREND - PSI
12 8.32
2016
7
2012
8.9
2017
7.41
2014
12
2022
8.32
8.9
2016
2017
Human Resource employed (in million)
2022
Human Resource employed (in million)
ges/annual%20report/Annual%20Report%202016-2017%20-%20English.pdf
Source: http://www.skilldevelopment.gov.in/assets/images/annual%20report/Annual%20Report%202016-2017%20-%20English.pdf
SecurityLink India ■ September 2018
47
REPORT The key challenges in training standards are as core/ generic and professional skills for carrying out the activities. Sector skills council also provided programs for training of trainers as well as training of assessors, and had formulated a protocol on accreditation of assessment bodies and certification of trainees and trainers for PSI on a pan India basis. While the NOS describes the skilling requirements, there are no prescribed training standards or procedures provided by the sector skills council for each of the 8 identified job roles listed above. Based on the inputs received from industry sources, the employers see the following skill gaps in the current workforce: Job roles Unarmed security guard
around lack of uniformity and minimum standards in training across security companies. Many firms do an ad-hoc job of training, many times not fulfilling the bare minimum set by PSARA. Even in cases where the quality in terms of number of hours are met, the quality of trainers, instruction material is not relevant and outdated curity guards, whereas in contrast, sector skills council under NSDC has specified 8 different job roles as required and being employed by the industry.
Skill Gaps Guards need more rigorous training on fitness, firefighting, english communication skills Guards need more rigorous training on fitness, firefighting, english communication skills
Recognition of Prior Learning (RPL) and Refresher Training
T
he existence of the security industry (and other indusTeam management skills, medium-term vision and tries) pre-dates the initiative to Security supervisor resource planning are key issues faced by the indusconduct skilling and training in an try currently organised manner. Thus, there exProficiency in handling of firearms; awareness levists a large tranche of manpower Armed security guard els about safety in handling which has been trained over a peProficiency in local languages of regions where the riod of time and has learnt to carry Personal security officer security guards are employed out their trade while on job. For a system to suddenly shift to a certification-based acceptability of training acumen, it is but Many customers increasingly prefer personnecessary for the existing trained manpower to be certified nel with good soft skills (English communication, and to this effect Recognition of Prior Learning (RPL) was presentability, etiquette) and this is a gap in the launched. The RPL looks at assessing the existing trained candidates which has to be addressed both at manpower on decided parameters and conforming certifithe time of entry and through relevant training cates on them, thus bringing them to the mainstream of certified skilled force. Training guidelines prescribed under the Recognition of Prior Learning (RPL) scheme was Private Security Agencies Regulation Act, first launched as a component under the Pradhan Mantri 2005 (PSARA) Kaushal Vikas Yojana (PMKVY) 2015-16 with a budget of nder the Private Security Agencies Regulation Act, INR 1,500 crore to train 24 lakh people, including 14 lakh 2005 (PSARA), the trainees have to undergo training fresh trainees and skilling of the remaining under the RPL and be certified by training partners (TPs), recognised by the program. Following the first phase of the scheme and its states (under the PSARA), and the security service providreview, the PMKVY 2.0 was launched with a budget of INR ers are required to employ only the manpower so certified. 12,000 crore to skill 10 million youth by 2020 of these 60 Further, PSARA does not specify any standard guidelines lakh were to be provided fresh training and 40 lakh were required for training other than broadly stating the requireto be certified for the RPL program. Currently, RPL has ment and the need to conduct a 160 hrs training. In addicertified about 4.8 lakh people covering 458 districts across tion, PSARA does not specify any categories of security India till date, the candidates have been enrolled, assessed services other than provision of security using unarmed seand certified in 185 job roles across 30 sectors. CCTV supervisor
U
48
SecurityLink India ■ September 2018
REPORT As the security industry is evolving fast with technology playing a larger role in security solutions – the security personnel also need to become comfortable with the various types of technology solutions and their usage in terms of monitoring, tracking, reporting etc. To this end, the training content has to be made more relevant to the needs of the moment, as well as regular refresher training needs to be conducted In addition, the industry feels that the level of understanding of trainees is lower and therefore, recognises the need for refresher training on regular basis. However, since guards are reluctant to bear the cost of training, the same has to be borne by the service provider which proves to be a substantial increase in cost. This coupled with the high attrition rate also impacts the management’s capability for having training sessions. Another issue which compounds the conduct of refresher training on a regular basis is the inability to relieve the guards from their place of duty for undertaking the same.
Way ahead
Impetus to aid and streamline skilling
T
he gaps in the skilling proficiency required by the industry/ clients and the training requirements as identified under PSARA are evident, and these need to be addressed to make the sector more viable and regulated. Despite 25% growth in the sector and the massive requirement of manpower, the industry reels under ambiguity of admissible training certificates as well as requirement of different categories of trained manpower. There is an incremental human resource requirement of 3.1 million for the period 2017-2022. Off late the GoI impetus on skilling of unarmed security guards has declined as no fresh allocation of training numbers has been provided by the GoI for conduct of training and provision of subsidy to the trainees for undertaking the training. The GoI needs to increase the support to the industry to boost the availability of trained manpower. Also, amendments to the PSARA to identify more categories of security services inclusive of armed security guards, as well as streamlining of methodology of certification of training being provided will go a long way in reducing the gap in skilling required for job roles needed by the industry to meet the customer requirement. Further, the formalisation of methodology (acceptance of training carried out by private TPs affiliated to NSDC and not recognized under PSARA) will go a long way in stand-
ardising the norms and identification/ acceptance of training certification on a pan India level and make the process more amenable to the industry.
Maintaining the quality of training imparted
T
he curriculum, standards of training required to be met, as well as the infrastructure standards to be maintained by a training center, and the certification of trainers and assessors may be regulated by the NSDC through sector skills council. The training may be conducted by TPs identified and recognised by states under PSARA. The states may institute an annual certification of the TPs with the certification team comprising of members from sector skills council/ NSDC. NSDC/ sector skills council may also be mandated to undertake surprise checks of TPs to ascertain the quality of training being imparted by the registered TPs. To make use of existing infrastructure and meet the training requirement it is further possible to allow service providers having more than 1000 guards to establish in house training institutes. Standard operating procedures (SOPs) should be framed for the job roles to bring consistency in training processes akin to what MHA is currently reported to be working on developing SOP guidelines for the PSAs engaged in cash handling and transportation.
Boost to Recognition of Prior Learning (RPL)
T
he dismal state of Recognition of Prior Learning carried out to date is evident from the figures mentioned earlier. RPL needs to be implemented with greater vigour so as to bring the available skilled manpower into the mainstream. Allowing service providers, employing more than 1000 guards, to establish training institutes and empowering them to undertake RPL will ensure faster assimilation of the skilled ‘uncertified’ manpower into the mainstream. It will also provide hope to the existing manpower of employability pan India and stop misutilisation of manpower, if any. It will also enable the unorganised sector to come into the fold of the organised sector.
International certification
T
he employed numbers in PSI are large, further the employable population of India is set to rise with India becoming the youngest country, having the maximum number of its citizens with an average age of 29 by 2020. Compared to this, world over, countries are facing shortage of manpower. If we align our curriculum and training to international
SecurityLink India ■ September 2018
49
REPORT
standards and requirements as well as provide international certification, duly recognised in targeted countries (for employment), we will be able to provide for job creation which is an essential requirement of the country.
Policy issues concerning private security industry
T
he private security industry in India is governed by various regulations, the most relevant being the Private Security Agencies Regulation Act (PSARA), 2005 formulated by the Ministry of Home Affairs (MHA), GoI. The Act regulates the eligibility criteria for operating a security agency as well as prescribes training requirements for security guards. Additionally, PSARA also prescribes various compliance requirements for the security agencies e.g., verification of employees, affidavit for compliance with FDI policy where applicable, maintaining statutory registers, commencement of activities etc. Apart from the PSARA some other (indicative) regulations applicable to PSI are the Arms Act 1959, FDI Policy, the Minimum Wages Act 1948, the Provident Fund Act 1952, the Employee State Insurance Act 1948, the Payment of Bonus Act 1965, and the Payment of Gratuity Act 1972. The current scenario in terms of policy and regulations affecting the PSI are discussed below:
Overlapping Federal and State regulations
T
he major concern for the security industry from policy perspective is that it is subject to an overlapping set of federal and state regulations, leading to multiplicity of registrations to conduct business. The PSARA has given the discretion to each state to formulate their rules for implementing the Act. PSARA was brought into effect from 15 March 2006. Due to separate rules in each state, there is a disparity in the processes for grant of licenses etc, despite the details required to be captured majorly remaining the same.
ď ˝ PSARA has been a much-needed regulation to ensure that the minimum quality standards are met; though for a PSA which intends to provide services in different states it is required to make a fresh application in each state. Even the application and process is different from state to state. Getting the license also takes a lot of time, though some states have been moving quickly in giving approvals ď ž 50
This heterogeneous system acts as a barrier for PSAs in providing integrated professional services on a pan-India basis. Distinct enforcement often leads to disruption of services to clients, impacting the overall growth potential of the industry. The prevailing regulatory issues in the sector adversely stunt the ability of the industry to organise itself in a professional manner, and raise service delivery and compliance standards. Therefore, it is critical that a single window licensing system is created as a combination of central/ state level registration, depending on factors such as the size, scale/ area of operations, employment conditions/ terms, past experience and the like for the PSA.
Mandatory police verification
R
equirement of mandatory police verification for directors of the company and processing time for such applications differ in most states. Moreover, the conduct of police verification of each security guard is also mandatorily to be conducted by the security agency hiring them. The processes involved are tedious and timely rendition of police verification happens rarely, which puts the PSAs in a quandary as regard to employment/ deploying of guards. Recently, the MHA issued advisory to all states/ UTs and advised them to utilize Crime and Criminal Tracking Network and Systems (CCTNS) database for conducting verification of antecedents for the purpose of issue/ renewal of licenses to PSAs. This is a welcome move and if diligently followed by States/ UTs it will help in expediting the application process and overcoming delays.
Changes in FDI limit
I
n 2016, the Department of Industrial Policy and Promotion (DIPP) allowed for 49% FDI via the automatic route and up to 74% via the approval route for PSAs in India. However, the changes in FDI Policy were not followed by suitable amendments in the PSARA. As per the relevant provisions of PSARA, an Indian should be holding a majority stake in the company, which directly contradicts the revised FDI guidelines permitting upto 74% FDI under approval route for PSAs. Therefore, it is necessary to align the PSARA with the extant provisions of the FDI Policy.
Challenges pertaining to the Arms Act, 1959
T
he PSARA does not contemplate provision of armed security as a service. In addition, the current frame-
SecurityLink India â– September 2018
REPORT
work of the Indian Arms Act, 1959 only allows individual applicants to hold arms licenses. As a result, private security agencies have been technically compelled to employ people who hold arms license in individual capacity. The firearms issued to individuals also have restrictions in terms of territories in which they can be used. This severely curtails the ability to pool armed guards in an efficient manner to service clients and can be particularly difficult in case of interstate transfer of goods/ personnel. The central government has provided some exemptions to certain clauses of the Arms Act to enable companies, banks, industrial or other establishments to obtain licenses in the name of legal entity rather than obtaining it in the name of individuals. Thus, there is a need for an amendment in this regard facilitating the ease of use of armed guards by the security service providers.
Re-categorisation of Private security workers as Skilled/ Highly skilled
I
n January 2017, vide a Gazette Notification, workers in the private security have been re-categorised under the Minimum Wages Act, along with modification in the daily pay. Security guards without arms have been re-categorised as ‘skilled’ and security guards with arms and security supervisors have been re-categorised as ‘highly skilled.’ The Central government has also revised the minimum wage payable to employees of the ‘Watch and Ward’ sector to Rs.673 with Rs.637 as the basic wage and Rs.36 as variable dearness allowance (VDA) per day for areas under category ‘A’ as listed in the notification, Rs.612 per day (Rs.573 as basic wage + Rs.33 VDA) for areas under category ‘B,’ and Rs.522 per day (Rs.494 basic wage + Rs.28 VDA) for areas under category ‘C.’ While the rates prescribed by Centre are mentioned above, each state, vide Labour Department notifications, issues its own minimum wage rates. The table below is an illustrative example of current minimum wages per month prescribed by some States for the period of April 2018: Category
Delhi
UP
Haryana
Un-skilled
Rs.13,896
Rs.7613.42
Rs.8297.56
Semi-Skilled
Rs.15,296
Rs.8374.77
Rs.9368.54
Skilled
Rs.16,858
Rs.9381.06
Rs.10328.83
–
–
Rs.10845.27
Highly skilled
From a practical view point, the disparity in wages leads to issues relating to shortage of supply of manpower in states with lesser rates. As an example, a worker in skilled category in Delhi may not be willing to take up employment in the NCR region, say Gurugram, where prevalent Haryana rates differ substantially vis-à-vis the rates prescribed for Delhi. To add to it some states are yet to establish security guards as skilled labourers. These states continue to consider security guards as semi-skilled or unskilled labourers, further creating disparity in the file and rank of manpower employed in the sector. In addition, this creates a situations of exploitation and a feeling of helplessness and incredulity in the employees (security guards).
Bridging the gap
●● To provide a single window system to streamline the registration process, an amendment to the PSARA may be considered for specifying the categories of PSAs that can provide services throughout India based on central registration, and other PSAs that need to obtain state level registration. The actual enforcement of the Act can also be segregated between central/ state-level authorities accordingly. This would not only reduce enforcement time but also allow national level integration to effectively monitor and plan for the private security industry. ●● PSARA has an inclusive definition of ‘private security’ i.e., the business of providing private security services including armored car service, private security guards etc. Similarly, ‘Private security agency’ (PSA) is defined as a person or body of persons other than a government agency, department or organisation engaged in the business of providing private security services, including training to private security guards or their supervisor or providing private security guards to any industrial or business undertaking or a company or any other person or property. The scope of private security under PSARA is broad and does not prescribe an objective test to determine the activities that are sought to be regulated. ●● There is no clarity on whether PSARA applies to specific activities, which has resulted in ambiguity as to what constitutes private security. With the provision of private security becoming increasingly mechanised owing to constant innovation in technology, it has become an urgent need to amend the PSARA to bring clarity
SecurityLink India ■ September 2018
51
REPORT
to the industry, with the inclusion as regard to the use of armed security guards and other security related services offered. ●● Each state has its own rules for the grant of license and mandatory conditions for the same. One of the conditions is the verification of antecedents of the applicants. On receipt of such request for verification in prescribed form (as per state rules), the Controlling Authority of the State forwards it to the Deputy Commissioner of Police of the concerned police district where the agency intends to commence its activities and for verification of particulars of the applicant which is time consuming. To ease the same, the states may consider implementation of an online process which would make the verification faster, easier and more accountable. Crime and Criminal Tracking Network and Systems (CCTNS) could be used for implementation of the same as per the advisory issued to all states/ UTs by the MHA. ●● Online process for the conduct of police verification should also be incorporated for security guards. Moreover the police verification should be made time bound, such that post a certain given number of days, after rendering of application for conduct of police verification, in case of no receipt of reply from the authorities, police verification should be considered as being completed and accorded. This would make the system more streamlined and remove ambiguity from the process and save time. With the Crime and Criminal Tracking Network and Systems (CCTNS) this would be easily implementable also.
