I AM BEAUTIFUL...
... BUT MORE IMPORTANTLY I’M THE FASTEST AND MOST SECURE WAY TO ACCESS YOUR CAR-PARK
With my combination of UHF and Bluetooth® technologies, I recognize your visitors, employees, their vehicles or even both at a glance. I will comply with your security policy. Together, we will manage all of your access points. Your security will be under control from end to end, even in the most challenging situations.
My compatibility with the STid Mobile ID® ecosystem enables the use of smartphones and virtual cards to access all of your organization’s critical infrastructures.
My ability to support hands-free identification will provide you with a smooth access control experience without compromising on security.
WE’VE GOT YOUR BACK
EDITORIAL
Publisher
Barry Bebbington +44 1708 229354 Barry@pubint.co.uk
Editor Cora Lydon +44 7834 244613
cora.lydon@securitymiddleeastonline.com
ADVERTISING
Worldwide
Mike Dingle +44 1752 267330
mike@securitymiddleeastonline.com
Gareth Driscoll +44 1752 260603 gareth@securitymiddleeastonline.com
Ryan Bickerton +44 1752 265802 ryan@securitymiddleeastonline.com
Rahul Vara +44 1752 604352 rahul@securitymiddleeastonline.com
Middle East
Sandra Spencer +971 55 8767246 sandra@securitymiddleeastonline.com
PUBLISHED BY
Publications International Ltd
+44 1708 229354 166 Front Lane, Upminster, Essex, RM14 1LN, UK This publication
UP FRONT
It was great to see so many of you at Intersec 2023 – what an event! According to official statistics, it was a recordbreaking edition with 43,305 visitors travelling from 131 different countries. Over on page 56 you can find out more about what was happening at this year’s event and the key highlights.
We took along our camera crew and caught up with some key players in the industry to film short informational videos – on page 58 you can find out who we spoke to, and the videos are available to view on our website. Don’t forget to check out our events calendar on page 66 for more security-focused events.
Another headline-dominating topic of late is artificial intelligence and the impact it is having on society. On page 18 we look at how AI technology is driving security’s third wave and changing the way we look at security forever.
sponsor for this exciting event. Genetec have joined us as a sponsor and we will also have one of the company’s business leaders joining our panel discussions on smart cities. Take a look at page 54 to find who will be speaking at the event in Saudi Arabia.
You’ll also find content from Fadhl Al-Bayaty, Vice President of Product Management, VuWall, who looks at how to optimise surveillance in control rooms on page 26, while the implications on national security of the adoption of the metaverse is discussed by Security and Government Relations Expert, Ali Ayoub on page 24.
Enjoy!
© Publications International Ltd. 2023
For subscriptions and advertising enquires, or for further information on the magazine visit our website at: www.securitymiddleeastmagazine.com
No doubt the topic of artifical intelligence and machine learning is one that will also crop up at this year’s inaugural Security Middle East Conference. We have an outstanding panel of speakers lined up to address our audience and to share their knowledge gained through years of experience. We’re also welcoming on board our first
Cora Lydon Editorcora.lydon@securitymiddleeastonline.com
smemag Security Middle East Magazine
Integration made simple, however complex
Maxxess
CONTENTS
ISSUE 130 JANUARY/FEBRUARY 2023
MONITOR
03 Up front Foreword from the Editor
07 News Monitor
The latest regional and international security news
12 Market Monitor
A roundup of the latest security products and solutions
FEATURES
18 Security’s third wave
We explore the impact AI is having on the security landscape
24 Metaverse adoption and national security
Ali Ayoub, security expert, looks at the implications for national security as the metaverse is widely adopted
26 Video surveillance
Fadhl Al-Bayaty, of VuWall, looks at optimising surveillance in control rooms
32 IP surveillance
IP network surveillance is transforming the industry, writes Rudie Opperman, Axis Communications
36 Access management
We take a closer look at how Maxxess is working with Hotel RIU, Dubai, to achieve enhanced access control measures
40 Manufacturing security
Firas Jadalla, Regional Director, Genetec, discusses the latest physical security trends for manufacturers
44 Data bunkers
Omar Akar, Regional Vice President, Pure Storage, looks at what to do in the aftermath of a ransomware attack
CYBER MONITOR
48 Managing a private cloud
Deepa Kuppuswamy, from Zoho Corporation, looks at the considerations for building and managing a private cloud environment
51 Cryptocurrency attacks
Kaspersky has prepared a cheat sheet for escaping cryptomining attacks
INDUSTRY MONITOR
54 Security Middle East Conference
Find out more about the panel of exciting speakers we have lined up for this event
56 Intersec
We look back at the latest successful instalment of this security event
58 Intersec: Expo Live
Find out who the Security Middle East magazine team caught up with at Intersec to record informational videos
60 World Police Summit
The World Police Summit will be exploring the challenges and futuristic trends around crime prevention
61 Security responsibility
SPA member, Veronika Fáberová says everyone is responsible for security
62 2023’s cybersecurity trends
Dan Norman from the ISF predicts what we can expect for cybersecurity in the year ahead for the Middle East
64 People drive results
Peter O’Connell from The Security Institute looks at how people can drive results within the security sector
66 Events
Diary dates for forthcoming security exhibitions, conferences and events
Supercharge Your Cameras with Industry-Beating IDIS AI
Up to 98% accuracy powered by the in-house developed IDIS Deep Learning Engine
IDIS is transforming video surveillance with an advanced choice of edge cameras, AI box appliances, servers, and software - innovations that make it easy for you to supercharge your operations without the burden of ongoing maintenance agreements or device connection costs.
Whatever the size or type of your business, whatever your operational priorities, IDIS makes it affordable to harness the power of AI video, with solutions that give you optimized security and safety plus actionable business intelligence - all with industry-beating accuracy.
And our expanding AI video range upholds the IDIS promise of plug-and-play installation, robust performance, and a low total cost of ownership.
In Brief
DUBAI
Dubai Customs made a total of 2,147 seizures in the course of 2022, with 25.7m customer transactions made. Over the course of the year, it dealt with 288 intellectual property disputes including those relating to 14.5m counterfeit items.
Qatari Ministry of Defence launches LPD
REGIONAL NEWS
A1 Fulk, an amphibious vessel (LPD –Landing Platform Dock), ordered by the Qatari Ministry of Defence, has officially been launched.
The vessel was part of the Ministry of Defence’s national naval acquisition program and was ordered from Fincantieri.
The ship is approximately 143 metres long and can host around 550 people on board. It features two vehicle ramps, an internal floodable dock and a flight deck big enough for an NH90 helicopter landing. The adaptable LPD will carry out a variety of missions, from supporting the Armed Forces to carry out field operations to humanitarian initiatives.
Women in Cyber Fellowship programme empowers female cyber leaders
REGIONAL NEWS
Female cybersecurity leaders from the Gulf headed to the UK at the end of January as a part of a fellowship programme for insight into leading government, startup and industry cyber practices.
The FCDO and NCSC UK-Gulf Women In Cyber Fellowship programme was set up in order to support positive female role models, promote peer-to-peer learning and cross-country collaboration and strengthen UK-Gulf cooperation and partnerships.
The Foreign, Commonwealth & Development Office (FCDO), National Cyber Security Centre (NCSC), innovation
company Plexal and digital risk management consultancy Protection Group International (PGI) are all supporting and empowering female cyber security professionals through the fellowship programme.
Lindy Cameron, CEO at the National Cyber Security Centre, said: “The UK-Gulf Women in Cyber Fellowship is doing fantastic work nurturing diversity and ultimately building cyber resilience for our Gulf allies. At the NCSC we are committed to help increase female representation in the cyber security workforce, and we are extremely proud to support this fellowship.”
SAUDI ARABIA
Sawaher, a new online portal, is set to launch soon to ensure security control at the entrances to Makkah, Saudi Arabia, to identify people and vehicles. Security teams will be equipped with systems to detect wanted persons, as they travel by road. While posts to social media platforms will be analysed and linked to security command platforms.
BAHRAIN
Grant Thornton Bahrain’s Director for IT Advisory is warning companies that they need to strengthen privacy protection to stay protected against cyberattacks. Technology and cyberattacks are evolving and data is becoming more important to our daily lives.
KUWAIT
From September, all public schools in Kuwait will be using fingerprint biometric systems to help identify violations, neglect and fraud amongst school officials. The project is being overseen by the Ministry of Education, who has already secured regulatory approval and selected the supplier.
QATAR
Qatar National Bank has rolled out contactless biometric payments for its customers, negating the need for a physical payment card or use of a smartphone. It’s the first bank in the country to use facial recognition technology by payments. It has been introduced in partnership with Visa, using the PopPay solution from PopID.
Disconnect between cyber teams and management highlighted in report
REGIONAL NEWS
Trellix has revealed a widening gap between cybersecurity professionals and senior management when it comes to cybersecurity. Its research found that 42% of UAE cybersecurity professionals believe that the board doesn’t pay sufficient attention to digital security issues.
The research also found:
n 89% of UAE cybersecurity professionals agree there is a welldefined ownership of cyber risk at board and management level.
n 26% of respondents say cybersecurity is not considered a priority by C-suite/board level which is creating challenges.
n 67% say regular discussions on cybersecurity are had between cyber teams and management.
n 34% say it typically reports to the board within one hour following a significant attack or incident.
n 19% confess it may take a couple of days or longer to report incidents to senior management.
Adam Philpott, Chief Revenue Officer, at
Trellix, said: “Ownership is not enough if it doesn’t translate into action. Creating a culture of cybersecurity across the organisation needs to be a priority on the board’s agenda today.
“The tone from the top must be conducive to robust cybersecurity management and so the board and cybersecurity experts need to find a common data-language to understand and discuss cyber risks, how to manage them and the board’s role in prioritising a strong security posture across the business.” trellix.com
AMSTERGI bolsters team
REGIONAL NEWS
Value-added technology distributor AMSTERGI, has appointed Rohit Khubchandani as Chief Sales Officer. He will be responsible for driving sales growth, expanding the company’s reach in the Middle East and African markets, and helping to solidify AMSTERGI’s position as a leader in its field.
“We are thrilled to welcome Rohit to the AMSTERGI team,” said Abish Mohamed, Chief Executive Officer of AMSTERGI Middle East. “His deep understanding of the market and his ability to develop and implement effective sales strategies will be invaluable as we continue to grow our business and reach new heights of success.” amstergi.com
Data breaches to surpass US$5m in 2023
REGIONAL NEWS
Acronis’ latest cyberthreats and trends report for the second half of 2022 has predicted that in 2023, the average cost of data breaches will surpass US$5 million per incident.
It also revealed that threats from phishing and malicious emails have increased by 60%, and remain the main
vector of infection.
In the UAE, organisations that were targeted by malicious attackers, lose over US$1.4 million (5.1m AED) in ransomware, with over 40% of those impacted companies forced to shut down as a result.
“The last few months have proven to be as complex as ever – with new threats constantly emerging and malicious actors continuing to use the same proven
playbook for big payouts,” said Candid Wüest, Acronis VP of Cyber Protection Research. “Organisations must prioritise all-encompassing solutions when looking to mitigate phishing and other hacking attempts in the new year. Attackers are evolving, using some of the tools, like MFA, that we rely on to protect our employees and businesses against us.” acronis.com
CRITICAL INFRASTRUCTURE SITES TRUST PELCO SECURITY SOLUTIONS
Government, public safety and critical infrastructure customers are dealing with highly sensitive information and they shouldn’t have to risk their video security data and worry about cybersecurity. With Pelco, you have a long-standing, trusted video security provider. The Pelco platform adheres to the National Institute of Standards and Technology, making it trusted and cybersecure.
The Pelco Exsite® Enhanced rugged, reliable and explosion-proof cameras are trusted, secure and compliant with the NDAA requirements to address cybersecurity risks. This camera line is purpose-built to monitor and control operations in hazardous locations with risks of explosion due to the presence of flammable liquids, gases or dust. Available in compact, fixed, PTZ and PTZ with IR option.
316L heavy-duty stainless steel construction to meet explosion and dust ignition proof requirements.
Wide temperature range optimized to operate reliably at increased temperature variances.
Certified and complies with international standards UL, CSA, ATEX, IECEx, EAC Ex.
Built-in video analytics bring greater accuracy and faster response time.
ONVIF® Profile S, G, T and Q compliance allows easy integration with third-party VMS.
Backed by Pelco’s 3-year industry-leading warrantyJaheziya recognised by UAE Cybersecurity Council at Intersec 2023 exhibition
Jaheziya – a single-stop service provider for defence solutions and emergency response services – has been recognised by the Cybersecurity Council during Intersec 2023. H.E. Dr. Mohamed Al Kuwaiti, Head of the Cybersecurity Council, presented JAHEZIYA CEO Talal Al Hashmi an award to recognise Jaheziya’s efforts in cyber training as well as its excellence in service provided during the current Cyber Pulse Project.
Jaheziya is part of EDGE, a leading advanced training and technology group for defence and beyond. edgegroup.ae
Milestone Systems names top video technology trends for 2023
INTERNATIONAL NEWS
Milestone Systems has identified two key trends that it believes will shape the datadriven video technology space for 2023:
Smart workplaces and cities
The UAE and Saudi Arabia both intend to continue to heavily invest in smart city projects like Masdar City, Expo City Dubai and NEOM. As a result smart city tech will continue to rise in 2023. “With the UAE aiming to become more technologically efficient, introducing data-driven concepts to the region with the developments of Smart Cities, Smart Workplaces, adopting Sustainability goals and more, datadriven video technology will become more prominent,” said Paul Park, Regional Director at Milestone Systems.
To reduce pollution, congestion, and accidents, futuristic smart cities will
leverage intelligent cameras for traffic management. Moreover, edge computing will promote various augmented and virtual reality (AR and VR) applications, allowing holographic teaching and AR shopping for end-users.
Within workplaces, companies will use data-driven video technology and smart sensors to facilitate remote and in-person work and help employers better understand employee activities.
Digitising the healthcare sector
Data-driven video technology will play an extremely significant role in transforming the healthcare sector. Data-driven video technology can identify precisely when a patient requires urgent attention. In terms of building better hospital environments and providing efficient patient care regimes, data-driven video technology can also alert the medical staff when a
patient is in distress, providing immediate medical assistance.
This technology will not only reshape the landscape of the healthcare industry but also potentially save thousands of lives.
milestonesys.com
Fortinet expands services and training opportunities to help plug skills gap
The prevailing talent shortage remains one of the most significant challenges facing security operations centres today. Fortinet’s 2022 Cybersecurity Skills Gap report found that 50% of global leaders cited security operations as one of the most challenging roles to fill – 42% are still in need of security operations analysts.
In response, Fortinet has announced new security operations centre augmentation services which have been designed to strengthen organisation’s cyber resiliency and support shortstaffed teams. In addition, the Fortinet
Training Institute has added initiatives across its programmes to boost access to its industry-recognised training and certifications.
John Maddison, EVP of Products and CMO at Fortinet, said: “Fortinet builds ML-driven automation into all of its SOC offerings to support short-staffed teams affected by the cybersecurity skills shortage. But technology alone won’t solve this issue, which is why we are dedicated to also delivering human-based SOC augmentation services to provide immediate support, while investing in an industry-leading training institute to
close the cybersecurity skills gap. This combination of technology, services, and training enables SOC professionals to better protect their organisations from detection to incident recovery.”
Fortinet has expanded its SOC-as-aService offering, now giving customers a single cloud-based dashboard to view actionable intelligence. It has introduced a new outbreak detection service, alerting customers to major breaking cybersecurity events, and it has added cybersecurity readiness services as part of its Incident Response offering. fortinet.com
Check Point Software Technologies achieves highest ranking in security benchmark report
Check Point Software Technologies has achieved a near-perfect score of 99.7% malware block rate and 99.9% phishing prevention rate in Miercom’s Next Generation Firewall Security Benchmark 2023 report.
To compile the report Miercom put the industry’s top four firewalls through a series of intense malware and phishing prevention tests. The average malware block rate for Check Point Software Technologies’ four industry competitors stood at just 54.1%.
Eyal Manor, VP of Product Management at Check Point Software, said: “The report validates the effectiveness of our prevention-first, collaborative approach to Cyber Security. Check Point Quantum Cyber Security Platform Titan solution and its position in the market, revolutionises threat prevention and security management.”
As a result of Check Point Software’s performance, Miercom awarded Check Point Quantum Next-Gen Firewall Miercom’s Certified Secure Award – the highest award
Invixium introduces IXM VERTU
Invixium has added to its biometric access control and workforce management solutions, with IXM VERTU, a sleek access control reader capable of authenticating RFID cards and mobile credentials via BLE or NFC.
“We are humble enough to understand that not every door demands biometric
security,” said Shiraz Kapadia, CEO & President of Invixium. “IXM VERTU’s addition to our product portfolio helps streamline the purchasing process for customers in need of well-designed, rugged access control solutions. Biometrics is and will continue to be our DNA.”
for competitive, hands-on testing.
“Based on our test findings and observations, we can see that Check Point Quantum excels in all the security efficacy testing categories,” said Rob Smithers, CEO at Miercom. “Check Point Quantum Next-Gen Firewall was superior in advanced threat prevention and offers the best protection against the latest generation of cyberattacks including Zero+1 Day Malware based on recent competitive testing.” checkpoint.com
VERTU is a full-featured reader capable of reading all major types of RFID cards including EM Prox, MIFARE and DESFire. It also supports various communication modes such as Wiegand or OSDP2 for secure communication with any access control panel. invixium.com
MAKE ROOM!
NOW... MORE CHANNELS OF POWER DISTRIBUTION – by ALTRONIX
ACMS12
Introducing ACMS12(CB) 12-Output Access Power Controllers with Fire Alarm Interface, and PDS16(CB) 16-Output Power Distribution Modules.
These new stackable sub-assemblies further increase access control capacity when integrated with Altronix Trove Series or virtually any wall/rack mount application - reducing overall equipment and installation costs.
Both feature dual inputs providing selectable 12 or 24VDC from any output with bi-color voltage LEDs for visual identification.
YOUR LEADER IN POWER | BACKED BY A LIFETIME WARRANTY
PDS16Zenith debuts world’s first AI EagleEye Intelligent Patrol at Intersec 2023
At this year’s Intersec, Zenith unveiled its next-gen AI platform. Launching its 3rd Generation Intelligent Lightbar device, Zenith continues to lead the market and disrupt its own technologies with reiterations of further technology firsts in its AI EagleEye Intelligent Patrol Policing release.
Embedded within the cavity of the Policing Lightbar is a fully functional AI Drone that is poised to take flight autonomously or when manually controlled by its law enforcement’s personnel, whilst on city patrols.
The top of the lightbar’s cavity slides
away to expose the skies allowing the AI-empowered drone to rise and take immediate flight. The AI Drone effectively unleashes an Eye in the Sky communicating a 360-degree Birdseye view back to HQ.