PSARA must have a uniform implementation. It is hampering the delivery and payments. PSI is the worst affected body due to the lack of uniform implementation ●● The issue regarding trained personnel being employed in other states has been impacting the employment of personnel inter-state. In this regard, MHA vide clarification dated January 11, 2018 clarified that the certificates issued to trained guards in one state should be accepted by other states as there are no restrictions in PSARA for the same. States should be given suitable direction to implement the same. ●● Regulatory impediments, especially lack of clarity and ambiguities in the laws and regulations relating to FDI 52
into India makes attempts at liberalisation counterproductive. In its bid to attract more foreign investment and enhance the ease of doing business in India, legislative action in removing ambiguities in the regulatory framework is imperative. It will be beneficial if the various governmental agencies coordinate between themselves effectively to ensure simultaneous amendments in legislations prior to liberalisations being rolled out. Such initiatives will ensure effective implementation of policies and contribute towards making ‘ease of doing business’ in India a reality. It is proposed that a suitable amendment be made in the Arms Act so as to allow the licensed PSAs to procure and store arms subject to prescribed compliance and audit requirements. ●● The states should also frame regulations for mandating employers to pay minimum wages to the personnel. For example, the Department of Law, Justice and Legislative Affairs of the Delhi government has issued a notification, making it mandatory for employers to pay remuneration either electronically or through cheques, except in some special circumstances. The President gave assent to Delhi government’s proposed amendment under the Minimum Wages Act under which employers violating labour rules in the city will face fine ranging from INR 20,000-50,000, and jail term between 1 to 3 years. Similar notifications with penalties may also be enforced in other states. It would, thus, take up the will and intention on the part of employers and the legislators to strengthen the legislation and to ensure that the standards for minimum wages are adhered to in salaries of private security guards. A step in that direction would be to align the minimum wages to each tier of cities rather than leave it for states to decide for the whole state. Further the Central Government needs to impress upon states to standardise the categorisation of security guards as skilled workers. ●● Recently, MHA has created a new division to address issues related to security of women comprehensively. On the same lines, it is recommended that MHA should also create a separate division relating to private security so as to help administer the issue related to the industry in a faster manner. Further, uniformity in the ranks/ stature of all the state controlling authorities across India, as against the existing different levels of offices dealing with the PSARA, would also go a long way in streamlining the associated processes across the country.
SecurityLink India ■ September 2018
INTERNATIONAL UPDATES
SecurityLink India â– September 2018
53
APPLICATION/ CASE STUDY
ITS Solution for Mongolia’s Capital U
laanbaatar, the capital and the largest city of Mongolia, has almost half of the country’s total population – the population of Mangolia is over 1.3 million. Over the past decade, the number of vehicles in Ulaanbaatar has risen by more than 300,000 which has caused a series of social, environmental and transportation problems. Dahua’s sophisticated ITS (Intelligent Transportation System) solution has integrated advanced software and hardware including sensors, information and data processing and physical electronics and communication technologies to assist the transportation department of Ulaanbaatar, in enhancing the safety and efficiency of its transportation system.
Challenges
I
n recent years, the government of Ulaanbaatar has prioritized the improvement of traffic management and has identified the need of a cost-effective solution towards speeding, traffic light violations and other road safety related issues, to create a more secure environment for citizens. Due to the high-latitude geography of the city, this project is particularly demanding on the monitoring equipment withstanding harsh environments.
Solution
B
ased on the advanced intelligent algorithms, Dahua has provided the city with its cutting-edge ITS solution comprising ANPR (automatic number plate recognition) system for 28 main roads, the E-police system for 8 junctions, 2 mobile speed measurement systems as well as 15 high spot PTZ surveillance units. The project took only three months from the initial analysis of the client’s demands and solution design to the final delivery, overcoming various tough issues along the way.
ANPR system
A
s there are no current systems for license plate recognition in Mongolia, the Dahua team worked in collaboration with a partner to customize a Mongolian license plate recognition algorithm. This was then integrated into the Dahua traffic cameras, achieving a reliable recognition rate, much to the satisfaction of the client. The Dahua traffic cameras are installed at the significant main roads of the city. They are able to function between a temperature of -40° to +80°C and a 10% to 90% humidity environment. The cameras will actively monitor and inspect each suspicious vehicle, automatically capture their license plates in real time, and send out an automatic alert when blacklisted vehicles pass by.
54
SecurityLink India ■ September 2018
APPLICATION/ CASE STUDY
E-police system
T
he monitoring equipment set up at the eight junctions is able to help the Ulaanbaatar transportation authorities in making quick responses to traffic accidents that are caused by running red lights. When a violation occurs, the Dahua all-in-one capture camera takes a series of images of the vehicle’s license plate number, along with the status of the traffic signal and an aerial image of the scene as evidence. Afterwards, the DSS management and storage platform collects the data from each camera and distributes it to operators for further processing.
Mobile speed measuring system
T
he mobile speed measuring system detects vehicles that surpass the speed limit in all weather conditions. The system features an all-in-one design, making it easy to use and install at different locations at a moment’s notice. This portability allows traffic police to move the system to different places whenever necessary. It consists of an 8MP CCD camera with a multi-target tracking radar, allowing for an accurate instant speed measurement of each passing vehicle and crystal-clear imaging. The IR flash lamp also ensures excellent imaging capabilities even during the dark of night. To better serve the client, the Dahua team has provided the operators of the local transportation department with relevant technical training and demonstrated to them the installation and deployment of devices. Additionally, all three systems are unified on a single platform within the control center, further enabling the end user to a more efficient monitoring and management of road safety.
Industrial Grade Network Switch Enhances the Transmission System for Royal Oman Police Station
O
ne of the high-tech police force in the world, the Royal Oman Police has replaced their transmission systems in police station. The faster and more stable fiber optical switch with video analytic technology helps the police force enhance efficiency. OT Systems’ industrial managed switch IET8242MPpH-S-DR with strong 6KV surge protection PoE function, supports 20km optical distance. The embedded software ‘Surveillance Device Management’ is a cutting-edge solution for the operator at the transmission monitoring systems, providing real-time monitoring and troubleshooting.
Benefits
D
ahua’s ITS solution facilitates road safety, and keeps the traffic flowing smoothly, and raising the safety awareness of drivers, resulting in a more pleasant journey for drivers. Advanced technologies such as LPR and fuzzy search, actively reduce manpower demands on the police force, while increasing the efficiency of current enforcement. Furthermore, Dahua’s solution has assisted the government of Ulaanbaatar to finance a sustainable, growing, and wellmaintained system of security and safety.
Inside the police station, the application with their industrial IP CCTV switch (ET4222Pp-S-DR, ET8122PpH-S-DR) connects with the IP cameras to guard the police cells security. Applications of their full portfolio comprising managed, and self-configured/ smart and unmanaged Ethernet switches secure and boost IP-communication networks in police station parking area, sensor devices etc.
SecurityLink India ■ September 2018
55
APPLICATION/ CASE STUDY
New Hosted Video Solution for Convenience Stores Service delivers integrated surveillance video, business analytics and point-of-sale transaction data, plus health monitoring for optimal system performance
M
arch Networks® has introduced a new Software-as-a-Service (SaaS) offering for convenience stores. The secure, hosted service will deliver all the benefits of March Networks’ powerful Searchlight for Retail solution – including loss prevention, data analytics and operational audits reporting – for an average cost of just $4 a day. It leaves owners free to focus on their business rather than maintaining a video surveillance network, and delivers a swift return on investment through advanced loss prevention and business insights. Used by retail organizations worldwide to extract valuable information on customer service, operations, compliance and more, March Networks Searchlight™ helps retailers improve performance and profitability. By integrating surveillance video with point-of-sale (POS) transaction data, and accurate analytics, the software enables retailers to proactively detect fraud and theft, and
56
reduce incident investigation times by as much as 90%. With this new hosted solution, Searchlight for Retail as a service, cstores can enjoy a true enterprise video solution for a low monthly fee. The service is easy to deploy, and it eliminates the need for customers to purchase and maintain servers within their own IT infrastructure. Searchlight for Retail as a service is hosted at Amazon Web Services™ for proven speed and data security, and is managed by experienced staff in March Networks’ secure network operations center (NOC). It includes all software licensing, and all camera and recorder processing, health management, upgrades and administration – including user management that is performed by March Networks NOC staff working in cooperation with the business’s certified March Networks systems integrator. Searchlight allows c-store owners
SecurityLink India ■ September 2018
and managers to spend more time on their core business by simplifying the task of locating suspicious activity and finding video evidence. It delivers multiple, user-defined reports and allows customers to schedule them to arrive automatically in their email inboxes. The reports include snapshot images and direct links to recorded video that let them analyze and compare: ●● Location and employee performance at one or a group of locations. ●● Suspect transactions such as all voids above a set amount. ●● Conversion rates, customer wait times, dwell times and other customer service metrics using integrated analytics. ●● Operational performance including how clean locations are – if shelves are well-stocked, if employees are dressed properly, and if procedures are being followed. ●● Security audits including a list of alarms and the ability to filter by specific alarm or location. The new hosted Searchlight service provides the scalability and enterprise management features customers have come to expect from March Networks. The company’s continuing focus on privacy and data security also makes this an ideal solution for c-stores that are looking for the highest level of cyber protection. The upcoming release of the service will include WebRTC functionality and a number of key security and
APPLICATION/ CASE STUDY
privacy features that c-stores will benefit from. “This new, hosted Searchlight option is ideal for convenience store owners who want the loss prevention and business analysis capabilities of a proven intelligent video solution, without the burden of managing and maintaining their video devices,” said Peter Strom, President and Chief Executive Officer, March Networks, “The solution also removes upfront capital expense barriers, making it a more cost-effective option for owners who are always keeping an eye on the bottom line.” Searchlight for Retail as a service will be sold through March Networks certified partners, who will work directly with their c-store customers to install, configure and maintain the service to best meet their needs. The new service will initially be available to the c-store market in the U.S. and Canada.
Partners with
Delivering AI-powered Video Analytics To Police and Security Customers across Scandinavia New alliance to boost object search and facial recognition video solutions
B
rainChip Holdings Ltd. has recently entered a strategic partnership with Telesikring, Denmark’s leading Danish-owned installer of security solutions for small, medium and large companies. The companies will jointly address the growing needs of law enforcement and end users to efficiently classify suspects fast using the latest awardwinning AI powered software platform for object recognition and facial classification – BrainChip Studio. Under the terms of the partnership, Telesikring will agree to promote, install and support BrainChip’s growing portfolio of AI-powered software and hardware solutions across their existing and new
video security customer base. The Danish security market, incorporating video surveillance services, is currently valued at DKK 475 million (around US$75 million), according to Statista. The market is expected to grow to DKK 845 million (around US$133 million) by 2022. BrainChip’s Director of EMEA Sales, Luis Coello, commented: “Our partnership with Telesikring comes at a pivotal time for BrainChip as we aim to build on the successful launch of BrainChip Studio last year. Securing Telesikring as our first Technical Sales Partner in Scandinavia will help boost BrainChip’s presence in the Scandinavian video surveillance and security SecurityLink India ■ September 2018
industry, which we intend to extend across the region.” Morton Dall, Telesikrings Sales Director, commented, “Many of our customers in Denmark and further afield are looking for integrated analytics solutions for video security and surveillance. We believe that AI technology has matured to such a degree that it provides real value to our clients. The partnership with BrainChip allows us to address this growing demand and ensure we can develop specific customer requirements by using BrainChip’s AI-powered software and hardware solutions as part of our overall security and technology platform offering.” 57
APPLICATION/ CASE STUDY
Secures National Memorial Swatantryaveer Savarkar Rashtriya Smarak in Mumbai
S
watantryaveer Vinayak Damodar Savarkar was an intrepid armed revolutionary of the freedom struggle, a social reformer, a great poet, an outstanding litterateur, a dramatist par excellence, and a ceaseless crusader of the nationalist cause. The national memorial raised in his memory is an iconic place, which attracts a large number of people from all parts of India and the world.
Swatrantryaveer Savarkar Rashtriya Smarak is a national memorial of strategic importance. This memorial has been secured with the help of Hikvision integrated security solution comprising video surveillance cameras, access controlled doors and vehicle entrance control system. These security systems are very helpful for the security management of premises and visitors. The physical security management systems of the premises are in excellent condition and providing proactive security. We are thankful to Shailendra Chikhalkar (Infozenix Solutions & Consultancy Services) and Hikvision for providing a perfect security solution – Ranjit Savarkar Chairman, Swatantryaveer Savarkar Rashtriya Smarak
This seaside memorial erected on a plot of 6650 sq. meters provided by Municipal Corporation of Greater Bombay has a 20000 sq.ft. plaza. It has a life size statue of Veer Savarkar surrounded by a beautifully design garden with two colourful fountains.
Requirement
A
s one of the leading learning hubs located in the heart of the city, the Smarak premise is frequented by a number of students, parents and visitors. To manage them and make the premise fully secured, a foolproof security solution comprising surveillance cameras to cover every corner of the premises and monitoring of sea side boundary wall, fingerprint access control system to restrict unauthorized access, vehicle entrance control system to restrict unauthorized vehicle entry, and attendance management system for the employees were the key requirements.
Solution
T
o enable it, Shailendra Chikhalkar, Consultant, Infozenix Solutions & Consultancy Services has designed a
58
fully integrated security solution wherein he used Hikvision products to achieve the required results. The solution comprises various types of cameras including fixed, PTZ and fish eye. Currently 150+ cameras are used effectively to monitor every corner of the premises. Every door of classes is deployed with fingerprint access control system so students can enter only if they are authorized. In the administrative office area fingerprint access control devices are used for access control and attendance record. The software is web based access and attendance software, We take this opportunity to thank Hikvision team for the painstaking efforts, coordination and teamwork in providing products to Swatantryaveer Savarkar Rashtriya Smarak. Hikvision has once again gained the trust of the end-user by providing a perfect security solution with timely technical support. We also acknowledge and appreciate the teamwork of Ulteam Computers &Technologies in extending all support during installation. The execution of this project was done as per the industry standards – Shailendra Chikhalkar Consultant, Infozenix Solutions & Consultancy Services
which has a complete attendance management solution with the third party software integration interface (ERP/ HRMS/ fee collection software). The fire alarm system is integrated with surveillance and access control systems so in case of fire, cameras get the alerts and focus the incident area while access control system opens the door. The premises have a multi-door controller for vehicle entrance control with Wieg and based long range reader and RFID tag.
SecurityLink India ■ September 2018
APPLICATION/ CASE STUDY
National Referral Hospital Bhutan Secured Trusts Matrix Time-Attendance and Access Control Solutions
T
he Jigme Dorji Wangchuck National Referral Hospital is one of the top most renowned institutions in Bhutan delivering healthcare services. The hospital caters to the population of Thimphu and neighboring districts. The hospital also functions as the regional referral hospital for the western district, district hospital for Thimphu, human resources pool and technical backup for district hospitals, clinical training centre for the royal institute of health sciences (RIHS), and technical support to the public health programs.
Challenges
A
s the hospital works round the clock, one of the major concerns was to manage complex shifts of employees. Elevator which only users with access rights can call was another challenge. Furthermore, the customer also wanted a solution, whereby the admin could assign entry and exit points for patients, visitors and employees. Lastly, the management wanted to restrict visitor entry to a pre-defined time and rooms of the hospital for better visitor management.
Solution
M
atrix pitched its access control, time-attendance and visitor
management solution along with the different variants of biometric devices, which fulfil every requirement of the hospital. Around 206 devices were installed in the hospital, which are used in controlling access at rooms and elevators. They were installed at the main entrance, ward rooms, server rooms, outside elevators, and at ramps on every floor, to restrict access. So, there is no individual in the building who is not enrolled in the system. Through this, the hospital could manage multiple shifts of employees as well. Approximately, 700 visitor profiles were created with constrained time to visit, limited rooms to enter and a pre-deSecurityLink India ■ September 2018
fined route of access. Also, crowd at the elevator was controlled by restricting the use to only users with elevator access rights.