It also features 360 degrees Situational Awareness, Automatic Number Plate Recognition (ANPR), Make Model Color (MMC), Face Recognition (FR), LIDAR Speed enforcement, Automated Traffic Infringements including real-time detection of fastened seatbelt and mobile phones usage whilst driving. zenith.com.au
Xage announces Middle East expansion
Xage Security, a zero trust real-world cybersecurity company, has unveiled its plan for expansion to support critical infrastructure operations throughout the Middle East.
The company has opened offices in Dubai, the United Arab Emirates and Riyadh in Saudi Arabira. In addition Ray Kafity has been appointed as Vice President to lead the regional team
and spearhead the company’s strategic expansion.
“Cyber threats targeting operators in the Middle East are of international importance. Attacks on these companies don’t just have regional implications, they have ripple effects that affect economies globally,” said Duncan Greatwood, CEO of Xage Security.
“The region’s oil and gas, renewable
Immuta releases Immuta Detect
Immuta has released its latest product, Immuta Detect, providing timely insights into risky user data access behaviour for enhanced cloud data security posture and risk management. The solution enables quicker and more accurate risk remediation as well as improved data security posture management. New features include:
n Advanced access behaviour analytics – Immuta Detect consolidates data access logs
so that data and security teams can continuously monitor and analyse changes in user behaviour and data access entitlements by source, query, or user activity, as well as gain insight into security configuration and data classification changes.
n Sensitive data views and indicators – it provides a deep dive analysis of individual user and data activity, summarising activity across several factors including time frame, data
energy, utilities, chemical production, transportation, retail, and manufacturing enterprises have a heightened need for proactive cybersecurity measures. We’re confident that our expansion will accelerate the digital transformation of operators throughout the region while mitigating growing cyber threats.” xage.com
access events categorisation, most active data sources, and sensitive data indicators.
n Risk severity detection and scoring – the solution automatically scores data based on how sensitive it is and how it is protected (such as data masking or a stated purpose for accessing it) so that data and security teams can prioritise risks and get real-time alerts about potential security incidents. immuta.com
HARNESSING THE POWER OF AI TO ELEVATE RETAIL BUSINESS OPERATIONS
Artificial intelligence (AI), machine learning (ML), and big data have transformed the retail landscape into a more organized, efficient, and dynamic ecosystem. Intensifying competition to offer the best value to customers is compelling retailers to leverage AI to gain a deeper understanding of their store operations.
The existing security infrastructure has catalysed this shift to new-age technology solutions that bundle together AI, ML, natural language processing (NLP), and data analytics. Most retail outlets have Surveillance Systems to gather visual data constantly. These systems offer much more than just security and theft protection when coupled with advanced AI-based video analytics. ML, NLP, and computer vision power retailers to predict demand, personalize marketing, analyse brand sentiments, manage inventory, and provide cashier-less check-out services.
Here’s how retailers are capitalizing on AI’s advantages to revolutionize how the retail industry works completely.
MVP Tech’s Transformative AI Solutions for the Retail Sector
Retail Security
AI in retail security encompasses several aspects of retail fortification against shoplifting, theft, and in-store violence. Large stores with thousands of people constantly moving in and out are nearly impossible to monitor manually. Manually scrutinizing each camera feed in real-time and effectively studying the video data generated during a security breach can become extremely cumbersome due to inherent labour inefficiencies and errors.
Without AI, retailers are shorthanded when dealing with such incidents regularly.
Incorporating smart video analytics into the store surveillance infrastructure can accelerate security
operations, ensure rule compliance, protect people and property, and minimize risk to the company.
Inventory management
Retail giants can potentially lose billions due to inventory distortion from poor demand forecasting and inefficient warehousing. Inventory surpluses can squeeze margins, increase fulfilment and transportation costs, and raise overall warehousing expenses.
At the other end of the spectrum, a stockout can be equally devastating for retailers as they lose out on potential sales. Simply put, retail stores need to know what to stock, at what level, and at what time; without this knowledge, they risk losing customers to the store next door.
Using computer vision, image segmentation, and object detection algorithms, AI can track items on shelves and send alerts when there’s a stockout. Decision-makers can also use
Artificial Intelligence in the retail industry equips businesses with the intelligence to gain greater insight into retail operations, categorically enhancing security, customer service, supply chain, and marketing capabilities.
the data gathered by these algorithms to draft heat maps, predict demands, and improve retail and warehouse space usage.
Product placement
Manually auditing product placement and creating planograms for the retail floor is tedious and error-prone. Insufficient knowledge of which products to display on which shelves and in what quantities can prove detrimental to retail companies’ financial health. They need to invest in an AI solution that uses camera feeds to automate the audit process. Image recognition, object detection, and computer vision help fulfill two major KPIs.
First, it keeps track of how compliant the store shelves are to the planogram. Secondly, it tracks the availability of products on the shop floor. Together, this data can help decision-makers efficiently design planograms based on a deeper understanding of product movement and sales.
Customer behaviour analysis
Customer behaviour analysis helps identify suspicious behaviours and take pre-emptive action. It can lead to fewer in-store infractions and shrinkage. But an even bigger advantage that customer behaviour analysis gives, is a deeper insight into the consumer’s mind. Using KPIs like dwell and gaze time, retailers can compare the marketing value of shelves. Additionally, there’s emotional AI that can study human emotions, recognize them, and bring in a new angle to retail sales. They can boost
conversion rates, improve planograms, utilize omnichannel marketing, and personalize customer experiences to cross-sell and upsell.
With increased profitability, stores can offer more compelling experiences to their customers and provide them with the right products at the right time.
Cashier-less check-out
Customers today are looking for seamless shopping experiences that are quick, easy, and enabling. To facilitate such experiences, retailers need to focus more on one key area of friction: check-out lines. An AI-enabled cashier-less mechanism can expedite the entire process for customers while eliminating the need to employ human assistants.
But that’s not all. Retail outfits can decode consumer-product interactions using in-store cameras, IoT sensors, and AI systems. They can monitor the movement of products and create an integrated environment for customers to shop in.
Crowd analysis
Crowd analysis goes much deeper than detecting people entering and exiting the store. While overall footfall is a crucial metric, retailers can glean more detailed insights from it. They can use the data to understand customer sentiments, product reactions, consumer preferences, and sales demographics.
With proper crowd management, stores can ensure fire safety compliance, manage queues better,
facilitate timely staff changes, and improve overall store operations. Armed with this data, retailers can make a better listing, stocking, and in-store marketing decisions to boost margins and profits.
Optical character recognition
Day-to-day inefficiencies mar retail store operations in the administrative and management departments. These inefficiencies snowball into loss of time, sales opportunities, and potential customers.
One way to optimize the operational setup is to use optical character recognition (OCR). It can turn written text on receipts, invoices, labels, and other documents into digital media for intelligent machines to read, process, and churn into insights.
Retailers can also use OCR to smoothen out the customer invoicing, and product returns processes apart from streamlining merchandising, billing, packing, and supplier invoicing. Many retailers have also started replacing barcodes with OCR to scan products automatically and create a central data repository.
At the forefront of the AI revolution stands MVP Tech. An engineeringdriven mindset and a decade of onground AI experience enable MVP Tech to build scalable retail AI solutions. Our solutions get customized to suit each company’s specific business requirements.
Scan the QR code to learn why end-users require an intelligent and proactive surveillance solution that will go beyond conventional security capabilities. Our solutions provide a comprehensive system to elevate the retail setup’s operational, supply chain, marketing, and customer service profiles.
WELCOME TO THE THIRD WAVE
The days of organisations relying on a lone security guard with a flashlight are over. We have seen the first wave of analogue-powered tech with cameras, and are now nearing the end of the second wave of smarter security solutions like video monitoring software. Now it’s time to say hello to the third wave: artificial intelligence and data, says Cora Lydon
As the world of technology continues to rapidly evolve, the security sector is no exception. Artificial intelligence (AI) has emerged as a transformative force within the industry, promising to revolutionise the way we approach security and risk management. Is this the natural evolution for the sector, or could we be on the brink of a revolution?
For several years the security sector has been quietly evolving, developing new AI-powered applications and taking a new direction that many had predicted. But many in the industry feel we’re on the brink of a revolution that will see AI
technology well and truly embedded into the security landscape.
Richard Burns, Chairman of Intelligent Security Systems – ISS , said: “Honestly, I don’t see an enterprise security project without the need for a lesser or greater degree of AI.”
Hani Khalaf, Chief Technical Officer of IoT at Dell Technologies, agrees, but speaking at a recent SecurMiddleEast event focused on AI and security (see page 22 for more details of this event), suggested that we may not quite appreciate just how impactful AI will be until the future.
He said: “Usually we overestimate the tech in the short run and underestimate it in the long run. So I think much of the solution now is everyone is promising you everything but I think it needs to mature. But in the long run, it will have a big impact on the industry by and large.”
Making waves
It may feel like AI is very much the buzzword for 2023, yet ISS has been deploying neural networks in its solutions for over a decade already. So why has it taken so long for AI to rise to the top of the security conversation?
Burns explained: “Simply because manufacturers have overpromised and under-delivered. Accuracy rates are substandard. Implementations are over-complicated and, consequently, expensive. False positives are frustrating integrators and end users alike.
“Like a lot of aspects of our industry, it’s a mixture of software sophistication, ease of integration, and, far from last, real-time experience in the field making the systems work to their maximum capacity.”
Right now the AI landscape is dominated by the rapid popularity of the dialoguebased AI chatbot, ChatGPT. It’s believed
the service gained more than one million registered users in just five days – making it the fastest-growing tech platform ever.
This third wave of security holds unprecedented potential in transforming the security landscape and its trajectory is powered by data, analytics, and AI software.
Data is key
Data is nothing new in security – for decades the industry has been generating data. But data only becomes intelligent when it’s readable.
Aluisio Figueiredo, Chief Executive Officer of ISS believes that AI is just the
tip of the iceberg for this next security revolution. “I think the third wave now is data,” he explained. “What we are doing now is converting video into searchable data. So what’s the next wave? Building dashboards, understanding KPIs. For example, I’ll give a good example that we are working on now. When we find the subject of interest, how about his social media, for example, what is out there?
“This is not physical security, it’s more IT security. They’re going to search the database, collect and structure data, match with the AI, the facial, and then we have a profile of this subject of interest,
which is a little bit spooky, by the way.”
Dr Abdulrahman Alarifi, General Manager of Systems Engineering and Artifical Intelligence at TAHAKOM, recently spoke at the SecurMiddleEast event and acknowledged the power of data.
He said: “The reason that we are looking for artificial intelligence is that we are in the era of a lot of data. It is collected from different sources from social media, sensors, cameras, or from audio. Different kinds of sensors that can collect huge amounts of data.
“And this huge amount of data, you have to deal with it. And you have to process it. Also, we are in an era where computational power is much cheaper than before. And given that you have access to huge amounts of data with very good and powerful computational power, a lot of applications can be unlocked.”
How is AI used currently in security?
AI-powered security systems can now identify faces, recognise motion, and detect potential threats. AI-based computer vision technologies are also being used for surveillance and access control systems, as well as for automated facial recognition systems. By leveraging deep learning algorithms, these systems can detect patterns and quickly identify potential security threats. The speed at which they can do all this is incomparable to even the most proficient security professional.
AI is also used in cybersecurity applications. By analysing millions of events and logs generated by the various components of an IT system, AI-driven security tools can detect anomalies and potentially malicious behaviour, allowing organisations to react quickly and mitigate risks.
In addition, AI technologies are now used to automate the assessment and response to security incidents. AIdriven security platforms can analyse vast amounts of data from multiple sources, detect suspicious activities, and trigger appropriate responses based on predefined rules and parameters.
The challenges
Deploying AI to security solutions is not a straightforward task and security professionals must recognise that not all solutions out there are equal. One of the biggest challenges facing the use of AI in
security is finding great software and great people with the ability to use it.
Burns said: “Let’s just start with the fact that you need great software, on a great platform interoperable with other software and hardware elements of a project. As always – and it’s not trivial and never gets old – you need to understand the needs and use cases of the client.
“You then have to educate – especially that AI is not there to replace humans entirely, but to make humans more efficient in seeing and deciding on the most important judgements in an increasing welter of data points.”
So, are we nearing the point where the task of security is offloaded to AIcompetent machines? Burns believes not. He said: “As I said earlier, I hope not for all our sakes. A fully functioning neural network in a machine-learning environment is a little scary.
“There is a point where the creator and programmer stand outside the neural network’s ability to provide responses that a machine might make, but not a human seeing the same situation. We’re talking potential life and death situations, not just speeding tickets from traffic enforcement.”
AI is ready to shake up the industry
What we are likely to see in the coming years is the positive impact AI can have on IT and security teams. The technology will be able to improve on real-time monitoring, freeing up personnel to focus on data that indicates an issue, while the AI continues with its monitoring so nothing is missed. We may see security teams slim down, as AI applications take on their role, we’ll certainly see budgets slashed thanks to this automation as well as a reduction in threat response times. Resources and budgets can be far better utilised, plus it’s likely artificial intelligence will open the door to new opportunities for roles and jobs in the sector instead.
Leading the way
At SecurMiddleEast, Khalaf pointed to how well the technology is being used already. “There’s more to AI than just simple computer vision and algorithms,” he said. “For example: predictive policing. This is an evolving area where the police can predict crime in the future, and this is happening now.”
Dubai is one city that has invested heavily in the technology. In line with the UAE government’s Strategy for Artificial Intelligence (launched in 2017), the city approved its own Strategic Plan for Artificial Intelligence (2018-2021). The aim was to make Dubai the most secure city in the world, powered by smart services. By 2030 the city hopes that robots will form a quarter of its police force.
The mega project Oyoon connects all of the CCTV cameras in the city to a single centralised AI-enabled backbone. First announced back in 2018, it uses AI and data analysis to prevent crimes and marked Dubai and the wider Gulf region as key players in AI and data technologies.
The Government AI Readiness Index 2022 identified the USA as a world leader for AI readiness with a score of 85.72. The index uses three pillars when producing the ranking: government, technology sector, and data and infrastructure.
Several Middle Eastern countries were outperforming the global average index of 44.61, including UAE (68.54), Qatar (62.37), Saudi Arabia (61.96), and Oman (57.83). All were early developers of AI strategies.
Cross-border collaboration was noted as an untapped mechanism for accelerating work on common solutions for the MENA region, which could help drive AI readiness in the near future.
Look to the future
As the technology matures, we’re seeing next-generation solutions such as automated malware analysis, malware classification, and malware protection. AI is also making waves in access control, identity management, and predictive analytics. This tech-driven knowledge can be used by security teams to better manage and monitor patterns, understand user behaviour, and be more proactive in responding to emerging threats.
The rise of artificial intelligence in the security market is ushering in a new era of smarter, more efficient, and highly accurate security operations.
According to Deloitte Insight’s Urban Future with a Purpose report: “Machine learning and big data analysis make it possible to navigate through huge amounts of data on crime and terrorism, to identify patterns, correlations and trends. When the right relationships are in place, technology is the layer that supports law enforcement agencies
to better deliver their job and trigger behaviour change. The ultimate goal is to create agile security systems that can detect crime, terrorism networks and suspicious activity, and even contribute to the effectiveness of justice systems.”
Knowing the limitations
But the report also cautions: “Experts say it is almost impossible to design broadly adopted ethical AI systems, because of the enormous complexity of the diverse contexts they need to encompass. Any advances in AI for surveillance and predictive policing need to be accompanied by discussions about ethical and regulatory issues. Even though the value proposition of these technologies might seem attractive from a use case perspective, liberties and civil rights need to be protected by proper privacy and human rights regulations.”
The most important thing for organisations to be aware of is that AI technology requires vast amounts of data to do its job effectively. And to ensure
its accuracy, the data used to hone AIpowered security applications must be complete and unbiased.
Any AI application can only be as good as the data it is trained on. There is a risk that poor data can lead to wrong decisions being made or security lapses.
We also have to consider that it would be just as easy for AI to be used against organisations and put into play for nefarious reasons. While organisations can leverage technology to enhance security, there will always be those who utilise it for immoral means. As the technology grows even more powerful we must remain alert to its potential for misuse.
There is also the ongoing issue of privacy concerns and the ethical implications of AI-driven decision-making. Solution providers must ensure that products are designed with privacy at their heart, and that they are regularly tested and monitored to maintain accuracy and prevent false positives.
In Dubai, the police force adopted the AI Ethics framework that was developed
by the Smart Dubai initiative. The framework focuses on four principles to help address concerns about AI: ethics, security, humanity, and inclusiveness. By adopting it, Dubai Police are helping to ensure the AI systems they use are fair, understandable and transparent.
AI is here to stay
Despite these challenges, it’s clear that AI is here to stay and making an impact on the security industry. Security teams must embrace this new technology to remain competitive and keep up with the evolving security landscape.
Figueiredo said: “You keep finding new ways to solve problems and they keep getting more complex. So I see for the foreseeable future, this technology becoming more and more mature but I will not say that it is going to be 100%. We get very close. But I would not forecast it to be 100%.”
Figueiredo also recognises that the Middle East is forging ahead with its AI ambitions: “In the Middle East, they are a fast adopter. Here is a very good sandbox for us, they’re brave. They want to adopt the technology. When I go back home to the West it’s kind of going back to the old days. Here is the future.
“As other regions adopt, they’ll get more mature and they’ll understand the benefits and I believe that this will spread like a weed across the globe, it is inevitable.”
Within a short time frame, we can expect to see AI become an integral part of security protocols. With this in mind organisations must be aware that while AI technology is powering forwards at an incredible pace, regulation of the technology is running a few years behind.
As the Government AI Readiness Index 2022 report states: “We need governments to rapidly roll out responsive regulatory regimes. The hugely significant advances in AI increase the risk of the technologies being harnessed by bad actors or creating services that society is not ready to deal with. Care needs to be taken to make sure that AI systems don’t just entrench old inequalities or disenfranchise people.”
So as we look to the future, it’s time to embrace the potential that artificial intelligence can unlock.
issivs.com
“The ultimate goal is to create agile security systems that can detect crime, terrorism networks and suspicious activity, and even contribute to the effectiveness of justice systems.”
ISS hosts educational symposium on AI
Intelligent Security Systems (ISS) hosted another SecurMiddleEast event, this time focused on the topic of artificial intelligence and its integration within the security industry
Following the tremendous success of the SecurMiddleEast series, ISS along with its leading technology partners Dell Technologies and Intel – and with the support of Security Middle East Magazine – hosted its latest addition to the informative series.
ISS’s educational symposium was held at the Intercontinental hotel in Riyadh, Saudi Arabia in the final week of January. The Good, The Bad & The Ugly: An examination of AI’s progress in the security sector focused on the application of artificial intelligence in the critical universe of security.
The event brought together five influential thought leaders who were able to share their own experiences and lessons learned when it came to realworld AI deployments. Sharing their insights with the audience were:
n Abdulrahman Alarifi, General Manager of Systems Engineering and Artificial Intelligence at TAHAKOM;
n Dr. Mohammed Aladalah, PhD, Video Analytics Expert;
n Turki M. Al Shalhoub, BSc, MSCJ, MA(SSP), Senior Manager of Safety and Security at Diriyah company;
n Hani Khalaf, Chief Technical Officer of IoT at Dell Technologies and;
n Aluisio Figueiredo, Chief Executive Officer at ISS – Intelligent Security Systems
The symposium was chaired by Richard Burns, Chairman of ISS, who led discussions on the promise and perils of machine learning and AI on video intelligence and cybersecurity.