Results JDWNRH fulfilled its requirement with Matrix people mobility management solution and achieved the following results: ●● Simplified security by restricting unauthorized entry. ●● Reduced complexity of shifts. ●● Crowd controlling through elevator access control. ●● Time and zone based entry restrictions for visitors and patients. 59
APPLICATION/ CASE STUDY
Celebrating 20 Years of Securing
Little League Baseball® World Series E
very summer, teams from around the world gather in South Williamsport, Pa., for one of baseball’s great classics – the annual Little League Baseball® World Series. For the 20th consecutive year, Lenel will provided systems and services to help keep the iconic youth baseball event safe and secure for players, coaches, officials and fans. Lenel is part of UTC Climate, Controls & Security, a unit of United Technologies Corp. Teams from eight international and eight U.S. regions played in the 10-day tournament, which begins on 16 August and ends with the championship game on 26th. Samantha Mahaffey, Security Manager for Little League® International, recognized Lenel’s continued dedication to the annual event for players ages 10 to 12. “We’ve long been able to count on Lenel to provide its world-class security technology to help us make sure these games are safe and secure for all our
60
players, families, and fans,” she said, “It’s been great to work with Lenel over the years and embrace the changes and growth of the Little League Baseball World Series.” Jeff Stanek, General Manager, Lenel, said helping to protect the Little League Baseball World Series is an honor for the company and its employees. “Little League and youth baseball are wonderful traditions bringing together young players and fans of all ages from countries around the globe,” he said, “We’re proud to be a part of this annual rite-of-summer event for 20 years, providing our technology and expertise to help make it the fun and safe event it should be.” The heart of the security system is Lenel’s OnGuard® access control platform. Each Little League player is enrolled in the system and receives a photo identification badge that’s worn to provide access to playing fields and to dining and dormitory facilities. Cards are also issued for all
SecurityLink India ■ September 2018
coaches, officials, staff and vendors. Each card limits access to only specific pre-determined areas throughout the complex. The OnGuard system is integrated with the complex’s video surveillance system and is used to verify people entering restricted areas. When someone presents a badge at one of the access card readers, live video and the cardholder’s photo are displayed on a nearby monitor, allowing a guard to authenticate the identification. The OnGuard integrated security system has powerful analytic capabilities that can also help locate lost children, identify sick or injured people needing assistance and lost or suspicious articles that might pose a threat. The analytics can also help identify vehicles in restricted areas or other out-of-the-ordinary activities. Interlogix, Lenel’s sister company, is providing its UltraSync™ system to provide intrusion monitoring of the complex’s onsite police station.
APPLICATION/ CASE STUDY
New Precision MEMS Sensor Supports Accurate Positioning and Control for Cars
S
TMicroelectronics has introduced the automotive-grade ASM330LHH six-axis inertial sensor for super-highresolution motion tracking in advanced vehicle navigation and telematics applications. Serving demands for continuous, accurate vehicle location to support automated services, the ASM330LHH lets advanced dead-reckoning algorithms calculate precise position from sensor data if satellite signals are blocked. This often happens in urban canyons, tunnels, covered roadways, parking garages, or dense forests. Its advanced, low-noise, temperature-stable design enables dependable telematics services such as e-tolling, tele-diagnostics, and e-Call assistance. Precision inertial data in six axes also meets the needs of advanced automated-driving systems. Magneti Marelli has selected the ASM330LHH for advanced telematics systems, to be fitted as original equipment by global automotive groups in upcoming vehicle ranges. For the ASM330LHH, as with all its MEMS sensors, ST owns the entire manufacturing process, from designing the sensors, through wafer fabrication, packaging, test, calibration and supply. Full end-to-end control enables ST to create high-performing sensors and assure customers of a robust and responsive supply chain, with rigorous end-ofline quality screening. “ST is the largest supplier of MEMS sensors for automotive non-safety appli-
cations such as navigation and telematics,” said Andrea Onetti, Analog, MEMS and Sensors Group Vice President, STMicroelectronics, “Our latest-generation inertial sensor, the automotive-grade ASM330LHH, enables precise positioning for safer, smarter driving.” Engineering samples will be available for evaluation by Q3 2018, and volume production will begin the following quarter. Budgetary pricing starts at $5.00 for orders of 1000 pieces. Further technical information on the ASM330LHH: ●● Temperature range up 105°C giving designers extra freedom to locate electronic controls in hot areas such as in smart antennas on the vehicle roof, or near the engine compartment; ●● Ultra low noise allows greater measurement resolution by minimizing integration errors when positioning is reliant on sensors only; ●● High linearity and built-in temperature compensation eliminate any need for external compensation algorithms over its operating range; ●● Lowest power consumption in class, with features for optimizing power management if battery usage becomes crucial; ●● Qualified according to AEC-Q100 automotive-grade robustness standard; ●● Built on ST’s proven, proprietary ThELMA MEMS process technology, which enables integration of both the 3-axis accelerometer and 3-axis SecurityLink India ■ September 2018
●● Advanced inertial sensor provides highly accurate dead reckoning for automotive navigation, telematics, and highly automated driving systems. ●● 3-axis accelerometer and 3-axis gyroscope integrated on a single chip leverage ST-proprietary end-to-end MEMS process for best quality and customer supplychain assurances. ●● Chosen by Magneti Marelli for new advanced telematics system.
●●
●●
●●
●●
angular-rate sensor (gyroscope) on the same silicon for optimum yield, quality and reliability; The electronic interface integrates the signal chain for both sensors on a single die using ST’s 130nm HCMOS9A technology; Reference designs, as well as ST’s Teseo™ satellite-positioning modules and related software are available. The dead-reckoning algorithm included with the Teseo III GNSS receiver chipset already supports the ASM330LHH to generate a highaccuracy output suitable for autonomous navigation; Tiny, low-profile 3x2.5x0.83mm3 device for minimal impact on the size of any on-board module; Packaged as a leadless land grid array (LGA) device. 61
APPLICATION/ CASE STUDY
Monterey Bay Aquarium Upgrades Security T
he Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organizations.
The challenge
T
he aquarium has a huge campus, with multiple separate properties and an average annual visit of two million people. Until recently, the Aquarium relied upon up to 60 analog cameras for its video security, and monochrome screens for monitoring, which proved increasingly unreliable and insufficient to its growing security needs. The aquarium’s security staff also found it a major inconvenience that accessories and other parts for the system were exclusive to the original provider, limiting the security team’s options both technically and financially. “We have some very difficult light levels here. The reflections of the water tanks can make certain areas lighter on camera than they are in person, or vice-versa,” stated Thomas Uretsky, Director of Security and Emergency Management for the facility, “The system needed more flexibility, multiple views on one camera. Blind spots needed to be eliminated, and we wanted as close to a 360-degree view as possible.” After thorough research, San Jose, California-based security integrator NSI Systems recommended Arecont Vision for the camera solution.
Monterey Bay Aquarium, main ticking area
with Arecont Vision regarding what they were looking for, where coverage was needed, and how to best fit in into their budget. They chose ExacqVision as their video management system, to help upgrade their prior surveillance system. A range of different Arecont Vision cameras were ultimately deployed to serve the aquarium’s varying needs. Arecont Vision MicroDome® cameras were ideal for the ticketing area and customer lines. The series includes wide dynamic range (WDR) models, which can achieve clear images across extreme lighting conditions, such as those found in some of the indoor spaces at the aquarium. MicroDome cameras have an extremely low profile and only a 4” diameter, making them ideal for discreet security surveillance. Another favorite at Monterey Bay Aquarium were Arecont Vision SurroundVideo® Omni G1 and G2 adjustable-view cameras. The SurroundVideo Omni series utilizes a patented 360° track where each of its four megapixel
The solution
M
r. Uretsky and the team at Monterey Bay Aquarium collaborated
62
Monterey Bay Aquarium, open sea tank coverage
SecurityLink India ■ September 2018
sensors can be moved to cover virtually any angle. Remote motorized focus simplified installation with the Omni G2. Combined with the ability to interchange lenses, the Monterey Bay Aquarium now has the unique and flexible camera solution it required. The customizable features of the camera also simplify future changes that may occur at the aquarium, saving time and money if construction or remodeling were to occur.
The result
T
he system has performed incredibly well to date. Not only was it installed on time, but it was completed within budget. The Monterey Bay Aquarium monitors the system locally, 24-hours per day. The images are viewed on a dynamic video wall in the new Security Operations Center. While most footage is viewed on-site, some cameras have been enabled with the Exacq software for remote monitoring at satellite offices. For example, holding areas for rescued sea otters can be viewed remotely by a research team. Arecont Vision cameras have helped the aquarium’s security department in a variety of ways, one of which is increasingly common: addressing bicycle theft. Individuals will sometimes access a public recreational trail that runs along the aquarium’s main campus to steal unattended bikes parked by visitors or staff. Unlike the previous analog surveillance system, Arecont Vision’s megapixel cameras are able to provide the security department with good views and highresolution images when reporting such incidents to the police department.
APPLICATION/ CASE STUDY
Intelligent Video Solution to Secure
Canadian Retail Cannabis Dispensaries
O
ne of Canada’s largest cannabis producers has selected March Networks’ complete cannabis video solution to provide security, loss prevention and operational insights for its retail dispensaries. The publicly-traded producer, with multiple brands and a global presence, chose the March Networks solution based on its proven reliability, ability to support thousands of locations, and its Searchlight business intelligence software. March Networks Searchlight™ provides organizations with valuable information on customer service, risk mitigation, corporate compliance and other operations through the integration of surveillance video, point-of-sale (POS) transaction data and customer data analytics. “Early on, we recognized the security and operational requirements of the tightly-regulated cannabis market and evolved our offering to uniquely address
those needs,” said Peter Strom, President and CEO, March Networks, “Today, we are proud to be the solution of choice for cannabis operators, including this leading Canadian-based producer in advance of the legalization of the country’s recreational marijuana market in October.” Recently the government of Ontario – Canada’s largest province by population – opened up the sale of marijuana to private retailers, reversing a previous decision that would have seen sales limited to government-run outlets only. Across the United States, March Networks currently works with multiple cannabis operators, providing intelligent video solutions for dispensaries and cultivation facilities. In states like Colorado, where radio frequency identification (RFID) tagging from seed to sale is mandated by law, the solution delivers an enhanced level of tracking and compliance by correlating video with the RFID data in the Searchlight software. In addition to March Networks Searchlight, the Canadian cannabis producer will deploy the company’s hybrid network video recorders (NVRs) in each retail store, as well as integrated 3D analytics sensors to gather valuable metrics on customer traffic SecurityLink India ■ September 2018
and wait times. The producer will be able to centrally manage the entire system and easily schedule software updates using March Networks Command™ Enterprise Server software. The powerful video management software is an ideal solution for organizations with multiple distributed locations, providing capabilities such as mass device management and LDAP integration to enable secure multi-level user access and authentication. It also delivers remote system health monitoring to ensure video is always there when needed – a critical feature to help ensure cannabis operators remain compliant with video surveillance requirements at all times. 63
APPLICATION/ CASE STUDY
HD PTZ Interceptor Camera Sensor Improvements Help
Prepared for Any Emergency
Louisa County Public Schools Enhances Security
L
ouisa County Public Schools, in Northern Virginia, has completed installation of a district-wide ViconValerus video management solution that encompasses its six school buildings and connects nearly 400 cameras. The system includes multiple application servers and NVRs running Valerus VMS software, as well as a wide range of Vicon IP megapixel camera models. The district has opted to share camera access with the Louisa County Sheriff’s Department, whose officers can use ipads and smartphones to immediately call up video through the Valerus VMS interface in case of an emergency. This allows them to visually assess any situation and locate the perpetrator before sending in officers. The Valerus solution was chosen by Louisa County Public Schools because of Vicon’s willingness to provide the district’s in-house electricians and technical team with as much autonomy as possible in setting up and managing the system. After participating in a Vicon sponsored training class, the district has been self-sufficient in its ability to install, program and troubleshoot Valerus. David Szalankiewicz, LCPS Facilities Director says, “Vicon’s technical team has supported our in-house guys directly with training and certification so that we feel completely in control.” Ron Lapsley, Vicon’s Regional Sales Manager who worked on the project, explains, “Vicon understands that the technical capabilities and service needs are different for each customer, and we’re glad to provide the right level of support that makes sense. In many cases, the manufacturer relationship is as important as the product itself in making sure a customer is satisfied.”
Catching Bad Guys in the Dark I
ndigoVision’s HD Interceptor PTZ camera has recently received a sensor update which would help seeing in the dark to a whole new level.
The new sensor is made from the latest Sony CMOS Starvis technology to get increased zoom level and illumination, meaning one can see up to 1800ft/ 550m which is a huge 900ft/ 275m further than before. With these improvements it’s no surprise that this camera is recommended by IndigoVision customers as the one to catch the bad guys, even in the darkest of nights. 64
SecurityLink India ■ September 2018
INTERNATIONAL UPDATES
DISPLAY NEW PRODUCTS, SERVICES AND LATEST TECHNOLOGIES IN THE FIELD OF
FIRE SAFETY & SECURITY
For Exhibiting and more information please contact : Jay Sheth: jay.sheth@nm-india.com / +91 9967971606 I Eshita Sharma / mumbaichapter@fsai.in / +91 9818805922 Supported By
Official Publication
Media Partners
SecurityLink India â– September 2018
65
FEATURE
Facial Recognition Solution Enhancing Safety & Business Intelligence By Balasubramanian Jayam Head of Marketing (India & SAARC), Dahua Technology Co., Ltd.
D
ahua Technology’s state-of-the-art facial recognition solution enhances safety and business intelligence for its users. In real life a person rarely wants to be seen as someone other than himself. The misrecognition problem is not only time consuming, dignity compromising, but also life threatening in lots of cases where certain dangerous people are not correctly identified in time. This mistake is no longer affordable to make in today’s context, whether for an individual, a group, or the society as a whole. Fortunately the facial recognition technology has matured and the security solution based on the technology is being widely used across the world. Dahua Technology is especially good in this realm and it has been proved by multiple championships and new records made in major international challenges including multiple object tracking challenge, the KITTI 2D object detection evaluation 2012, KITTI flow benchmark, Task [word recognition] of incidental scene text challenge and Born-digital image challenge. It is necessary to explain some basic rules concerning how facial recognition works before the tour to see how Dahua Technology’s products & solutions are applied in various daily scenes. Simply put, big data is useless if the accuracy and efficiency of facial recognition has not been improved to certain levels. The face detection, whether from a snapshot or from a stream of video, requires not only a high-quality camera but more importantly, a smart AI algorithm that optimizes the image captured in multiple angles or blurred in motion, and translates the face feature into digital model which can be crosschecked in the database. The whole process, from taking the picture to comparison, takes as short as 300ms. 66
Suppose there is a Tom, a middle level manager in his mid-30s. Let’s follow Tom for a day and see how Dahua Technology’s facial recognition solution plays its role in his perfectly ordinary life.
Tom vs. access control
T
om hurried to his company on the 30th floor of a class A office building, the kind with additional barriers in the lobby between the front gate and elevators. There were long lines in front of the access control machines. Tom reached into his pocket and unfortunately found his access card wasn’t there.
●● S olution overcame several shortcomings of traditional methods. ●● Powerful cameras equipped with deep learning AI detect faces & digitalize features. ●● Ideal for various locations. But Tom should not worry anymore because the building had just updated the security system with Dahua facial recognition solution, which overcame various shortcomings of traditional ways of card or fingerprint scanning including low efficiency and inadequate security. Comparing to a card, apparently it is much less likely for one to lose/ replicate/ borrow a face. The access control was no longer a gamble if one’s fingerprint works. Here is how exactly Dahua facial recognition solution works in this scene. The powerful cameras blessed with deep learning AI detect the faces and digitalize the features, and compare them purely through numbers with the ones in database which takes less than 1 second. The beauty of the solu-
SecurityLink India ■ September 2018
FEATURE
tion goes both ways since the company no longer needs to make a card or import finger prints for the newly employed but simply upload their photos into the database that contains up to 10,000 faces. Besides offices, this solution can also be applied to any place that has a high standard for access control like customs, schools, residential communities etc.