The inspiring speakers shared real-life use cases with the audience, from traffic control to biometrics, as well as discussed what was behind the growth of AI and how it was being applied. It’s clear that
its application to a multitude of security services will drive the industry forwards, but the panel were quick to dismiss the idea that it could spell the end of a career for security professionals.
The overall opinion was that artificial intelligence is presenting an opportunity, an opportunity to supercharge security operations and for it to work intelligently alongside security teams.
Following panel discussions and presentations there was also the opportunity for the audience to ask their questions and gain valuable insight from the leaders who are forging ahead in the world of AI-powered security.
The SecurMiddleEast Symposium’s audience was a remarkable group of both international and Saudi-based experts on AI and security, including end users, technology vendors, as well as corporate and government leaders.
issivs.com
Above (left to right): Aluisio Figueiredo, Hani Khalaf, Richard Burns, Dr. Mohammed Aladalah, Turki M. Al Shalhoub, Raheel JaliliAccess control solutions that secure your weekends.
™
Symmetry:
A scalable, integrated, open-architecture solution for organizations of all sizes.
Built on an open architecture that aligns with old, new and even competitive technologies, AMAG’s Symmetry Security Management solution delivers more flexibility, affordability, and better security in every area, including your work and your personal life. When it comes to peace of mind, Symmetry has your back, and your front, and every space in between.
AMAG Technology: Empowering You to Succeed. Learn more at amag.com
Metaverse adoption and the implication for national security
Recently, the Dubai Future Foundation (DFF), in partnership with PwC, released a comprehensive report on the outcomes of the inaugural Dubai Metaverse Assembly. A statement made by H. E. Khalfan Belhoul, the CEO of DFF, at this landmark event significantly elevated my interest in the UAE’s metaverse efforts: “The biggest risk will be not taking the risk.” It is an emphatic statement because it rationalises the nation’s sweeping reforms and initiatives related to Web 3.0 and its critical component, the metaverse. At a time when the metaverse accompanies piqued consumer interest and scepticism in equal measure, Belhoul’s words provide food for thought. The purported “risk”, the CEO says, pales in comparison to the potential rewards. Consequently, the UAE has undertaken broad-based efforts to gain a competitive edge in metaverse adoption, as evident from the launch of the Dubai Metaverse Strategy, which is expected to add $4 billion to the GDP annually and create 40,000 jobs by 2030. The said ‘value creation’ transcends economic sectors, with robust use cases being pursued already. The less-explored application, I believe, is in national security, where the metaverse can work wonders.
Security in the metaverse: A promise
Etymologically, the promise of the metaverse is undeniable: ‘Meta’, which
means ‘beyond’ or ‘transcending’, and the ‘universe’, which encapsulates everything known to humankind. So, the transition to the metaverse can be likened to the will to transcend possibilities. At a time when a new, digital global order is shaping up, requiring nations to underpin bilateral relations, trade, national security, and the economy with innovation, the pivot to Web 3.0 — the next iteration of the internet — is a logical step. The Web 3.0 integration, which entails the use of digital twins and metadata, can enhance the efficiencies of security operations. For example, security teams can virtually visualise a city, its critical infrastructure, and its borders and leverage AI to identify loopholes and proactively correct them in the physical world.
Such possibilities are not novel, as they have been explored in the likes of the Reynard Program, where researchers sought to identify virtual-world behaviours that exhibitors could act out in the real world. The objective was to identify suspicious behaviours and actions in the virtual worlds, such as the metaverse, and thwart their occurrence in the real world. At the same time, there has been an onus on policymakers and innovators to ensure that such capabilities do not infringe on human rights and personal liberties. In the UAE, that priority is seemingly not lost on the leaders, who are creating frameworks and regulations to safeguard the interests of all parties. The
launch of the Virtual Assets Regulatory Authority (VARA) recently is a good case in point. Such policies might come off as more red tape in the short term but could translate to a metaverse with fool-proof cybersecurity in the long term.
The cybersecurity imperative in Web 3.0
In any innovation, the early iterations tend to accompany loopholes and challenges, which bad actors and cyber criminals try to capitalise on. So, while Web 3.0 is inherently more secure by virtue of blockchain’s immutability and transparency, it is not fool-proof. In this nascent stage of development, metaverse applications merit effective cybersecurity methods. For starters, people must gain awareness of the potential challenges they could encounter in Web 3.0 applications. Innovators, for their part, must get acquainted with advanced threats while deploying best practices such as zero-trust network access and AIdriven tools that can orchestrate security operations at scale.
As far as raising awareness, upskilling, and training are concerned, the metaverse offers a favourable environment. In fact, it is encouraging to learn that multiple leading public and private entities in the UAE have already made considerable headway in harnessing the immersive environments of Web 3.0 for training. Conglomerate Majid Al Futtaim has trained
With the widespread adoption of the metaverse, the implications for national security are profound. Ali Ayoub, Security and Government Relations Expert, believes the UAE can unlock them before most
over 1,000 employees thus far, whereas Emirates Airlines has outlined its plans to hire 4,000 cabin crew members by mid2023 and train them in the metaverse. Likewise, DAMAC’s D-Labs, Metapolis (the company behind the world’s first metaverse-as-a-service), and Multiverse Labs, among others, are exploring use cases in their respective sectors, developing innovative products/services, and gaining a competitive edge while contributing to the larger Web 3.0 vision of the UAE.
Yet, the probable outcome is not a public-private duopoly; it is quite the opposite, with consumers gaining more control over data, technology, and products/services. Unlike the current Web 2.0, where Big Tech has the monopoly, Web 3.0 is about de-monopolisation and a level playing field. In the context of the changing global order, that equates to higher parity among nations in terms of diplomacy, military strength, and the economy. Every nation, irrespective of its history, can chart a new course for itself. So, it is easy to see why, in the words of H.E. Khalfan Belhoul, the biggest risk is not taking the risk.
About the author: Ali Ayoub is an Arabic entrepreneur and security expert. He is also the man behind the Annual World Police Summit project of Dubai Police, designing and developing its brand mark identity.
“Unlike the current Web 2.0, where Big Tech has the monopoly, Web 3.0 is about de-monopolisation and a level playing field”
OPTIMISING SECURITY SURVEILLANCE IN CONTROL ROOMS
The security landscape around visualisation has changed so rapidly in the past 10+ years that organisations are still catching up with the move to IP security cameras, let alone other advancements in video surveillance technology.
Control rooms have become a vital security hub in many applications — airport and transit security, cybersecurity, event and facility security, and more. However, despite advances in technology, there are significant challenges in control room environments that impede the monitoring and decision-making process.
First, it’s imperative to highlight how essential the operators are to the control room environment. To optimise decisions, they must be equipped with the right tools and be comfortable in their use. At the heart of effective control room design, is the mission to improve the operators’ productivity through tools on their workstations but also on the video wall control system so they can quickly share information, diagnose, react, and resolve abnormal situations in a timely manner — no matter if they are in anticipation, prevention, or crisis management mode.
Lots of data, too many screens
Control room operators typically need to monitor and access multiple information
streams in order to make accurate, mission-critical decisions. While having more sources of information and data than ever before is beneficial, it does pose a challenge in the ability to manage and visualise relevant content quickly and efficiently. Operators are flooded with data from disparate sources, networks, and applications, especially if they’re already working with a video management system (VMS) like Genetec or Milestone. Amid all that data, is the need to visualise the right information at the right time in a specific location on the screen.
While organisations recognise the importance of better video surveillance, there are several innate problems associated with monitoring the increased quantity of security cameras and data in a SOC (Security Operation Centre). These include operator fatigue from continuous surveillance that can be mentally and physically exhausting, distractions from other tasks and notifications, information overload from too many cameras and screens, and lack of context needed to interpret events properly. These factors can compromise the effectiveness of security personnel and increase the risk of inadequate or inappropriate responses to threats or emergencies. It is important to be aware of them and take steps to avoid them.
Cameras alone are not enough
While security managers will tell you that video is still the most important data in a SOC, they admit that other data points are increasingly necessary. For example, evacuation of a specific area is not just dictated on the video coverage of the area, but also impacted by data such as traffic, weather, etc. These different data points could include television, dashboards, sensors and alarms, maps, social media feeds, analytics, and more. To that end, it is advisable to plan out as many incidents as may occur to determine what additional data beyond video may be required and then make that content available inside the SOC.
New and legacy technology, multiple systems
It’s no question that technology brings with it many benefits, but it also means that employees are charged with constantly learning new technology and how it integrates with legacy equipment. SOCs typically utilise a software-based VMS to manage the security infrastructure, but they are not always designed to optimally manage other content (such as social media feeds, weather information, cable TV, and maps) on the video wall. This is typically managed
Most organisations will agree that the more video coverage, the better! Fadhl Al-Bayaty, Vice President of Product Management at VuWall, looks at the design challenges of control rooms and what it takes to overcome them to improve efficiency
through a separate software application, which would require switching between applications; it is not only cumbersome and time-consuming but also impacts operations and response time.
To streamline workflows that improve decision-making, organisations should seek out an interoperable platform that can handle old and new technology, is designed with an open architecture, ready for any future changes and additions. The platform should also provide both video wall management and VMS/PSIM integration with systems like Milestone, Genetec, and Advancis – all from a single user interface.
Efficient collaboration – sharing critical data
Organisations run more efficiently when operators and stakeholders can easily share content between workstations, on the video wall, and on other screens or video walls throughout the building, campus or even with other locations across the globe.