Tom on the white list
T
om stepped into a bank. On behalf of his company, Tom had some serious business to discuss with the bank, which, at this hour, was full of people. Before Tom started to worry about the time to be spent waiting and if he could make it to the next meeting on time, he heard his last name called and was led into the VIP room. Now how did the bank manage to do that? Not by human efforts for sure. No clerk could remember each and every face and match it with a particular name and particular business without making any mistake. That’s why facial recognition solution is essential to the business. The immediate detection of a VIP face could be easily matched with the white list in database – no delay or misidentification and all VIP treatment. This goes not only for banks. Hotels, hospitals and casinos alike will also benefit from this solution that secures the proper respect those exceptional customers deserve.
Tom unauthorized
T
om went to the vault of the bank for the first time in his life. He was happy that now he was trusted by the company with such important mission. He walked fast and went in front of the escort. But before he could raise his hand to touch the door of vault, a warning siren was triggered. The escort, with a reassuring smile, caught up and patted on Tom’s shoulder and explained the whole situation to him. No unauthorized personnel, be it Tom or Jerry, could intrude the sensitive areas blessed with Dahua facial recognition solution. The face captured and automatically optimized by the camera would be put into real time comparison with the authorized faces in data base and the low percentage of similarity, from a pure mathematical point of view, would immediately trigger the alarm. Other limited access areas like labs and archives will also enjoy better protection with facial recognition solution.
Product Architecture Diagram - Dahua Facial Recognition Solution
Tom and the black list
A
fter a long day’s work, Tom went to see a football game with a friend. The show began even before they entered the stadium because they saw an infamous football hooligan got rejected and taken away outside the entrance gate. Tom, who have been through plenty of adventures during the day figured out what had happened. Tom’s friend, who happened to be an employee of Dahua Technology, took the chance to explain how Dahua facial recognition solution informed the security force to deal with any persona non grata on the black list as soon as they showed their faces. Of course, this solution could be widely applied to other areas like airports, train stations, or in other words, city management. So, this was a day in Tom’s life, which was endowed with some dramatic coincidence but totally realistic in every scene. These examples were far from exhaustion of all the possible applications of Dahua facial recognition solution that fully activates big data gathered and thus spawns many creative applications in terms of security and business, resulting indeed into a safer society and smarter living, as has always been envisioned by Dahua Technology.
SecurityLink India ■ September 2018
67
FEATURE
Active (Ethernet) vs Passive (PON) What’s Best for You? By Scott Penno – Regional Marketing Manager, APAC, Allied Telesis
W
hen it comes to delivering networks to support smart buildings and applications like CCTV, IPTV and Internet service delivery, there is no doubt that the near-limitless bandwidth of optical fiber is of benefit. What is less clear is whether an active, or passive technology is better. In reality, it depends on many factors including the environment, applications being used and who is going to manage or operate the infrastructure. Let’s look at this in a little more detail.
History and background
A
ctive Ethernet or point to point Ethernet has been used extensively in a broad range of applications and environments for many years from the early days of 10Base2 to the current Ethernet technologies that utilize copper or optical fiber to deliver 1G, 10G and beyond. In order to deliver next generation services to consumers or subscribers, the aging twisted pair infrastructure that had been used for many years was simply not capable of meeting
68
the bandwidth requirements of services like HDTV. Optical fiber with its near limitless bandwidth was therefore an easy choice. Using an active or point-to-point technology, however, would have seen thousands to tens of thousands of strands of optical fiber required from the exchange. Alternately, it would have been necessary to have active equipment in the field from where optical fiber had aggregated. Neither of these options was particularly suitable so an alternative technology known as Passive Optical Networks (PON) was developed. PON had the benefit of using small counts of optical fiber from the exchange and then branching out to deliver services to subscribers with passive splitters overcoming the limitations of active Ethernet for this application.
Application and use
T
here is no question that in a ‘broadacre’ environment – one covering large distances – PON has many benefits for the delivery of consumer services. These benefits, however, are questionable when it comes to delivering services in other environments such as buildings, commercial buildings or hospitality environments. Today the benefits of a single converged network to support all applications within a facility are better understood. The simplicity of managing one set of infrastructure, flexibility to add additional services, and lower total cost of ownership are now being seen by organizations that head down this path. With 20% of commercial buildings predicted to be smart or intelligent by 2020, this trend will only increase. The requirements of services that leverage a converged network are quite different to those of the consumer services seen in ‘broadacre’ environments. Services regularly
SecurityLink India ■ September 2018
FEATURE
deployed within commercial buildings include telephony, CCTV, signage, wayfinding, wireless, access control, BMS/ HVAC and lighting. These applications often require Powerover-Ethernet (PoE) to power the endpoint, multicast support to manage the distribution of content, symmetric bandwidth to support content moving in both directions, and a high degree of redundancy due to the critical nature of some services. These are inherent within active Ethernet networks but are not typical of passive networks. Technology aside, another factor to consider is ownership and operation of the network. Passive networks are typically deployed by a carrier or service provider who then takes complete responsibility for the infrastructure and service delivery. When adds, moves or changes are required, this is undertaken by the organization responsible. This is ideal for the delivery of services such as voice, data and telephony to consumers but is less than ideal for building services.
Within commercial buildings there is often a need for the facility owner or manager to reconfigure the network to support new services or add new endpoints. This level of flexibility is simply not available when the network is operated or managed by a carrier or service provider and would generally incur additional costs. This would not occur with an active network that is managed by the facility.
Summary
S
o, when it comes to deploying optical fiber to support services, it is not simply a case of an active topology being better than a passive topology or vice versa. Consideration needs to be given to the environment and applications before a choice is made based on the requirements. In some cases, both can co-exist – a passive topology to deliver consumer services to residents which would be managed by a carrier, and an active topology for building services that would be managed by the facility.
Perfectly Keyless App Makes Car Keys a Thing of the Past Safe and stress-free key management by smartphone
T
he key of the future is digital, and it offers more features than its analog predecessors – impossible to lose or steal, and there is never a need to search for it. That is because it is stored securely and specifically for each user in a smartphone app. “Our Perfectly Keyless app is making conventional vehicle keys a thing of the past. Bosch is taking the car key into the digital realm and making it available anywhere, anytime,” says Harald Kröger, President of the Bosch Automotive Electronics division. With Perfectly Keyless, the smartphone replaces the analog vehicle key. This concept can offer owners of private vehicles increased convenience, but where it really shines is in vehicle fleets with multiple drivers. No more key handovers – fleet managers and logistics providers simply use the app to give drivers access to the vehicles. “Bosch’s digital vehicle key gives fleets a boost towards greater connectivity,”
Kröger says. The company believes there is a huge market for its solution, which is making its world debut at the IAA Commercial Vehicles in Hannover. The potential customers include some 15,000 logistics providers in Germany alone. Most of them manage at least a dozen vehicles and drivers.
●● Digital, not analog: With Perfectly Keyless, Bosch puts car keys onto smartphones. ●● World first: The first keyless access system for trucks. ●● For fleet operators: They can now flexibly manage which drivers have vehicle access and when. ●● No more hunting for keys: A digital key is always where it is needed.
SecurityLink India ■ September 2018
69
FEATURE
Secure key management with app and cloud
B
A keyless journey
R
ow upon row of hundreds of keys hanging on large boards – logistics providers still often use this method to organize the keys to their fleet vehicles. A missing key triggers a massive search operation. But every minute counts, especially with commercial vehicles. After all, if a truck isn’t moving, it’s not making any money. At the core of the new system is an app that dispatchers and truck drivers both have on their phones. This makes it possible to grant vehicle access with just a few clicks. In the future, the Bosch solution will also allow logistics providers to completely integrate digital key management into their dispatch and scheduling systems. As soon as dispatch is assigned drivers and trucks to a route, the system automatically generates digital keys for the vehicles and sends them to the drivers’ smartphones. If the route scheduling changes, the software adjusts the keys accordingly. “Thanks to Bosch’s fully digital key management, logistics providers enjoy both security and flexibility in their planning. This is the only way the logistics of the future will be able to function efficiently,” Kröger says.
osch digital key management connects trucks and the smartphone app via the cloud. Dispatchers or fleet managers use the app to assign a truck to a driver for a particular route. Perfectly Keyless generates a personal, secure digital key and sends it via the cloud to the truck and to the driver’s smartphone. As the driver approaches the assigned truck, the sensors installed in the truck detect the smartphone via a wireless connection. The vehicle doors will open only if the key on the phone ‘fits’ the digital lock in the vehicle. These sensors can also tell when the driver is in the driver’s seat, and the engine starts up as soon as the driver presses the start-stop button. When the driver gets out of the car at the end of the journey, the system detects this and automatically locks the doors.
Battery dead – No problem
B
ut what happens if the smartphone’s battery dies, or the device has gone missing? In the future, the vehicle key in the smartphone will work even if the phone battery is dead. In that case, the phone and truck will communicate using near-field communication (NFC), a wireless protocol for sharing data over short distances. Bosch plans to make it the ‘double hull’ of its solution. If the smartphone is lost or stolen, and the app with it, the digital key can be simply deactivated online, thus blocking access to the vehicle. It cannot be opened and started until the fleet manager uses the app to provide another driver or a new phone with access to the truck.
70
SecurityLink India ■ September 2018
INTERNATIONAL UPDATES
AP: Gateway To
India’s Digital Transformation Vizag Fintech Festival 2018 is poised to be the largest Financial Technology event. The week-long event will take place from 22-26 October in the city of Vizag, also known as India's Fintech Valley. Hosting over 3000 attendees including decision makers and investors from the Global Fintech fraternity, the conference will host an exclusive group of leading corporates, startups, academia and regulators from around the globe who will meet up and explore how these technologies will impact the future.
CONFERENCE THEMES
BankTech Future Of Banking, Investments And Payments
InsurTech
GovTech
Financial Inclusion
EmergeTech
Technology Enablers In Insurance
Technological Advances Fostering Invisible Government, Visible Governance
Increased Access To Financial Services For The Underserved
Emerging Technologies Including AI, Cyber Security, Blockchain, IoT And Big Data
KEY HIGHLIGHTS
75 + Renowned Speakers
800 + Delegates From Around the Globe
CXO Roundtable
6 Power Packed Keynote Address
ARE
YOU
Demo Day and Awards
CXO Golf Tournament
Fintech Valley Vizag is conducting $1Mn Challenge as part of Vizag Fintech Festival to enable startups to showcase their solutions and get a chance to win upto $1Mn in funding and setup their office in Vizag. Applications are invited from startups in following tracks
LLAR O D N O MILLI LLENGE CHA THE
Investor Connect
UP FOR
CHALLENGE AgriTech
EmergeTech
Fintech
Chicago 7th September, 2018
San Francisco 13th September, 2018
Paris 20th September, 2018
Bangalore 3rd October, 2018
New York 11th September, 2018
Tel Aviv th 16 September, 2018
Hong Kong 27th September, 2018
London 5th October, 2018
For More Information Contact Us
+91 85277 10029 An Ini a ve by
helpdesk@vizagfintechfestival.com Organised By
In Collabora on With
SecurityLink India ■ September 2018 www.vizagfintechfestival.com
71
INTERNATIONAL UPDATES
Drone Technology: Security Threats and Benefits for Police Focus of INTERPOL Forum
T
he drone whizzed over the heads of the crowd seated in the auditorium of the INTERPOL Global Complex for Innovation (IGCI) in Singapore, performing aerial manoeuvres displaying its ability to operate in enclosed indoor spaces. A second demonstration showcased drones designed for use in outdoor spaces, highlighting the benefits and also challenges of deploying such technology in public areas. Drone technology was front and centre at the IGCI during the Drone Expert Forum, a three-day (28-30 August) conference which brought together nearly 100 experts from law enforcement, academia and private industry to demonstrate how drones can at the same time be a threat, particularly for critical infrastructure, a tool and source of evidence for police worldwide. Organized by the INTERPOL Innovation Centre and Counter-Terrorism unit with the support of the US Federal Bureau of Investigation (FBI) and the Netherlands Police, the conference was a first step towards developing the global capacity to deal with the emerging threat posed by ‘unmanned aerial systems’ known as drones. To this end, continued engagement with experts in the field will assist INTERPOL in facilitating information exchange, as well as developing a set of guidelines and operational procedures for first responders to follow in the event of a drone incident, and to assist foren72
sic examiners in extracting data from drones to support investigations. “The impact of drones on law enforcement activities around the world continues to increase. Daily, I hear of new agencies considering how to use them in law enforcement activities; weekly, I hear of agencies receiving them in connection with active investigations; and it seems that every month a new twist on the drone threat emerges,” said Steve Watson, Chief Executive Officer of VTO Labs, who gave the keynote address. “The INTERPOL Drone Expert Forum has assembled a world-class group of experts and practitioners on the topic of drones and their intersection with law enforcement activities. INTERPOL continues to find ways to exercise leadership and inspiration on new technology topics,” he concluded.
Drones as a threat
T
he potential use of drones in a terrorist incident, or attack against a critical infrastructure and soft targets is a growing concern for law enforcement as the availability of drone technology becomes more widespread globally. As drones become less expensive and their potential applications continue to expand, it is expected that countries will witness an increase and evolution of this threat. Recent examples include terrorist groups using drones in surveillance activities and delivering chemical, biologiSecurityLink India ■ September 2018
cal, radiological, nuclear and explosive materials in conflict zones, and an environmental group which repurposed a hobby drone to enter the secure airspace of a nuclear site and crash into a building highlighted the current reality of the threat posed by the illicit use of drones. In this respect, experts from the FBI, NATO, the United Nations Security Council Counter-Terrorism Executive Directorate, national police agencies and the private sector underscored the need for a coordinated global law enforcement response which combines the expertise and developments made by various countries, military agencies and private industry to counter the threats posed by the nefarious use of drones. “The rising threat of terrorist groups using drones to attack critical infrastructure and soft targets has created a pressing need for the global law enforcement community to exchange information and share best practices. INTERPOL is committed to assisting its member countries protect their critical infrastructure by raising awareness, sharing best practices and facilitating information exchange on terrorist incidents involving drones,” said INTERPOL’s Director of CounterTerrorism, Patrick Stevens.
A tool for police
W
hile drones can be dangerous in the wrong hands, they are also a valuable tool for law enforcement. Participants heard how drones can be used by police to reconstruct a crime scene by
INTERNATIONAL UPDATES
using a drone to take pictures of the site from all angles, then feeding the data into a 3D printer. Drones can also be used by law enforcement to conduct surveillance, assist with traffic accident investigations, survey natural disaster sites and more. The conversion of drones and artificial intelligence (AI) technology offers additional benefits to enhance current police capabilities, from increasing officer safety and productivity to livestreaming of incidents.
A source of evidence
D
rones can also be a significant source of evidence to support investigations and prosecutions. Analysis of digital data such as speed, height,
GPS coordinates and flight records can reveal information about the criminals involved, while physical data such as fingerprints and DNA can also be present. Through further development of these capabilities, INTERPOL seeks to support member countries in increasing information sharing on drone incidents and developing their abilities to conduct effective forensic examinations of seized drones. “Different countries view drone technology in different ways – some define drones as a weapon, while others categorize them similarly to airplanes. On top of that, police are starting to use drones as a tool in their daily operational work,” said Anita Hazenberg, Director
of the INTERPOL Innovation Centre, “This conference has helped to bridge these different perceptions, identify similarities and exchange best practices amongst the global community on how to simultaneously address drones as a threat, tool and source of evidence in police investigations.” The conference builds upon the outcomes of INTERPOL’s Drone Working Group meetings in late 2017 and early 2018, which laid the foundation for the gathering of knowledge on the challenges and opportunities drones pose for the law enforcement community. Police innovation and technology will also be high on the agenda of the INTERPOL General Assembly session in Dubai in November.
NSC Statement on the NHTSA Campaign
If You Feel Different, You Drive Different Education, legislation and high visibility enforcement can change behaviors
T
he National Safety Council applauds the National Highway Traffic Safety Administration campaign, If You Feel Different, You Drive Different, and its goal to curb impaired driving crashes. Despite decades of education and enforcement, nearly 10,000 people are lost each year to alcohol-impaired driving. Now, with the country’s opioid epidemic and several states approving medicinal and recreational marijuana use, impairment on their roads is an even more complex issue. Drivers must understand that alcohol impairment begins with the first drink, and marijuana use affects both decision making and reaction time. Additionally, opioid use can seriously jeopardize safe driving. Education, legislation and high visibility enforcement can change behaviors. NHTSA’s campaign rightly focuses on all three. The National Safety Council is pleased to support If You Feel Different, You Drive Different, and we look forward to the day when impaired driving crashes are a thing of the past. The National Safety Council is a nonprofit organization whose mission is to eliminate preventable deaths at work, in homes and communities, and on the road through leadership, research, education and advocacy. Founded in 1913 and chartered by Congress, NSC advances this mission by partnering with businesses, government agencies, elected officials and the public in areas where we can make the most impact. SecurityLink India ■ September 2018
73
INTERNATIONAL UPDATES
Intelligent Building Management Systems Guidance for Protecting Organizations New Research Reveals Intelligent Building Security Risks, Vulnerabilities & Mitigation Strategies Report includes guidance to aid decision makers and help protect buildings against an array of threats and risks
T
he ASIS Foundation, in partnership with BOMA International (BOMA) and the Security Industry Association (SIA), has recently released ground breaking first-of-its-kind guidance for practitioners in the security and building management fields. Intelligent Building Management Systems: Guidance for Protecting Organizations provides a framework to help decision-makers assign a risk-based criticality or impact to their building and asks relevant security questions to develop appropriate mitigation strategies. It also serves to establish a common language amongst the many intelligent building stakeholders. The guidance is based on original research, Building Automation & Control Systems: An Investigation into Vulnerabilities, Current Practice and Security Management Best Practice, by David J. Brooks, Michael Coole, and Paul Haskell-Dowland of Edith Cowan University in Perth, Australia. The research provides an exhaustive overview of identified intelligent building critical vulnerabilities and mitigation strategies. “The ASIS Foundation is delighted to work with our partners BOMA and SIA to support such critical research in a rapidly developing but insufficiently un-
derstood field,” said Sandra Cowie, CPP, Director, Global Security and Business Continuity, Principal, and 2018 ASIS Foundation President, “Building automation invokes cutting-edge issues and technology such as the Internet of Things and advanced video analytics, as well as traditional concerns such as physical access control and proper procedures. The integrated whole undoubtedly poses challenges that are still emerging. This research is indispensable to helping our members get a handle on both the challenges and the opportunities of this fastgrowing market.” According to the report, the intelligent building market is growing at 31% per year and is expected to exceed $59B by 2023. These systems are increasingly embedded into the contemporary built environment due to the demand for reduced operating costs, government regulation, and greater monitoring, control and operability. However, this growth comes with a substantial set of security vulnerabilities that many security and facility professionals have not accounted for. Importantly, the research finds a significant disconnect between security and facility professionals’ perceived understanding of intelligent building threats
and risks versus actual dangers. In addition, the report revealed that a lack of common terminology and practices can result in misunderstandings and siloed views of associated security risks. The report findings emphasize the need to: ●● Take a multidisciplinary proactive management approach to intelligent building vulnerability mitigation, and ●● Fuse multidisciplinary participants into an intelligent building security team. Additional findings include the recognition of intelligent building integrators and cybersecurity experts as partners who can help organizations better understand threats and risks, and more effectively achieve intelligent building security. “The research developed by the ASIS Foundation provides insights that should be leveraged by our members and the industry to better understand and identify vulnerabilities within intelligent building systems. An essential outcome from this project is the recommended guidance and checklist that will help security practitioners and security technology solutions providers work together to implement strategies to mitigate against potential risks,” said Don Erickson, Chief Executive Officer, SIA.
at SKYDD & EXPO PROTECTION
P
ACOM has a packed calendar this autumn. They will attend SKYDD at the Stockholm Fair from 23-25 October, and the following month Expo Protection in Paris from 6-8 November. SKYDD is the Nordic region’s largest exhibition for the security, fire, rescue and personal protection sectors. PACOM will demonstrate their Unison and Unison Visit solutions. Unison integrates access control, intrusion detection, video, fire, elevator, key management and intercom into a single intuitive user interface designed for campus environments, whilst Unison Visit provides an easy to use visitor management solution. Expo Protection is the leading exhibition in France for risk prevention and management. The PACOM team will showcase GMS, a multi-site security platform integrating with Vaxtor as well as Unison, an integrated campus security solution. 74
SecurityLink India ■ September 2018
INTERNATIONAL UPDATES
WINS
Benchmark Innovation Award H
ikvision has won the Video Surveillance Hardware category in the Benchmark Innovation Awards 2018. The winning Hikvision product was the iDS-2CD8426G0/B-I DeepinView dual-lens behaviour analysis camera, which uses cutting-edge deep learning algorithms to analyse human movement for improved safety inside buildings. Technology magazine Benchmark holds its Innovation Awards every year. The 2018 Video Surveillance Hardware category was strongly contested, with Hikvision competing against four other providers for the title. Gary Harmer, Sales Director for Hikvision UK & Ireland says, “Innovation is at the heart of our business, driven by our extensive research and development. We’re thrilled that Benchmark recognises how the innovative features we deliver with the iDS-2CD8426G0/B-I make a real difference to the safety of our end customers.”
The features behind the winning camera
T
he iDS-2CD8426G0/B-I provides a broad range of cutting-edge features that are not found in typical indoor surveillance systems. Instead of just detecting moving targets, it uses deep learning, stereo imaging algorithms and high speed GPU processing to analyse human body movements. As a result, it can be used to identify
a potential human threat or a personal safety issue in real time. For example, the camera can iden-
tify when people have fallen down, and this is gaining interest particularly among retail and healthcare organisations and for lone worker applications. Another feature is loitering detection, by setting up a specific distance within a defined region of interest. If a person’s movement exceeds the pre-set distance, an alarm will be triggered.
Innovation across the product range
T
he iDS-2CD8426G0/B-I is part of the broader Hikvision DeepinView series of cameras, which is designed to boost surveillance system performance across a range of security and management applications. The Hikvision DeepinView series cameras offer features such as: ●● Human body detection, which can detect human bodies while filtering out other movements, in order to reduce false alarms. SecurityLink India ■ September 2018
●● Facial recognition, which uses facial image modelling and similarity calculation to alert system operators to the presence of persons of interest. ●● People counting, which uses video analytics to track the number of people who enter and exit a particular area, enabling businesses to improve their profitability and site management. ●● Illegal parking detection, whereby the system user is able to set illegal parking zone or the maximum parking time. As soon as the vehicle enters the zone, or its parking time surpass the limit, the camera is triggered to collect the evidence. ●● Queue detection, whereby the camera is capable of providing real time alerts and historic information post event on queue waiting time, queue density, etc. 75
INTERNATIONAL UPDATES
2018 G20 Buenos Aires summit
Will the G20 Deliver on Anti-Corruption in 2018? R
G20 commitments at risk
Spurring global action
B20 and C20 collaboration
osted by Poder Cuidadano, Transparency International’s chapter in Argentina, this year’s C20 summit has a simple, yet critical goal – amplify the voice of civil society to ensure G20 leaders make good on their promises. One of the seven engagement groups of the G20, the C20 is in a unique position to represent the interests of citizens and advocacy groups in urging world leaders to act on behalf of the people they serve, and not just in the best interests of politicians and special interest groups.
owever, earlier in a rare show of solidarity, the Business 20, which represents the private sector, and the C20 released two historic joint statements highlighting the crucial role of anti-corruption in maintaining economic and financial stability. The first statement urges G20 countries to create specific anti-corruption action plans to help combat crossborder corruption and build accountability; the second statement calls for increased integrity and transparency in state-owned enterprises, which are essential to national economic success. With the business community and civil society speaking with one voice against corruption, the question remains – will G20 leaders finally live up to their promises?
ecently, activists from more than 600 civil society organisations and more than 45 countries worldwide gathered in Buenos Aires, Argentina for the sixth annual Civil 20 (C20) summit.As governments across the globe crack down on citizen groups, stifling their ability to speak out and hold governments to account, the role of civil society is more important now than ever. The meeting comes at a critical time prior to the G20 meeting later this year.
H
D
espite more than 60 anti-corruption commitments from G20 leaders in the last few years, there is little evidence of any real progress. A recent report from Transparency International exposing issues of money laundering and anonymous company ownership, found severe weaknesses across most G20 countries, underlining the lack of action.
H
A turning point in Argentina
I
n the opening session at the C20 summit, Argentinian President Mauricio Macri highlighted the importance of civil society in prioritising anti-corruption and promoting transparency, as outlined in the final C20 commu-
76
SecurityLink India ■ September 2018
INTERNATIONAL UPDATES
nique to G20 leaders. Days before the summit, Macri also announced that Argentina will develop a national anti-corruption strategy, and will invite other G20 members to do the same. Addressing the meeting, Transparency International’s chair, Delia Ferreira Rubio, joined by civil society leaders to outline what governments must do to commit to anti-corruption. What we need in the fight against corruption is AIR – action, implementation and reports. Transparency International and its participating chapters from Australia, Brazil, Mexico, France, Russia, Germany and Argentina, along with other C20 attendees,
urged leaders to uphold their commitments on anti-corruption and other essential issues at the G20 meeting in November, and launched the #G20takeaction social media campaign. Looking further ahead, C20 participants focused on how to maintain this momentum at future summits in Japan (2019) and Saudi Arabia (2020), with an eye toward 2030 and the deliverables outlined in the United Nations’ Sustainable Development Goals (SDGs). With so many competing priorities, it’s important for the G20 to keep a clear focus in order to implement their commitments. Why make new promises when the previous ones are still outstanding?
Announcing Half-year Financial Results, Revenue Grows by 26.92% H
ikvision has reported a total turnover of RMB 20.88 billion for the 1st half of 2018. The year-on-year revenue growth was 26.92%, and net profit attributable to shareholders was RMB 4.15 billion, up by 26.00%. Driven by innovation and value generation for its partners and 2018 First Half 2017 First Half YoY Growth (%) end-customers, Hikvision continYear Year ues its extensive development of Total Operating 20,875,758,224.63 16,447,539,736.52 26.92% leading technology, products and income (RMB) solutions with video technology Net profits and artificial intelligence (AI) as attributable to the core. One example of this is shareholders of 4,147,395,535.86 3,291,546,056.70 26.00% the Hikvision AI Cloud vision and the Company framework that was introduced at (RMB) the AI Cloud World Summit held in Hangzhou in March 2018, which includes building an AI industry ecosystem to accelerate the development of AI technologies, applications and services. Hikvision remained focused on improving the management and operational efficiency of the company while also strengthening channel marketing, project sales and technology partner collaboration. To drive continuing commercial success and growth, Hikvision is expanding its operations at home and abroad with major investments in local sales, marketing and service networks. During the first half of 2018, the company established more than 10 new regional offices in the overseas markets, which will further help improve sales, delivery and customer support offerings in local markets. SecurityLink India ■ September 2018
77
INTERNATIONAL UPDATES
Partners with
Developing a Unique esDynamic Module For analyzing cryptographic implementations of Chinese SMx algorithms
e
shard, a leading cyber security company helping experts solve complex security challenges, has launched a new module for its esDynamic platform, the all-inone software for cryptographic implementations analysis and transfer of technical know-how. The new SMx algorithms module is developed in partnership with OSR, a leading Chinese security company based in Shenzhen and delivering security tools, testing and solutions. eshard technology allows security experts to attack, pinpoint and refine the security of their products in a more efficient way, while ensuring them to build and share their knowledge internally. Focusing on addressing the Chinese security market with the best security testing tool, OSR partnered with eshard in 2017 and now supplies esDynamic platform to Chinese certification laboratories and developers of secure embedded devices. The Chinese ecosystem relies on specific Chinese crypto-algorithms, that is called SMx algorithms. To address this specific need, OSR and eshard jointly developed a dedicated module on esDynamic platform to educate industry on this algorithm and empower developers to analyze the security of its implementations. Junfeng Fan, leading Cryptologist and CEO of OSR – Open Security Research explains, “We decided to partner with eshard because their portfolio is complementary to ours. esDynamic allows us to better develop new attack scenario with the openness and modularity that modern tools should have. In addition, our co-developed SMx module finally brings dedicated solutions to the now leading Chinese security market. With this module, and also others such as AI based attacks, we are confident we can support this market across industries such as automotive, Smart and connected devices (IoT), identification, and others to adopt the security tools that they need.” “esDynamic is a platform designed by experts for professionals and empower our clients to include security by design in their solutions,” said Hugues Thiebeauld, CEO of eshard, “Everything has been done to ease the tedious work and offer professionals the open capabilities they need. Security analysts can integrate their own developments, create dynamic reports, customize existing templates for their team, so that designers can also validate some countermeasures. All these benefits are powered by eshard’s in-house optimizations, which makes esDynamic the fastest software in its field.” OSR and eshard keep strengthening their partnership and developing more dedicated solutions for their customers. 78
SecurityLink India ■ September 2018
Reporting 2018 H1 Preliminary Financial Data Revenue reaches RMB9.814 Billion, YoY Increase of 31.47%
Z
hejiang Dahua Technology Co., Ltd. has announced its unaudited preliminary financial data for the first half of 2018. During the period, Dahua Technology achieved a total operating revenue of RMB 9,814,041,352.48 (USD 1.44 billion), representing a year-on-year increase of 31.47%. Operating profit amounted to RMB 1,251,445,994.06 (USD 183.59 million), a year-on-year increase of 11.99%. Net profits attributable to shareholders of the company reached RMB 1,081,916,886.52 (USD 158.72 million), growing 10.06% year on year.
Information about operating results and financial position
T
he main driving factors behind company’s lasting growth are generated from the investment in the technology innovation, deep understanding of industries, the global distribution client-base, the capabilities to deliver video-based AI powered IoT solutions, and the ability to grasp the market pulse and general trends of this industry. During the reporting period, the Company’s total asset increased by 4.19% and net asset increased by 4.87% as compared to the beginning of the current reporting period, mainly due to the expansion of the business scale and the increase of the profit. The Company net asset value per share increased by 4.99%, mainly due to the increase in net profit attributable to shareholders of company.