Efficient visualisation in SOCs
Providing a Common Operational Picture –a video wall – to operators is at the heart of any visualisation system. Selecting the right technology is key to ensuring that operators are able to see what they
need, when they need it. The most critical characteristics to consider are:
n Reliability: A video wall is expected to operate 24/7 and should therefore offer built-in redundancy and ensure the highest availability.
n Scalability: A SOC is a major investment where requirements and technology evolve frequently. The video wall system must scale as the needs change (increased quantity of cameras, new content, additional displays, improved workflows, etc.)
n Ease of use: A video wall that is simple to operate for all users is key.
In addition to the performance and processing power of the video wall controller, it is the software layer that makes all the difference. The software determines the user experience and how productive SOC operators will be. The most critical consideration of the video wall management software is interoperability – a platform that can route virtually any source type to any display and is compatible with third-party devices so that a single interface can be used to manage all devices on the network. Furthermore, a software that offers easy drag-and-drop to operate the video wall, along with all
other networked devices, will yield higher productivity and less stress.
Reap the benefits
To keep pace with the proliferation of surveillance cameras and the increase of data, SOCs need to plan accordingly to realise the benefits and avoid the risks. This means security managers need to rethink workflows, SOPs, staffing, and technology to account for new information and expanded capabilities. Visualisation and video wall technology gives stakeholders critical information on a single display surface. This common operational picture is at the heart of timely and comprehensive responses.
Managing all visual wall control should ideally be a single, easy-to-use management software that can process various source types, is interoperable with new and legacy equipment, is capable of IP routing, and is feature-rich to allow operators to see what they need when they need it. Simplifying workflows in control centres with a single platform, such as VuWall’s TRx centralised platform, to control and manage all devices, brings simplicity, flexibility, interoperability, and scalability to AV-over-IP deployments.
www.vuwall.com
CASE STUDY: VuWall Video Wall Controller, Tunisian National Guard, Ministry of Interior
CHALLENGE
The Tunisian National Guard serves as the defense force against external threats and as a security force against internal threats. Tasked with deploying a new system for the management, dispatching and display of different types of data, videos and other visual information coming from various information sources from the Ministry of Interior, this information needed to be compiled and displayed in a comprehensive and relevant manner so that control room operators and crisis room personnel can make quick and informed decisions.
SOLUTION
MultiCom, a Tunisian Integrator specialising in security projects, selected VuWall based on its longstanding history. They installed two video wall controllers to drive a large 6480×3600 0.9mm LED video wall, a 4K 65" interactive screen, and a 65" touch screen. The system can be controlled from 50 operator workstations. The control room is also equipped with two 10" ControlVu touch panels from VuWall, where operators have customised pre-sets that could be triggered by authorised users with the simple touch of a button on the touch screen.
RESULTS
The VuWall solution is deployed throughout the main Control Room at the National Guard as well as the Crisis Room. It is being used by approximately 50 people at a time, able to visualise what they need when they need it and share information with one another. VuWall has brought these operations the simplicity of dispatching different sources from different locations quickly and easily with an easy and intuitive user-interface that all operators were able to learn very quickly. VuWall’s unique offering has delivered the National Guard an unprecedented ease-of-use and operator efficiency with the unique ability to display any source type on any type of display and control/manage the visual experience from any workstation in the facility.
“VuWall has proven time and time again that their solutions bring the performance and reliability that government and mission-critical control rooms demand. But most importantly, we know that we can always rely on their team to have a smooth and successful deployment and on their products for a satisfied customer.” Nidhal Jerbi, General Manager at Multicom
A room with a Vue.
IS A ROOM ON A MISSION.
Introducing the new Vue Consoles. Seeing consoles in a brand new light. Configurable. Connectable. Adjustable. Just plain more than able. And able to accommodate multi-operator solutions. Static or height adjustable. Horizontal / vertical adjustable monitor mounts offer complete ergonomic viewing. Or should we say Vue-ing? Because everything allowing a mission critical room to operate with 100% focus went into every design detail. This is productivity by design.
Begin the mission at winsted.com
winsted.com
eCharge Hardy Barth and LEGIC: Turning eCharging stations into secure hubs for customer loyalty
Delivering a customer-friendly eCharging experience
In response to the EU’s strategy to phase out fossil-fueled cars, the electric car market in Europe is forecast for strong growth, from 2.9 million vehicles in 2023 to over 5.5 million vehicles in 2027, a CAGR of almost 18% according to Statista. To service this expanding market, eCharging stations for both home and businesses will experience even faster growth, reaching 56 billion dollars by 2029, an impressive CAGR of over 30% during 2022-29 according to Businesswire.
To facilitate this market, eCharging stations should not only support customer authentication, secure ePayment and bi-directional communication with the service provider’s cloud, they must also support complementary customer-loyalty services such as discounts on eParking, mobility services, public transport, car wash, food and drink, etc. via the same smartcard or mobile app. In many business cases, eCharging stations are an add-on service to existing business models that already support contactless payment such as car parks, grocery, retail and mobility rental services.
To support this growing ecosystem
around eCharging stations, eCharge Hardy Barth, a provider of eMobility solutions based in Germany, has partnered with LEGIC to create eCharging stations that support secure user authentication, ePayment, monitoring as well as multi-application capability that easily integrates customer loyalty services on the same smartcard or Android/iOS mobile app.
Secure and versatile thanks to LEGIC
Based on LEGIC’s Security Platform, Hardy Barth’s eCharging stations provide total security via end-to-end managed encryption, real-time user authentication, secure ePayment (open or closed loop), monitoring of station status as well as supporting multiple complementary applications that make eCharging services even more attractive. The platform supports both smartcards (managed via LEGIC’s Master-Token System-Control (MTSC) and mobile app via the trusted service LEGIC Connect. Customer interaction is contactless – all interaction is done via RFID, NFC or Bluetooth between mobile app or smartcard and a LEGIC SM-6310 Security Module embedded in each station.
Security benefits:
n Absolute security for customers based on the most secure encryption available (AES) and Secure Element for storage of encryption keys and other sensitive data
n Security ownership for mobile app integration and in-field station commissioning thanks to LEGIC Orbit’s Versatile Configuration Packages (VCPs)
n VDE compliancy-in preparation
n Realtime authentication of customers and maintenance staff both online and offline
n Optional two-factor as well as biometric authentication supported via mobile app
n Total security ownership during initialisation and smartcard population management thanks to LEGIC’s unique Master-Token System-Control: no dependence on external parties required
n Secure management and monitoring of stations via the cloud based on encrypted wired or wireless communications
Flexibility and convenience:
n Supports smartcard as well as mobile app (Android/iOS)
n Supports up to four simultaneous and individual eCharging sessions
Thanks to LEGIC’s Security Platform, Hardy Barth’s eCharging stations provide total security while supporting multiple complementary customer loyalty services to make the eCharging experience even more attractive
n Remote monitoring of eCharging status via smartphone
n Easy integration of multiple simultaneous customer-loyalty services to create an attractive service ecosystem around each eCharging station
n Open and closed loop ePayment options supported
n Convenient, contactless operation both online and offline
Getting started with LEGIC’s mobile credentialing platform for eCharging applications
To enable eCharging services such as these, mobile credentials need to be easily and securely provisioned to users anytime and anywhere. Encryption keys must also be securely distributed to eCharging stations and subsequently managed from the cloud. Such a service is LEGIC Connect which now provides end-to-end mobile credentialing services to over 14 million end-users in over 200 countries.
Provided as a trusted, cloud-based Software as a Service (SaaS), LEGIC Connect creates and securely deploys mobile credentials to Android and iOS smartphones anytime and anywhere
in the world. Encryption keys are also securely deployed and remotely managed at each station. Users include large companies, international hotel chains, large campuses, governments and hundreds of system integrators who leverage mobile credentials to create useful and innovative mobile-based products and services.
LEGIC Connect comprises an OWASPASVS audited Trusted Service hosted on AWS, a Mobile SDK to jump-start development of branded mobile apps plus LEGIC Security Modules which include an ARM processor, RF transceiver (Bluetooth, NFC, RFID) and tamper-proof Secure Element (SM-6300, SM-6310). These modules are embedded in infrastructuredevices such as electronic locks, eCharging stations or IoT sensors. Together, these components establish a cryptographically secure, bidirectional channel from backend administration system to smartphone to infrastructure. In addition to credentials, any data needing secure distribution to end devices such as firmware, cryptographic keys, whitelists or certificates can be transported via LEGIC Connect.
www.legic.com
About LEGIC
For over 30 years, Swiss-based LEGIC Identsystems has enabled companies from around the world to deploy solutions with demanding security requirements. Based on key management, trusted services and secure, contactless semiconductors, the LEGIC Security Platform provides end-to-end security for smartphone- and smartcard-based access, mobility, shared resource and industrial IoT applications.
About Hardy Barth
Germany-based eCharge Hardy Barth GmbH focuses on the design and production of charging stations for electric vehicles. Through in-house development, expertise in photovoltaic systems and load management technology has been established.
The company’s innovation has been honored with awards such as the Bundespreis 2017, Umweltpaket Bayern, Top Brand Award 2021 and 2022 and SolarProsumerAward 2022/23.
In total, Mr. Hardy Barth employs about 80 people at three companies which have their headquarters in Schwend, Birgland, Germany. For more information please visit www.echarge.de
A modern way to look at surveillance
Rudie Opperman, Manager, Engineering & Training, Middle East & Africa, Axis
Communications, looks at how IP network-based video surveillance is transforming the industry
The video surveillance industry is at a turning point. Growing concerns over private and public security are being answered by smarter solutions with more innovative technology. And the pace of innovation continues to accelerate.
Today, organisations are moving away from outdated closed-circuit television (CCTV) and analogue systems and transitioning toward internet protocol (IP) network surveillance. Security management of IP networks is extending intelligent capabilities to network cameras, making security systems more productive, scalable, and cost-effective than before. But what is justifying this shift towards network-based video surveillance, and what do organisations stand to gain from it?
How network surveillance works
Traditionally, organisations used CCTV systems for security and surveillance. These systems convert video signals to a format that can be sent via cable to televisions, VCRs or DVRs, or storage devices. On the other hand, IP-based surveillance systems use digital video cameras that convert video signals into IP packets. These packets of information are transmitted via a private network or the internet. Unlike CCTV cameras, these cameras do not require local storage for video data – only a connection to a
network. IP-based cameras also typically offer much higher resolution video and better picture quality than CCTV cameras. And more importantly, IP cameras have many more software-defined capabilities, such as advanced video analytics built on deep-learning algorithms.
Moving to IP surveillance
While many organisations have made significant investments in CCTV systems over the last few decades, the transition to IP-based systems does not mean existing CCTV infrastructure needs to be discarded. Some IP-based cameras can be integrated with legacy CCTV infrastructure and still enable more advanced functionalities such as cameras with remote pan, tilt, and zoom functions; power over ethernet; or video motion and audio detection. Standard IT equipment, such as switches or PC servers for video recording and storage, can simply be extended to include video functionality. And as security demands grow, network camera systems can be expanded and changed by adding more cameras or moving them freely around the network. Ultimately, implementing or integrating IP-based surveillance results in significant improvements in image quality, recording capabilities, reliability, and cost-effectiveness. That is why many businesses today have high-speed, IP-
based networks connected to the internet. Network video also offers far greater security than CCTV systems. Passwords can be used to limit access, and video can be encrypted before being sent over the network to make sure it cannot be viewed or tampered with. A network video system can also be set up to authenticate connections using encrypted certificates that completely prevent any unauthorised devices from gaining access.
The new opportunities for network surveillance
The shift to network video creates many new opportunities where more advanced digital capabilities can be used to deliver greater value. One of the major benefits of network video is the ability to access realtime video using any authorised computer from any location over the internet. Highquality video can be stored at remote locations for convenience and security, and the information can be transported over the LAN or internet as needed.
When they are designed for easy integration with other equipment and systems, network video cameras are less limited when it comes to where they can be used. A fully integrated network video system can be used for multiple applications simultaneously, such as access control, building management, point-of-sales systems, fire alarms, or intruder and visitor management. This allows organisations to scale with a continually developing system that is future-proof and does not require a complete overhaul of existing security
infrastructure. New technologies, additional cameras, or extra storage capacity can simply be added when required. Because of compatibility challenges, however, for this to work, network video products may have to be built on open standards.
Leading manufacturers of security and surveillance tech have started sharing open-source reference designs that improve compatibility, open the floor for innovation, and provide the industry with open and trustworthy methods for functions such as video authentication and verification. Network video products built on open standards are also more cost-effective. By using standard PC server hardware rather than proprietary equipment such as DVRs, organisations can drastically reduce their total cost of ownership as well as management and equipment costs.
This is particularly true for larger systems where storage and servers can make up a significant portion of a surveillance solution’s cost. Furthermore, independent research has found that the installation, configuration, and training costs for analogue systems are almost 50% more than for IP systems, primarily because of the high costs of coaxial cabling as opposed to ethernet cabling.
An intelligent approach
Network video enables more intelligent monitoring than CCTV systems in many ways. When massive amounts of video are being recorded, security personnel rarely have the time to watch or review
everything. Important activities and forensic information often go unnoticed. But with network cameras, the built-in motion detection and alarm management functions automatically ‘decide’ when to record video, at what frame rate and resolution, and when to alert a specific operator.
IP-based network cameras improve the reliability of such forensic footage by enabling better video quality with full frame rate, excellent colour representation, and the ability to digitally pan, tilt, and zoom, and to create multi-view video. Advanced analytics are also being applied to a growing number of use cases, such as including camera tampering detection, people counting, virtual fences, or vehicle license plate recognition.
Don’t be left behind
For the security manager, the shift to network video creates new opportunities where digital technologies can be used to save costs, scale seamlessly, and use more modern approaches to turn surveillance footage into business intelligence.
As the world continues to move from analogue to digital video surveillance, organisations should look for products and solutions that are based on innovative, open technology platforms to find a sustainable way forward. IP-based network surveillance will continue to grow and define our future, so now is certainly the time for organisations to start looking at the bigger picture.
www.axis.com
“As the world continues to move from analogue to digital video surveillance, organisations should look for products and solutions that are based on innovative, open technology platforms to find a sustainable way forward.”
THE KNOWLEDGE [TO] PROTECT
Security is our commitment
Monitoring of strategic data and assets. Predictive and proactive protection from physical and cyber threats. Secure digitisation of processes. Critical communications. These are the technological and operational capabilities that Leonardo offers institutions, members of the public, infrastructures and businesses.
115,000 security events monitored per second, and 1,800 alarms handled every day by the Global SOC (Security Operation Centre). 75 cyber-protected NATO sites in 29 countries and critical communications systems operating in more than 50 countries. Leonardo strives daily to enhance and keep data safe and secure in a world increasingly dependent on it.
ACCESS CONTROL: HOTELS
For the Emirate’s leading hotels, a key strategy is a renewed focus on access management, with front-runners implementing solutions that make it faster and easier for guests to check-in on arrival, and to use their rooms and other facilities throughout their stay, while discretely maintaining the highest levels of security.
There is also a determination in this competitive, fast-developing arena to set new benchmarks for service and efficiency. And the timing of current investments is all-important.
Globally, international tourism arrivals were up 60% last year, and are expected to rise a further 30% in 2023 to 1.6bn. In terms of volume, this is less than the pre-pandemic 1.8bn level, but tourism receipts are still expected to reach or exceed the 2019 high of US$1.4trn.
Limiting factors remain, including the ongoing war in Ukraine and the fact that Chinese tourist numbers are expected to be far below the 155m 2019 level. An S&P Global Dubai Purchasing Managers’ Index (PMI) survey points to some softening sentiment for the upcoming year, as the effects of tighter monetary policy and slower global growth weigh on the sector.
But even taking these into account,
hotels today are in a much stronger position than many previously feared. People are happy to be exploring again, and want to make the most of their time.
We see this particularly strongly in Dubai. The Emirate played host to 11.4 million overnight international visitors during the first 10 months of 2022, up 134% on the previous year, according to government figures. Hotel occupancy through the year rose to 71.5 percent, and revenue per available room was at its highest recorded level.
Not surprisingly – and regardless of global headwinds – the Emirate is confident about the coming decade. In December, a new national tourism strategy was announced, with a declared aim of hosting 40 million hotel guests by 2031 and pushing tourism’s contribution to GDP up to US$122.5 billion.
So, this is one of the most go-ahead hospitality markets where Maxxess currently operates, with exciting technology applications that reflect the country’s wider ambitions.
And we are working with a long list of hotels that are investing in advanced integrated systems and infrastructure. They want to stay ahead of international competitors when it comes to guest
experiences, and they want to embed more efficient operations, both back-ofhouse and front-of-house.
Solutions typically encompass multiple guest doors – rooms and penthouses – and external access for private villas, staff entrances, gatehouses, car parks, and goods-in areas. And integration with leading technologies including ASSA ABLOY Hospitality benefits guests with the latest contactless digital key functionality, allowing them to use traditional credentials or personal smartphones to access hotel rooms and safety deposit boxes.
The hospitality sector in Dubai is serious about investing in more efficient operations, as tourism rebounds from the pandemic doldrums. We speak to Lee Copland, MD at Maxxess EMEA, to find out how they’re working with Hotel RIU, Dubai, to achieve this with better access control measures
CASE STUDY Hotel RIU, Dubai
Hotels are sometimes linked with the wider developments going on around them. The 750-room all-inclusive Hotel RIU, Dubai, is a case in point. The newest addition to the international RIU Hotels and Resorts family, the hotel is one of the first facilities to open on Dubai Islands in Deira, a landmark development that will cover 17sqkm across five isles. The ecoconscious islands already feature one of the city’s hottest shopping destinations,
the Souk Al Marfa, an indoor Arabian bazaar that’s home to over 400 stores and waterfront restaurants – and Maxxess is providing the integrated security and safety backbone across the islands.
The hotel, set among upscale beachfront real estate, is at the heart of a busy visitor destination, and that makes efficient, smooth but secure access control a must-have.
The Challenge
Dubai developer Nakheel wanted a flexible technology that would combine secure access control with unified site
management of the entire development. They also needed to ensure that frontand back-of-house hotel operations run smoothly, with a fully integrated solution.
The Solution
Contractor Telematics, which specialises in major ICT and ELV projects in government and commercial sectors, including landmark hospitality developments, recommended Maxxess eFusion technology to deliver on multiple requirements, including: integration of front-of-house and back-of-house functions; integrated control of all access,
room management, surveillance, fire detection and building control functions; simple HVAC integration to ensure optimised energy consumption; plus system flexibility, with ease of use for busy staff, and a unified platform enabling a single situational view.
The eFusion solution implemented by Telematics enables this seamless integration of security and building systems, plus front-of-house services. The access control software enables efficient operation of all the hotel’s systems, including video surveillance, fire, intruder and other security, safety and site-specific applications and hardware.
Streamlining door access at Hotel RIU, eFusion uses over 20 Mercury door controllers to integrate with ASSA ABLOY Hospitality electronic locks and readers, blending with the location’s aesthetics.