INTERNATIONAL UPDATES
&
Illegal Gambling
Raids and Arrests Across Asia T
housands of raids have been undertaken and suspects were arrested in an INTERPOL-led operation against illegal gambling conducted throughout Asia during the 2018 FIFA World Cup. Operation SOGA VII (short for soccer gambling) saw more than 14,900 raids at illegal gambling dens across China – including Hong Kong and Macao – Malaysia, Thailand and Singapore, which were estimated to have handled some USD1.6 billion worth of bets. Coordinated by INTERPOL’s Organized and Emerging Crime Directorate, the operation targeted the organized crime networks behind illegal gambling in the region. With 242 arrests in Hong Kong alone, additional information relating to arrests and prosecutions will be available to global police authorities as ongoing investigations unfold. During the month-long (22 June – 16 July) operation police seized more than USD1.7 million in cash, as well as 1,000 computers and mobile phones which are being analyzed to support ongoing investigations. In Macao, police received intelligence that a criminal network had set up an illegal gambling ring targeting betters in mainland China. A total of 16 individuals – including the suspected ringleader – were arrested in both jurisdictions following raids at residential buildings and casinos, and police seized vehicles, cash, computers, mobilephones and accounting books. “With the Hong Kong police force alone seizing betting slips worth USD16.8 million, Operation SOGA VII owes its success largely to the power of global and regional police cooperation through INTERPOL,” said Tat-Shing Man, Chief Superintendent of Hong Kong’s Organized Crime and Triad Bureau, “Participating jurisdictions made the most of our solid collective experience of six previous SOGA operations which enabled us to clearly anticipate links between Asian betting syndicates and their illegal counterparts operating beyond Asia’s borders during the World Cup.” Mr Man also serves as Chairman of INTERPOL’s Asia-Pacific Expert Group on Organized Crime. With Operation SOGA VII highlighting a clear shift from physical betting operations to online betting services, INTERPOL’s Director of Organized and Emerging Crime, Paul Stanfield, underscored how illegal gambling generates huge profits for organized criminal networks which are often linked to other serious crimes. “Such online platforms have brought an international dimension to the phenomenon and are often located in jurisdictions with few regulations on sports betting, presenting additional challenges for police. A coordinated international response is necessary to tackle this type of crime, especially as it moves from gambling dens to Internet-based illegal betting operations,” said Mr Stanfield To date, the combined seven SOGA operations have resulted in more than 30,000 arrests, the seizure of some USD 57 million in cash and the closure of more than 3,700 illegal gambling dens which handled almost USD 8 billion worth of bets. SecurityLink India ■ September 2018
Announcing Regulatory Clearance From the Minister of Innovation in Canada
T
hales and Gemalto have recently received foreign investment Regulatory Clearance in Canada. Together with the anti-trust clearance obtained in China and Israel, and clearance relating to foreign investments in Australia, Thales and Gemalto have obtained 4 of the required 14 regulatory clearances. Thales and Gemalto continue to work constructively with the competent antitrust authorities to obtain the remaining regulatory clearances in Australia, for the European Union, in Mexico, in New Zealand, in Russia, in South Africa, in Turkey, and in the United States. In addition, Thales and Gemalto are seeking CFIUS approval in the United States and regulatory clearance relating to foreign investments from the competent authority in Russia. As expected, the transaction should close shortly after all of the regulatory clearances are secured which should occur before the end of 2018. Further announcements will be made if and when a regulatory clearance is obtained, or the offer condition with respect to regulatory clearances is satisfied, waived or becomes incapable of being satisfied, or as otherwise required by applicable law. As recently announced the acceptance period has been further extended by Thales in accordance with an exemption granted by the Dutch financial markets authority (AFM) and will end two weeks after the fulfilment of the offer condition with respect to regulatory clearances or the waiver thereof (but no later than the Long Stop Date). 79
INTERNATIONAL UPDATES
Thailand Technology Summit 2018 Honeywell Presents Technology Enabling Digital Transformation Summit highlights Honeywell Connected Plant’s impact on productivity and efficiency
A
utomation professionals from across Thailand’s process industries gathered at Honeywell’s Thailand Technology Summit 2018 to learn how Connected Plant technologies such as advanced data analytics and cloud technology can drive Thailand’s Industry 4.0 transformation. The day-long event focused on solutions to key industry challenges such as unplanned downtime and the skills gap. The summit also addressed how Honeywell industrial cyber security solutions are an essential component of a robust Industrial Internet of Things (IIoT) ecosystem. As Thailand moves toward Thailand 4.0, protecting people, infrastructure and assets must be an overriding priority. Thailand is addressing these challenges with the right
80
people, processes, and technologies to minimize vulnerability to cyberattacks, improve incident response and disaster recovery, and ensure leading industries don’t lose visibility into and control over their manufacturing processes. “With the government actively promoting its Thailand 4.0 agenda, which is focused on transforming the country into a value-based and innovation-driven digital economy, Thailand is undergoing a transformative shift,” said Mai Trang Thanh, President of Honeywell Indochina, “Honeywell is supporting Thailand’s transformation and future growth through technological advances for a wide variety of industries, improving industrial operations and developing a new generation of skilled workers.”
SecurityLink India ■ September 2018
“Our Connected Plant applications deliver higher levels of safety, reliability, efficiency and profitability,” said Anand Vishnubhotla, General Manager, Honeywell Connected Plant, APAC, “By combining deep domain expertise along with data analytics, we enable our customers to get unprecedented insights into their operations. Our solutions seamlessly integrate process, assets and people across the enterprise to make every day the best day of production and every member of the organization operate as a leading expert.” The Thailand Technology Summit allowed attendees to view and experience the newest automation products and capabilities, including some of the Honeywell Connected Plant solutions that have been launched in 2018.
INTERNATIONAL UPDATES
SOTERIA Dimension Voted Best for Fire Safety A pollo Fire Detectors Ltd. has won the Fire Safety Product of the Year Award at the 2018 PSI (Professional Security Installer) Premier Awards for its innovative Apollo SOTERIA® Dimension fire detector range. The awards winners are chosen by security installers and systems integrators voting for their favourite nominations via the PSI website. Apollo’s SOTERIA Dimension beat nine other nominated finalists. “We are honoured that our SOTERIA Dimension range has been recognised by installers as their Fire Safety Product of the Year. This is tremendous recognition of the excellent relationships we have with our customers. “We are grateful for their support and look forward to working closely with them on future developments,” commented Karl Westhead, Technical Director of Apollo Fire Detectors, “Research and development is a major focus at Apollo and our test laboratory facilities play a crucial role in the success of our innovative fire
detection systems. SOTERIA Dimension was developed by our specialist engineers in response to the demand from architects, system designers, specifiers and installers for a fire detection device suitable for the most aesthetically challenging commercial buildings and secure facilities.” SOTERIA Dimension was designed for easy maintenance and servicing, with features such as self-test capabilities and drift compensation warnings on dirty detectors – all attributes that assist installers and offer peace of mind to the end-user. SOTERIA Dimension is the most recent addition to the SOTERIA family, reflecting Apollo’s ambition to deliver a real focus on innovation. Representing the most advanced developments in fire detection technology, SOTERIA Dimension uses new optical sensing technology in a ‘virtual sensing chamber.’ The flush-fitting detector combines functionality with style and is designed to fit perfectly in locations with the most
demanding aesthetic requirements. The entire SOTERIA Dimension range has surpassed the requirements of European Standards EN 54 Part 7 and EN 54 Part 17. An additional variant to the range is SOTERIA Dimension Specialist, a detector that encompasses all the technology of the standard SOTERIA Dimension device, with the added features of an anti-ligature metal faceplate and tamperresistant screws. These tough detectors have been tested and approved for antiligature certification to TS001, meeting the requirements of Ministry of Justice specification STD/E/SPEC/038. The result is a detector with greater resilience against interference or damage, making them the perfect choice for use in highrisk areas such as prisons, custodial suites and healthcare establishments.
Seeking Public Comments on Draft 2018-2022 Strategic Plan T
he United States Patent and Trademark Office (USPTO) is seeking comments on the draft 2018-2022 Strategic Plan. The draft plan sets out the USPTO’s mission-focused strategic goals – to optimize patent quality and timeliness; to optimize trademark quality and timeliness; and to provide domestic and global leadership to improve intellectual property (IP) policy, enforcement, and protection worldwide. The USPTO welcomes comments on all aspects of the plan. Comments should be sent by email addressed to Strategicplanning1@uspto.gov. The USPTO will consider all comments received during the public comment period from August 22 through September 20, and anticipates posting the final strategic plan for FY 2018-2022 on www.uspto.gov in November 2018. SecurityLink India ■ September 2018
81
FEATURE
82
SecurityLink India â– September 2018
FEATURE
The Importance of Being Earnest By Ruchir Walia – Product Manager, TA Netgables Pvt. Ltd.
O
scar Wild in 18th century, wrote a play called, ‘Importance of being Earnest.’ The play talks about a wealthy gentleman called Jack, who uses the name of Earnest when visiting a different town. Jack’s friend Algernon (Algy) also christens an imaginary friend Bunbury. The author clearly points towards the different lifestyle that Jack lives when he switches the name. Both the characters indulge in deception, created by the two names, or the imaginary friend as per their convenience highlighting the importance of being Earnest. Earnest in English language is defined as a thing intended or regarded as a sign or promise of what is to come. The intended satire of this English classic, although first performed in 18th century fits in modern day cookie world also. The websites or the web tools use cookies to predict what you would like to see. Cookies are actually given to a browser by the server. These cookies, then help the website to determine your interests, your likes, your dislikes etc. So if you have searched for a thing on the web and find ads related to it when you are visiting social media platforms, it’s just your cookies telling your social media about your likes and dislikes. The social media is a small part of our daily life. We are living in a globalised world, where the distance is just a number. IT has revolutionised the way we communicate, the way we spend our time, the way we shop, and most importantly the way we work. We are living a data driven life, making data an important tool. Imagine, if just like our social media platforms, our work and related data are also used to predict what we wish to do. The indication in itself has two faces. One points towards Business Intelligence (BI) wherein the data is used to automate our daily process and the other points towards data access provided to users without our
consent, commonly known as data leakage. The problem is exactly as has been raised in the play. Can we trust the web resources we have been relying upon? For BI the data moves in order to generate meaningful analysis, which can support business decisions, but the business is aware of the data movement and expects it to be turned into meaningful results. Apart from BI also, a huge amount of data flows from and within the organization. Be it through mail, phone calls, messages or marketing brochures. We are sharing the data, and if we are sharing the data, then what harm would a web portal sharing the data do? The answer to the dilemma is simple – when we share the data or the information, we are in total control. We can control the level of information that we share, as well as decide the receiver of the information. But in the case of our tool sharing the information, there is no control over what will be shared or how much would be shared. Recently, a social media giant was questioned for data privacy in the US. The organisation under question has a user base of millions and is a global brand. The brand is famous for not generating its own content, but has been accused of selling the customers’ information to a third party. The case for now seems to be confined to just social media, but if a similar thing happens with the web tool that we use for our official purpose, it will be a nightmares for business stakeholders. The impact of the harm from data leakage is hard to anticipate, and when we look at private security organisations the scenario turns into a complex equation. The organisation’s biggest resource is manpower which is exposed to high attrition. The manpower moves from agency to agency, and agencies are looking for guards. Hiring new guards brings training
SecurityLink India ■ September 2018
83
FEATURE
cost with it, making new hiring an expensive business. Along with the industry specific risk, the industry also faces the generic risk of exposing their contract/ tender value which can pose a direct danger to the agency’s income. The damage is not restricted to the private security organisation only but to the customer also. The customers hire private security agencies in order to protect their premises, but if the information such as guard allocation is out it can jeopardise customer’s security also. Specific to private security industry, a contradictory statement that is often heard in the industry is that the private security industry in India is highly unorganised. The ‘unorganised’ in the statement refers to the minimal usage of process solutions streamlining daily operations of the industry. But the statement is deceiving in its own terms. Most of the private security agencies rely readily upon available solutions. The commonly used solutions do not have any encryption and generate data in a format which can be easily transferred. The lack of encryption and easy availability of the solution makes the data prone to leakage. Some of the agencies have opted for offline solutions which, unlike the readily available solutions, are agency spe-
cific. These solutions need to be maintained in-house only. The private security agency has its expertise in manned guarding, and for an agency to invest in their solution maintenance is more of a cost than investment. Moreover, the technology changes rapidly, and the in-house software are often found lagging behind the latest technology, turning them into a burden for the agency rather than a solution. Cloud computing has revolutionised the world and looks like a perfect solution to the needs of the industry. Private security agencies should be able to relate to cloud computing more than any industry. Cloud computing is like giving our data to an expert to keep it secure and provide the authorised access whenever requested. Cloud solution providers deal in data and thus are well equipped to secure the data. There are solutions in the market which can work as a bridge between the agencies’ daily operations and cloud servers. These solutions provide add on measures such as access control, ensuring safe data transition. Moreover, the trending events direct towards the conclusion that, it is any day better to rely upon a solution which is dealing in data with our knowledge. An earnest solution which handles the data the way it says.
School Security Systems Industry (US Market Overview) By Jim Dearing – Security and Building Technologies, Senior Analyst, IHS Markit
W
ith the growing number of schools in the United States with video surveillance, electronic access control and other traditional security systems, the number of potential ‘greenfield’ projects for suppliers falls. Declining numbers of new security system installations will lead to slowing market growth over the next five years. Even so, security manufacturers are looking to implement the following new security technologies to im84
prove school safety, which would also help reignite market growth.
Facial recognition technology
M
any of the video surveillance systems currently used in schools are not actively monitored and also lack any form of effective automated response. Adoption of facial recognition technology would allow the surveillance system to proactively
SecurityLink India ■ September 2018
FEATURE
search for potential threats and alert school administrators and security staff about unrecognized individuals in the building. Unfortunately, affordable facial recognition technologies are often unable to adequately recognize the number of faces in a typical school; plus, these systems can place a large strain on a school’s information technology network.
Logical and physical security identity management integration
I
ntegrating the school’s access control database with a higher authority logical database – for example, a student directory – would allow the access rights of former staff, and students who have been expelled or already graduated, to be removed automatically. However, access control providers may find it difficult to get permission to access student records and other sensitive data. Education administrators may also be uncomfortable with possibly creating a potential avenue of cyberattack.
High-security classroom doors with multipoint looking systems
H
igher-grade doors would create a far more effective barrier between students and potential attackers, creating numerous safe spaces throughout the building in emergencies. It’s also true, though, that purchasing thousands of doors
would be expensive. Fire regulations often dictate that key entrances and exits remain fail-safe during emergencies. Locking and unlocking doors multiple times would also disrupt teaching.
Weapons checks using metal detectors or x-ray machines at school entrances
U
sing metal detectors or x-ray machines at entrances along the school perimeter makes bringing weapons into the school much more difficult. However, schools often have multiple entrances, which means each school would require multiple detectors or x-ray machines – both of which are expensive. The school would also need to hire additional security staff to operate each machine. Securing entrances in this manner would also mean long queues would form after breaks and lunchtime, reducing the free time of students and staff.
Access Control Intelligence Service
E
ntering its fourth full year, the IHS Markit Access Control Intelligence Service provides primary analysis of the equipment market, plus thorough investigation of key technology trends affecting the industry. Current topics of focus include: mobile access, logical and physical identity management integration, adoption of biometric technology and security system convergence.
HIGHLIGHTS ●● The education sector of the market for security equipment and services reached $2.7 billion in revenue in 2017. As most schools have already implemented surveillance systems and access control systems, the market is expected to grow an average of just 1 percent annually, reaching $2.8 billion by 2021. ●● A ccording to survey data from the National Center for Education Statistics, the proportion of schools deploying video surveillance systems has risen from 20 percent in 1999 to over 70 percent in 2013. Likewise, the proportion of schools actively controlling the entrances to their buildings has risen from 75 percent to over 90 percent. ●● D espite advancements in the level of security used on school premises, the number mass shootings at US schools has remained relatively constant throughout the past 30 years. When looking specifically at secondary schools, the number of mass shootings has reached an unprecedented high in the past five years. ●● New technologies are currently being investigated to improve safety at schools, including facial recognition, logical and physical security identity management integration and highsecurity classroom doors.
SecurityLink India ■ September 2018
85
PRODUCT SHOWCASE
EVS IPSAN Recorder & ES Server
SATATYA CIDR20FL36CWP
Compatible with Milestone XProtect VMS
D
ahua Technology EVS7000 and EVS5000 series IPSAN recorders, as well as ES512 and ES311 series servers are now compatible with Milestone XProtect video management software. This allows Milestone users to utilize Dahua Technology’s budget-friendly IPSAN storage solutions and high-performance server products as per their application scenarios. Dahua EVS is a hybrid SAN product designed and developed to meet the requirements of medium-range to high-end IP video surveillance applications. Integrated with Dahua video direct streaming technology, EVS can do video access, recording and management independently, without any recording server needed, making the surveillance system simple and budget-friendly. As a hybrid storage product, EVS can also be used in standard IPSAN storage solutions, working perfectly with Milestone XProtect video management software (VMS) server to supply flexible and cost-effective video storage solutions. Dahua ES series server is standard rack server based on Intel® Xeon® processor. Engineered with fully modular design, the server aims to provide clients with high performance, high reliability, lower power consumption and optimum heat dissipation. ES512 server is an excellent fit for surveillance and site security working with Milestone XProtect video management software (VMS), it also serves well for high-performance computing and other business applications, and provides flexible configuration options to better meet the ever-increasing demands by clients on servers. Currently, Dahua IPC, PTZ, NVR, XVR and thermal cameras are all integrated with Milestone platform. Continuous cooperation with world-renowned VMS platform enterprises like Milestone is well in line with Dahua Technology’s core value. 86
2MP IR Dome Camera with 3.6mm Lens
M
atrix Project series IP cameras are built using superior components such as Sony STARVIS sensor and higher MTF lens to offer unmatched image quality especially during low light conditions. Powered by true WDR algorithm, these cameras offer consistent image quality even in highly varying lighting conditions. Built-in intelligent analytics including intrusion detection, Trip Wire etc., ensure real-time security. Moreover, H.265 compression and automatic motion based frame rate reduction save bandwidth and storage up to 50%.
Features ●● The dark observer – Sony STARVIS series sensor. ●● Crystal clear night vision, color images at 0.08lux. ●● High efficiency video coding – H.265 compression technology. ●● Save up to 50% of storage space. ●● Vision adaptive – True WDR 120db. ●● Best image quality even in varying light conditions. ●● Capture more – Wider field of view. ●● 90° horizontal field of view. ●● Versatility – adaptive streaming. ●● Record more frames during motion, less during no motion. ●● Analytics – intrusion, motion detection, no motion, trip wire. ●● Certification – BIS, IP66, CE, FCC, IK10.
SecurityLink India ■ September 2018
PRODUCT SHOWCASE
Process Safety Suite Integrates aeSolutions’ Software to provide industry-first process safety management and risk reduction solution
H
oneywell Process Solutions has recently launched Process Safety Suite, which centralizes and synchronizes disparate process safety data to eliminate errors and inconsistencies, and thereby creates a complete, real-time view of safety risk for all levels of an organization. The new safety solution integrates aeSolutions’ aeShield process safety software with Honeywell’s Safety Builder, Process Safety Analyzer and Trace solutions, enabling increasingly resource-constrained process safety staff of large industrial facilities to efficiently monitor process safety while helping to reduce operational costs.
Process Safety Suite allows safety personnel to monitor process conditions by comparing actual performance from the plant historian with pre-defined hazard conditions from the risk analysis, and take immediate action to minimize risk. It also facilitates analyses such as Process Hazard Analysis (PHA), Layer of Protection Analysis (LOPA), Safety Requirements Specification (SRS), and Safety Integrity Level (SIL) calculations and classifications. “We’re delighted to work with Honeywell to create a new industry approach to process safety,” said Mike Scott, President, Software Products, aeSolutions, “By connecting design assumptions to real-time operating data, users can start to view process safety as a profit center that proactively and cost-effectively removes risk to the business.”
CLEARANCE Enables easy upload of video collected by smart phones and security systems New ‘File Request’ feature helps businesses, security guards, and bystanders share digital evidence with investigators
G
HPS signed a reseller agreement for aeShield with the software products division of aeSolutions, a consulting, engineering and system integration company that provides industrial process safety, cybersecurity and automation lifecycle solutions and tools. Process Safety Suite is a response to the timeintensive, manual procedures that most large industrial facilities use to manage process safety today. “The aeShield and Honeywell technologies work together to integrate critical steps in the process safety lifecycle,” said John Rudolph, President HPS, “The result is an enterprisewide risk identification and reduction capability that is unique in the industrial process safety market.”
enetec Inc., a leading technology provider of unified security, public safety, operations, and business intelligence solutions has recently announced the new ‘File Request’ feature for its Genetec Clearance™ digital evidence management system. The feature is designed to make it easy for the general public and private businesses to contribute to crime-solving efforts by sharing relevant video and photos from their cell phones and surveillance systems with law enforcement agencies. The new feature is simple to use. Investigators create a file request link or QR code that can be shared with the public in a variety of ways such as via social media, on the web or on the news. Contributors can then upload videos, photos, and other evidence directly into Clearance for police officers, investigators and security managers to review and use as part of their investigation. Since Clearance can accept a wide variety of proprietary file types and file sizes, it is easy
SecurityLink India ■ September 2018
87
PRODUCT SHOWCASE
for private businesses to upload digital evidence from their surveillance systems even if they are very large files. Once uploaded, all case information remains private and secure, and user actions are tracked to maintain chain of custody. The Clearance File Request feature also eliminates the need to create multiple copies using insecure means like DVDs or thumb-drives, and saves personnel time from having to drive out to gather evidence. “As we turn to our phones to capture life’s events, and as video surveillance increases, so does the amount of digital evidence created by personal devices and private systems. For investigators, getting access to this evidence can be tricky, especially since large video files are difficult to share. With the new File Request feature in Genetec Clearance, agencies can quickly put out requests for evidence, and maximize their efforts when collaborating during an investigation,” said Erick Ceresato, Product Line Manager at Genetec.
SafeNet Virtual KeySecure Scalable Virtual Key Management Solution Boosting Cloud Security Allows companies to maintain ownership and control of encryption keys and enforce data protection policies in leading cloud environments
G
emalto announced a next-generation key management solution, SafeNet Virtual KeySecure, for simpler and stronger cloud security. Companies can extend their data protection policies to private and public clouds, and centralize encryption and key management operations across multiple cloud environments. SafeNet Virtual KeySecure integrates with leading cloud service providers and virtual platforms such as AWS, Microsoft Azure, Google Cloud Platform, IBM Cloud, VMware, Microsoft Hyper-V and OpenStack, to provide companies with a single key management solution spanning multiple private or public cloud environments. As a result of the ongoing digital transformation within many organizations, data now resides across a growing 88
number of cloud environments and web applications. Security teams are finding it ever more challenging to manage data protection policies, and solutions are often time-consuming and manual. Data protection operations can be simplified by using SafeNet Virtual KeySecure to uniformly view, control, and administer cryptographic policies and keys for sensitive data. Companies can improve key security and simplify the audit preparation process by retaining ownership and control of encryption keys. “Businesses need options when it comes to cloud security and shouldn’t be limited to working in just one environment. With SafeNet Virtual KeySecure, organizations are able to move more workloads to the cloud, and easily monitor the access and movement of their encrypted data,” said Todd Moore, Senior Vice President of Encryption Products at Gemalto, “We are seeing a lot of customers who are interested in taking advantage of the business continuity offered by cloud environments, without compromising the security of their most critical asset, data. Current KeySecure customers would also be able to benefit from this new platform and we will be sharing details of a clear migration path with them in the near future.” SafeNet Virtual KeySecure offers customers: ●● Centralized key management: Centralized, efficient auditing of key management offers simplified compliance for cloud environments and consolidates key security policies across multiple, disparate encryption systems, protecting current investments. ●● Flexibility: Customers can easily deploy flexible highavailability configurations which are built on the latest industry standards including containers and micro-services, across geographically dispersed data centers or cloud service providers. ●● Compatibility: Compatibility with the OASIS Key Management Interoperability Protocol (KMIP) standard provides support for a large, growing partner ecosystem including the SafeNet Data Protection portfolio which provides customers with a broad spectrum of use cases that can be supported. SafeNet Virtual KeySecure also supports key storage in on-premise hardware security modules (HSMs). According to Sudesh Kumar, Founder and CEO of Kapalya, Californian-based start-up, “As businesses connect to more devices and cloud platforms, they need solutions that offer security without limiting their potential for innovation.
SecurityLink India ■ September 2018
PRODUCT SHOWCASE
With SafeNet Virtual KeySecure, we’re now able to offer the ability to protect data in a seamless and cost-effective way across endpoints, public clouds and private clouds. Businesses should no longer be held back in making full use of the cloud while retaining control of some of their most important assets.”
server, making it easier for end users to create tape backups in a Veeam environment. Users gain the benefits of tape for protecting against ransomware without complication. The converged appliance is offered as a single line item SKU, making it easier for VARs and distributors to provide a simple, one-stop solution for their customers.
Continuing Quantum’s history of integration with Veeam
Converged Tape Appliance for Veeam Environments Delivering offline data and Ransomware protection
Q
uantum Corp. has recently announced the availability of a new converged tape appliance designed to make it fast and easy to procure, install, configure and create tape backups in a Veeam environment for offline protection against ransomware. The solution is available as a single SKU, making it easier to purchase and implement a tape library platform optimized for Veeam backups.
Tape’s new role
Offline Ransomware protection
T
he new converged tape appliance is particularly wellsuited for customers seeking protection against ransomware, which has grown to become a $1 billion business with attacks increasing exponentially over the last three years. As an ‘offline’ storage medium, data stored on tape is not physically connected to the network, making it an effective barrier against ransomware and malware. Employing tape as part of a best practice data protection strategy helps enable customers to recover uncorrupted data and minimize disruption to operations.
Easy integration of Tape into Veeam environments
H
istorically, creating tape backups with Veeam backup and replication required a dedicated external physical server to host the Veeam tape server. Quantum addressed this challenge by building a blade server directly into its Scalar i3 tape library platform. This approach eliminates the need to size, configure, procure and set up a dedicated external
Q
uantum’s converged tape appliance continues a history of integration with Veeam. Quantum solutions uniquely combine disk and tape to provide hyper-availability storage solutions for Veeam environments. Quantum’s DXi deduplication appliances introduced integration with Veeam, embedding Veeam data mover to help customers restore any file, application, and virtual server from DXi appliances. Quantum’s multi-tiered storage portfolio of hybrid storage, deduplication appliances, object storage and tape complement the capabilities Veeam has introduced with the latest Veeam Availability Suite, and this combination is designed to offer customized data protection solutions to address the cost and performance needs of a wide range of customer implementations. Terry Murray, President, Prescriptive Data Solutions said, “Our customers value simplicity for protecting virtual machines, and tape is increasingly recognized as a vital tool in the fight against ransomware. Quantum’s converged tape appliance makes it easy to install, configure, and use tape within a Veeam environment, perfectly complementing Veeam backup and replication software.” Ken Ringdahl, Vice President of Global Alliance Architecture, Veeam said, “Tape continues to play a key role as an offline storage copy to protect against malware. This is part of how we can deliver hyper-availability to our clients, as part of a ‘3-2-1’ data protection strategy. Quantum’s converged tape appliance makes it easier for our customers to back up to and restore from tape in a Veeam environment, helping our mutual customers more effectively leverage their investments in tape.” Molly Presley, Vice President of Product Management and Global Marketing, Quantum said, “Quantum and Veeam have collaborated to make it easy for virtual environments to implement a tape solution that brings true peace of mind against the threat of ransomware attacks. Keeping an off-line copy of data on-premise is simply the best way to stop malware in its tracks.”
SecurityLink India ■ September 2018
89
PRODUCT SHOWCASE
Comprehensive Online VMS Training Course On-demand platform makes learning simple and convenient
ing a greater understanding of the Valerus platform. Unlike the certification course, there is no fee for the Basic version. “Vicon’s commitment to customer training has always been model for the industry, and we are proud to offer the same level of quality in our new online Valerus training course. We believe that the most positive customer experiences begin with thorough training and a full appreciation of what our system can deliver,” said Bret McGowan, Senior V.P. of Sales and Marketing, Vicon.
V
icon Industries, Inc. (Vicon), a leading designer and producer of security surveillance solutions, has recently announced that training and certification for its Valerus video management system is now available as a convenient online course. Following the same curriculum as Vicon’s popular in-person training program, the new online class provides in-depth instruction on all aspects of Valerus, from setup and programming to operational capabilities and spe-
Ocularis 5.6 VMS Further Improves the User Experience while Heightening System Security New administrator functionality empowers operator capabilities
O
cial features. Coursework includes hands-on learning and exercises that make use of the actual Valerus software. In addition, participants are encouraged to connect to any standard ONVIF compliant camera to simulate the most realistic user experience. The new online, on-demand format allows participants to schedule classes at their convenience, log-in from a location of their choice and learn at their own pace. The Valerus course is offered in two versions; both cover the same material. The Valerus Certification course is recommended for installing dealers. It takes approximately 10-12 hours to complete, including required testing, and must be completed within 60 days after starting the session. The Valerus Basic course does not include any exams, has no time limit for completion and does not confer ‘certified’ status. The Basic course is intended for end-users and others seek90
nSSI continues to add powerful new capabilities and enhancements to its flagship video management software (VMS) platform with the release of Ocularis 5.6. This latest release enhances overall VMS performance and operator functionality, delivers heightened system security with fortified dual authentication measures, and provides enhanced mobile and web access capabilities. These latest improvements included in Ocularis 5.6 combine to further empower users with a best-in-class VMS solution and experience.
SecurityLink India ■ September 2018
PRODUCT SHOWCASE
“Software providers face the ongoing challenge of increasing user access and programming capabilities while simultaneously fortifying security measures to help prevent unauthorized access. This latest release of Ocularis accomplishes both objectives while improving overall workflows,” said Ken LaMarca, VP of Sales & Marketing, OnSSI. Ocularis 5.6 bolsters system security by allowing administrators to require dual operator authentication when logging-in, along with the ability to specify system permissions for Ocularis Client or Ocularis Web/ Mobile. Every login activity into Ocularis Client is also logged and auditable for documentation and compliance, where applicable. With the heightened security measures in place, Ocularis 5.6 also improves operator functionality. For example, operators can now create, edit, save and delete views directly from Ocularis Client, giving them the control and flexibility to create the specific views they need to best perform their roles and meet their security objectives while maximizing effectiveness and efficiency. The updated Ocularis Client also provides users with the ability to view camera names from any number of views that are listed. Additionally, the Client includes a new performance mode that allows larger views to be downscaled for improved bandwidth efficiency. Furthermore, Ocularis Client includes a database update to ‘Select All Feeds’ for exporting, as well as the added ability to select audio from a different source when exporting. Significant changes have been implemented for Ocularis Mobile as well, including the ability to display multiple cameras in live mode while also disabling the IOS idle timer to ensure continuous remote viewing. System administrators can also now designate which specific users and user groups can log in to Ocularis Mobile and Web to control access to video from outside the company network. Additionally, Ocularis Media Server has been further improved with architectural enhancements that improve overall performance, scalability and reliability. Ocularis 5.6 improves overall system resilience and performance in several ways. Master Core redundancy (failover) support has been automated, so if the Master Core is unavailable when a user logs in, the user will still be able to access video via a Slave Core. Added performance enhancements include smart camera drivers for Vivotek cameras, extended support for H.265, and extended two-way audio support.
Wisenet T Network Positioning Camera
H
anwha Techwin has further strengthened its Wisenet T camera series with the addition of the 2 megapixel Wisenet TNU6320 network Positioning camera. Cameras within the Wisenet T series are designed to capture high definition images in challenging environmental conditions, and the Wisenet TNU-6320 is no exception. With a robust aluminium die cast exterior, the Wisenet TNU-6320 is able to work effectively even when the ambient temperature is as high as 55°C, or as low as minus 40°C. The Wisenet TNU-6320, which is a true day/ night (ICR) camera, can be programmed to endlessly pan 360° in order to monitor a wide area, and also offers operators the flexibility to select from up to 255 pre-set positions which can be scheduled. A wide range of features ensures the Wisenet TNU-6320 delivers optimised images in every situation. These include progressive scan, which provides sharp edges on moving subjects and vehicles, wide dynamic range (WDR) which with performance greater than 120dB, can accurately produce images in scenes that simultaneously contain very bright and very dark areas, defog, digital image stabilisation and a varifocal lens. Supporting H.264 and MJPEG compression and with an SD/ SDHC/ SDXC memory slot to ensure video is automatically recorded in the event of network disruption, the Wisenet TNU-6320 also features motion detection and a wide range of analytics such as virtual line, appear/ disappear, face detection and cameras tampering.
SecurityLink India ■ September 2018
91
PRODUCT SHOWCASE
EXgarde Web Integrated Security Solution
I
ntegrated security manufacturer TDSi has recently announced exciting new features for its powerful EXgarde Web security solution. Additional functionality includes approving door entry PIN codes and photo capture, all from any secure Internet-enabled device. “EXgarde Web was originally launched in 2014 and offers an additional option to interface with TDSi’s powerful EXgarde solution. It allows security operators or authorised staff to add new security users and grant access through any Internet enabled device, commented Alex Rumsey, Director of UK Sales at TDSi, “The operator can capture key fields (such as name, organisation and car registration etc), assign security rights and issue access cards.” EXgarde Web’s new PIN code functionality allows a PIN to be amended and assigned to a door, as well as adding validity across a range of dates and times (which is useful for assigning cards for visitors or short-term contractors). Photos can also be captured through the web portal, so photo ID can be created easily and efficiently. The solution is also ideal for quickly responding to a security issue such as a lost or stolen access card. The suspect card can be suspended and a new card be issued rapidly, with a visibility of all activity to assess the whole situation. Equal-
ly, it can be used to rapidly compile reports, for instance during a fire or other evacuation. EXgarde Web will report on who has entered or left the building, which is invaluable to the fire marshall and search & rescue teams. Alex added, “EXgarde Web does not require any new software, the user just requires a spare network user client licence for the functionality to be supported. Secure access can be gained from any Internet portal, including major smartphone platforms as well as PC and Apple. Using a highly intuitive interface, little or no training is required to operate the software.” The solution is perfect for all sizes of organisations and applications. It is particularly suited to operators such as receptionists or anyone who uses the system on an infrequent basis, as the software is very easy to use. EXgarde Web’s flexibility deliberately has more limited features compared to the full blown EXgarde PRO Client interface, to ensure security in the unlikelihood a mobile device is breached, or the operator makes a mistake. Alex concluded, “EXgarde Web requires the latest version of EXgarde with the free web module installed on a client device. EXgarde Web can be used over multiple devices providing an unbeatable level of flexibility and usability for this powerful integrated security solution. If your business is already using EXgarde it is the perfect way to enhance your security regime for a minimal outlay.”
MIC IP fusion 9000i A Benchmark Innovation Awards 2018 finalist
T
he Bosch MIC IP fusion 9000i camera has been nominated as a finalist at the Benchmark Innovation Awards 2018, a scheme which recognizes and rewards innovative thinking and smart design.
Made for the extremes
W
hen developing the MIC IP fusion 9000i, Bosch went to extreme measures to ensure it performs at its best even when the weather is at its worst. That’s why the camera body is constructed from solid metal, capable of withstanding
92
SecurityLink India ■ September 2018
PRODUCT SHOWCASE
high winds, rain, fog, dust and 100% humidity (UL Type 6P and IP68), extreme vibrations (IEC60068) and high impacts (IK10). The MIC IP fusion 9000i is also designed to be fully operational in extremely cold conditions – down to -40°C – with the added protection of a window-defrosting function, so it continues to capture high quality video at very low temperatures.
Maximum situational awareness
J
ust as the weather is unpredictable, there are scenarios that nobody can ever foresee such as the sudden torrential downpour that reduces visibility on the roads, the busy railway yard gripped by arctic temperatures, the national border crossing shrouded in desert dust and so on. In these extreme instances, when objects can become ‘invisible,’ the MIC IP fusion 9000i has been proven to remain effective thanks to metadata fusion. This unique capability is made possible by the camera’s two built-in imagers – optical and thermal – in conjunction with the built-in intelligent video analytics. By fusing the metadata of both imagers, users are provided with full situational awareness, regardless of whether it’s the optical or thermal video stream that’s being monitored. For example, should a situation arise when the optical imager is obscured, like in a smoke-filled tunnel, data from the event will still be captured by the thermal imager. If an event is detected but not sufficiently visible in the video stream being watched, an alarm is always triggered notifying users to simply click the alarm overlay box. The user will then see the video data related to that event. Another standout innovation of the MIC IP fusion 9000i is the ability to use video analytics whilst moving, so when the camera is performing a panning, tilting or zooming move and detects a mobile object in a prohibited area it delivers an alert which activates the intelligent tracking feature to automatically track the object and dynamically adjust the field of view, to capture objects in great detail. Like all Bosch cameras, the MIC IP fusion 9000i is fully equipped to join the vast infrastructure of lighting, sensors and smart devices that will make daily security operations completely seamless, intuitive and protected.
New Artificial Intelligence Appliance New AI Appliance enables customers to keep legacy camera investments while adding state-of-the-art Avigilon Appearance Search and video analytics technology
A
vigilon Corporation, a Motorola Solutions company, has recently launched and pre-ordered of its new Artificial Intelligence Appliance (AI Appliance).
The AI Appliance enables customers to keep legacy camera investments while adding state-of-the-art Avigilon Appearance Search and video analytics technology
The AI Appliance adds patented self-learning video analytics and Avigilon Appearance Search technology to almost any IP camera. When connected to Avigilon Control Center (ACC) software, customers can evolve legacy camera systems into powerful AI solutions – with automatic alerts of potentially critical events and the ability to search for and locate a person or vehicle of interest across an entire site. “The demand for video analytics is increasing globally and we believe that all security systems will need to utilize this technology to become a proactive, and eventually, preventative solution,” said James Henderson, Avigilon’s President and Chief Operating Officer, “With the vast majority of legacy camera systems lacking the intelligence of analytics, the AI Appliance will provide more customers with the ability to use our advanced video analytics to dramatically change the way they interact with their systems.” Engineered for high performance, capacity and resiliency, the AI Appliance will be offered in two models and features leading CPU and GPU hardware that simultaneously support Avigilon video analytics and Avigilon Appearance Search technology. The AI Appliance is now available for pre-order and is expected to ship in the third quarter of this year.
SecurityLink India ■ September 2018
93
PRODUCT SHOWCASE
Wall Mount NVR When Space is Scarce
A
frequent issue that comes up in installations is that space is at a premium – there may not be room in an equipment rack or a convenient desk or shelf where an NVR can be placed. One answer is to mount the NVR directly to the wall. ACTi has made this easy with the new ENR-620P, a 9-channel wall mount NVR with 8 PoE ports on board. The unit is part of the ENR Generation 3 platform that can be integrated with access control and POS systems. Its advanced features include support for H.265 compression, digital and audio inputs/ outputs, custom display layouts, and more. The recorder can use a maximum of two hard drives up to 10TB each (20TB maximum storage capacity), and also supports external storage expansion.
H.264 or H.265 codecs. The flexible grid layout allows for a complete customization of the position and dimensions of each video channel. For instance, view of a critical location can be enlarged, video from a corridor camera can be positioned vertically to fit the portrait image orientation, or dewarped panoramic video can be extended horizontally to accommodate the wide image. Lights, alarms and other external devices can be automatically activated through the decoder’s digital output in response to events from intelligent cameras. The model is compatible with VESA standard so it can be easily installed between a TV mount and monitor. For a cable-free deployment, wireless connectivity to cameras and NVRs in the network can be added using an optional Wi-Fi module.
ATEX Infra-Red Beam Added to the GJD Product Range
G
JD has recently announced the availability of its external ATEX approved infra-red beam set (GS100). The ATEX approved infra-red beam provides versatile detection solutions, which allows engineers to reliably protect hazardous areas. The GS100 is designed to be used in association with alarm annunciation equipment, or other devices that provide
This unit has an onboard web server for browser support or can be operated with the ACTi NVR 3 workstation client or ACTi mobile client (iOS and Android). It is also fully compatible with the ACTi central management system (CMS) as part of the unified solution.
Full-featured video decoder with H.265 support
A
CTi decoders provide cameras’ live video without the need of connecting monitor to NVR. They are the ideal solution for public view monitors, for example in retail stores. ACTi ECD-200 is a new video decoder that can simultaneously display up to 16 video channels encoded using 94
SecurityLink India ■ September 2018
PRODUCT SHOWCASE
a means of monitoring the voltage free relay alarm output, for example CCTV integration. “The ATEX approved GS100 is an extremely reliable product, which is perfect for use in hazardous areas. It provides advance warning of potential intruder threats or safety breaches, providing total peace of mind to people on the site,” commented Mark Tibbenham, GJD’s Managing Director, “It is our sincere belief that GJD’s perimeter detection equipment is at the forefront of security in terms of detection ability, reliability and freedom of false alarms. The inclusion of the ATEX approved infra-red beam technology further enhances our product offering.” The innovative technology is ATEX certified and is suitable for use within the petrochemical and oil sectors, as well as other similar industries where explosion, flame, weather or dust proof housings are required. A major advantage of the GS100’s design is the asynchronisation of the beam connections to provide high level security allowing multiple sets of beams to be installed on the same site, or stacked above each other without ‘cross interference.’ As well as providing covert detection, being cost and energy efficient, range programmable up to 100m, the GS100 has a bi-optical beam transmission system to enhance the stability and reliability of the device.
Key features ●● ●● ●● ●● ●● ●● ●● ●● ●●
ATEX approval for zone 1 and zone 2. Covert infra-red detection. 100m beam range. TX/ RX beam set synchronisation and asynchronous connection. Pulse modulated. Heat strengthened plate glass aperture. Tamper switch. Bioptical beam transmission system. Energy and cost efficient.
Enhanced Traffic Management Solution for 5G Improving the throughput of high speed networks that support data transfer rates of more than 5Gbps
N
EC Corporation has recently launched an enhanced Traffic Management Solution (TMS) for 5G that improves the throughput of high speed networks that support data transfer rates of more than 5Gbps. TMS increases the quality of experience for end users and enables communication service providers (CSPs) to efficiently operate networks by providing them with sophisticated control over communications traffic. The full commercial launch of 5G requires greater throughput from core networks as well as wireless networks in order to realize high-speed, high-capacity communications. After the deployment of 5G, there will be a mixture of networks with different communication speeds such as 4G and 5G. Therefore, it is necessary to assure network stability at the time of a terminal’s handover between different types of networks. NEC’s enhanced TMS features advanced component software that increases the performance and accuracy of analytics. Moreover, Dynamic TCP Optimization, a function that enables control in response to changing network conditions, has extended its scope to the ultrahigh-speed range of 5Gbps or more. Trials of NEC’s enhanced TMS in a 5G test environment have improved 5G communications quality by increasing throughput by approximately 24% in the ultrahigh-speed range of 5Gbps or more; reducing download time during the handover from 4G to 5G by approximately 27%; and reducing the time to reach the maximum speed during the handover from 4G to 5G by approximately 64%. Moreover, since it can be used as is after the deployment of 5G, NEC’s enhanced TMS improves communication quality in 4G environments as well. “NEC contributes to a better experience for end users and more efficient network operations for CSPs by continuing to enhance TMS,” said Kazuhiro Tagawa, General Manager, Network Solutions Division, NEC Corporation, “Our TMS has been adopted by over 20 CSPs worldwide and we look forward to seeing it drive the further advancement of 5G.”
SecurityLink India ■ September 2018
95
PRODUCT SHOWCASE
Wall-mounted Fisheye Evolution 180 Panoramic camera
P Enhanced VMS User Experience with Two-Camera Immersive Surveillance and a Camera for Eyelevel Viewing of Crowded Locations
P
elco™ by Schneider Electric has recently made two announcements that improve the user experience for video surveillance operators by enhancing visibility of events and enabling faster response.
VideoXpert software release with enhanced Panomersive viewing
elco also released a new camera, the Evolution 180, which provides a de-warped view without blind spots to capture the areas of greatest interest, making it ideal for crowded areas like banks, hotels, malls, schools and eateries, as well as hospital and clinic waiting rooms. Typically, ceiling-mounted fisheye cameras present less detail on faces and objects that are situated at the periphery of the camera’s field of view, or captures the tops of subjects’ heads when located directly below the camera. Available in indoor and outdoor versions, the wall-mounted Pelco Evolution 180 with true day and night capability is built by Oncam and is specifically designed to deliver a high-definition panoramic view including a detailed eye-level view of people and vehicles.
P
elco’s VideoXpert Video Management System, version 2.5 (VX v2.5), is packed with numerous new capabilities including enhanced Panomersive immersive context viewing when using Pelco’s Optera camera with Pelco Camera-Link technology and a Pelco Enhanced series pan/ tilt/ zoom (PTZ) camera. This new feature allows system users to automatically and seamlessly shift from the panoramic view of Optera to a targeted subject or object within the same view using a nearby Pelco PTZ camera. “Combining immersive cameras with PTZs has been attempted by competitors in the past, but our ability to easily link separate Optera and PTZ cameras provides security directors with a great deal of flexibility in how they design their system while potentially saving money by using previously deployed cameras,” said Robert Beliles, Pelco Chief Marketing Officer, “The operator simply clicks on the panoramic view in Optera, and the PTZ instantly moves to the same spot. This combination of immersive context viewing combined with PTZ detail and tracking at distance allows operators to spend less time locating the object or person of interest, and more time recording their movements.” VideoXpert v2.5 is one of the larger releases in terms of long sought-after features in a video management system (VMS). VX v2.5 delivers a new rules engine user interface and a new flexible monitor wall enhancement to make the creation of any size monitor wall, and the ability to send events to any specific monitor quickly and easily. 96
Lift Interface for the Portal Plus ACS
V
idex has strengthened their networkable access control system, Portal Plus that supports proximity, keypads and bio access readers, by introducing a lift interface relay unit, the RB0408 that enables the operation of a lift to be controlled by the access control system.
The lift interface relay unit enables the calling of the lift and the restricted use of the lift to the users of the entry system. It can be used to enable the lift buttons, for instance, or allow direct floor selection. It’s an ideal access control solution for the management of a lift in both commercial premises and residential developments.
SecurityLink India ■ September 2018
PRODUCT SHOWCASE
2018. September 19, 20 & 21 BOMBAY EXHIBITION CENTRE - MUMBAI, INDIA
Unique pla orm with unparalleled business & networking oppo unity for professionals involved in the Safety and Security Industry
www.capex.co.in / www.future-cities.in For space booking, pa nership, delegate registration and speaking oppo unities: Vijay +91 98 3377 2109 / vijay@fai est.in Nikita +91 98 1910 7179 / nikita@fai est.in *Future Cities is the mega event that will present for the first time in India a 360 degree vision of the built environment: Municipalika - 15th edition of Sma & Sustainable Urban Solutions CAPEx - Innovative Building Materials & Technologies IIPM - India's first and the only B2B event for the real-estate sector SecurityLink India â– September 2018
97
NATIONAL ROUNDUP
Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)
“Security Link India” payable at New Delhi dated__________
* Please subscribe through admin@securitylinkindia.com
WE ARE UPDATING OUR DATABASE For free listing in Database:
For
Advertisement Contact: editor@securitylinkindia.com
* Send your detail to admin@securitylinkindia.com
Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 100
SecurityLink India ■ September 2018