This gives guests the option to use traditional RFID key cards or their personal cell phones for access to rooms and safety deposit boxes. Guests using mobile access not only benefit from smoother check-in and greater convenience but also reduced exposure to hygiene risks from touching surfaces.
Key management is also optimised, and guests benefit from more efficient housekeeping. From the eFusion interface operators can see the real-time status of each door, and occupancy status for each room, so if a guest room door goes off-line, or a battery needs replacing, maintenance is provided more promptly.
Five workstations are integrated, with more than 32 back-of-house readers, and a Diester Key Management system, allowing staff to work more efficiently.
Integration of Hanwha Wisenet® VMS into eFusion integrates nearly 300 cameras to give visibility of the hotel’s interior and external areas including a
private beach, five swimming pools, and the Splash Water World park and slides.
And with this access control platform, building services and environmental systems are also integrated, using the BACnet™ protocol. This allows operators to respond to alerts, and control the heating, ventilation, air conditioning, and lighting according to occupancy levels and building usage. It’s a facility that supports reduced carbon emissions and energy costs, in line with the UAE environment framework regulations, which aim to preserve natural resources through sustainable development, and to improve the UAE’s ranking in global environmental indices.
At Hotel RIU, eFusion access control software also handles alarms and notifications to provide a security backbone, driving service efficiency by removing the need for operators to continually switch between systems. For example, whenever an access event occurs, such as a forced door or a door left ajar, eFusion automatically brings up the nearest high-definition camera view, allowing a response with minimal delay. Through off-the-shelf integration,
eFusion also cost-effectively streamlines and connects front-of-house and back-of-house services, allowing staff to be directed from a single, easyto-use interface. Guest services and housekeeping can be delivered more efficiently as a result.
The result
Looking ahead, as the Dubai Islands projects in Deira continue to roll-out, eFusion’s modular approach will allow new facilities and new tenants to be accommodated.
With access control as the foundation, further capabilities and functions can be added too, thanks to flexible and scalable deployment options that will extend to the entire development.
The same flexibility and scalability will be in high demand across the UAE hospitality sector, as hotels rise to the challenge of the new government’s flagship growth strategy. Advanced access control and guest visitor management solutions will be at the forefront of these developments.
maxxess-systems.com
“Looking ahead, as the Dubai Islands projects in Deira continue to roll-out, eFusion’s modular approach will allow new facilities and new tenants to be accommodated”
New technologies for smart, secure and safe cities
Smart and safe cities are a way of life where technologies will increasingly support the sustainable and digital development of the urban environment for the benefit of the territory and its citizens. This will be undertaken through mobility, transport and energy, from environmental protection to communications and via physical and cyber security, infrastructures, and major events management.
Thanks to digital transformation, cities have become increasingly intelligent, through the spread of technological devices, sensors, and infrastructures. In this context, data integration through different technologies plays a role in providing operators with complete situational awareness, delivering the right information at the right time.
X-2030, the platform for the advanced City Management System
Leonardo, one of the world’s leading players in aerospace, defence, and security, has developed the X-2030 platform, which supports the decision process for the safety of cities, the territory, and critical infrastructure.
Based on the C5I paradigm (Command, Control, Communication, Computer, Cyber, and Intelligence), X-2030, cyber secure and cyber resilient by design, can integrate a large number of data
from heterogeneous sources allowing resilience management.
The platform uses typical digitisation technologies – AI and the Cloud – to provide a real-time snapshot of the situation and support decision-makers by collecting and processing high amounts of information from open sources, such as the internet or social media, data from planes, drones and ground sensors, integrating and enhancing technologies, networks and databases which are already available. The system also integrates information from earth observation satellites, to monitor and map the territory and its evolution. New data sources combined with those already available make it possible to create a complete information framework, which is available to operators providing them an integrated view of the context and ability to boost a well-informed and efficient decision-making process. The platform can autonomously track potential critical events such as fires, support urban mobility, or monitor critical infrastructures, providing valuable information to decision-makers.
Supporting the city’s strategic activities
For urban security, X-2030 supports the integrated management of operating rooms for the monitoring of environmental and anthropogenic events, prevention of risks such as fires and hydrogeological
instability, management of major events and demonstrations. The platform also offers valuable help in urban management: from mapping settlements and buildings to the optimised planning of urban interventions, to territorial protection and waste management. X-2030 can also improve the management of transport fleets, monitoring their journey, the impact on traffic and the environment, for efficient and sustainable mobility.
X-2030 can also bring benefits to resources optimisation in the field of critical communications. Another important feature of the platform is in fact its ability to integrate different communication systems including narrowband channels and the new capabilities offered by broadband technology.
The realisation of Smart & Safe Cities, based on an integrated vision of the urban context, is one of the areas where Leonardo wants to provide a decisive contribution. In order to achieve this objective, it is essential that cities are managed using new models and advanced technological solutions, such as X-2030, to guarantee safety, environmental protection, flexible mobility and efficiency in energy management.
leonardo.com
Leveraging physical security to protect and optimise manufacturing operations
Physical security has always been a top concern for the manufacturing industry. Firas Jadalla, Regional Director for Middle East, Turkey and Africa, Genetec, discusses the latest physical security trends for manufacturers and explores some innovative solutions that can augment the security landscape
Manufacturing organisations face a diverse set of security risks such as theft, sabotage, violence, vandalism and fires.
They account for a large number of injuries and fatalities, cause serious damage to property, lead to downtime and cost organisations billions of dollars every year. Another important challenge is to maintain workplace safety, as work-related accidents continue to be a major issue. That is why implementing strong safety management and control is critical for manufacturing organisations to protect their assets, improve safety in the workplace and reduce the impact of accidents.
Even with supply chain challenges, labour shortages, and an uncertain economic environment created by the pandemic, the manufacturing industry remains strong. According to a report from the United Nations Industrial Development Organization (UNIDO) global manufacturing production has, overall, been growing at a stable pace for the last few quarters and is now well above pre-pandemic levels. But, in spite of this positive trend, the industry is concerned with how to maintain this in the future. For many manufacturers, continued growth depends on reducing unplanned downtimes.
The cost of unplanned downtime
Interruptions can occur for a variety of reasons, including theft, perimeter breaches, and cyber-attacks. These can result in massive delays in output that
carry significant costs. Depending on the industry, unplanned downtime can cost hundreds of thousands of dollars every single hour. According to Forbes, industrial manufacturers can lose as much as 1-10% of available production time at a total cost of up to $50 billion a year.
So, what can manufacturers do? To reduce these interruptions, manufacturers need to:
1 track materials and products,
2 use and protect data more effectively,
3 extend security to the perimeter, and
4 ensure the safety and security of their workforce.
A unified physical security solution, like Genetec Security Center can help reduce the frequency and duration of interruptions while also bringing manufacturers into a new age of digital transformation.
Supply chain management: warehousing and transportation risks
In a recent Deloitte poll, 72% of executives surveyed believe that the biggest uncertainty for the manufacturing industry is ongoing supply chain disruptions. Given the global nature of manufacturing, maintaining the smooth operation of the networks that produce raw materials, transform them into intermediate goods, and then create the final product is vitally important.
Organisations can increase supply chain resilience by using tagging and fleet monitoring technology to keep track of highly valuable material as it moves through their facilities. Tagging involves affixing tags or labels to assets to identify each one individually and to monitor real-time locations. Fleet monitoring allows organisations to retrieve, store, and review all vehicle data, which makes vehicles easier to monitor. Both solutions can help reduce interruptions caused by assets going missing or being stolen.
Using a unified security platform, together with solutions like the TagTracker plugin and Security Center Fleet Monitoring from Genetec, can reduce unplanned downtimes by making operations more secure. Specifically, by providing physical security teams with insight into where assets are along the supply chain, manufacturers can mitigate potential theft or loss in the distribution process and make investigations faster and easier.
Digital transformation and the importance of cybersecurity
Embracing digitisation and moving towards more connected, efficient, and predictive processes at facilities can help manufacturers capture growth and protect long-term profitability. In 2022, 45% of manufacturing executives surveyed by Deloitte stated that they are anticipating further increases in operational efficiency
as a result of current investments in the Industrial Internet of Things (IIoT). The goal is to reduce interruptions by leveraging the benefits of connected machines and automated processes.
Greater connectivity and automation can also increase the amount of data that manufacturers can access as most IoT and IIoT devices are transformed into sensors for data collection. Manufacturers can use this data to generate real-time insights that will increase their competitive advantage.
Using a unified security system, like Security Center, to collect and analyse data from multiple sources can give manufacturers a more complete view of their processes and help them make key decisions about how to improve efficiency. They can use the data to develop accurate forecasting and planning models, improve strategic decisions, and perform predictive maintenance, which both decreases unplanned downtime and extends the life of machines.
This data can also help manufacturers comply with government regulations. In the US, for example, the Environmental Protection Agency (EPA) has mandated a reduction in Hydrofluorocarbons (HFCs) by 15% of their baseline levels by 2036. Monitoring levels of regulated chemicals in manufacturing facilities, like the HFCs for cooling and refrigeration, can be done through data collection and analytics. Non-compliance with any regulations can result in steep fines as well as costly downtime and production delays.
It’s important to remember that increased interconnectivity can make organisations more vulnerable to interruptions caused by cyberattacks. Data breaches can have a significant impact on production. In addition to losing valuable data and intellectual property, manufacturers run the risk of having their operations halted altogether.
To help mitigate these risks, manufacturers should plan to include cyber-hardened physical security solutions as part of their comprehensive approach to cybersecurity. These cyberhardened security solutions can reduce vulnerabilities and protect against threats that could lead to expensive and damaging data breaches.
Moving security to the perimeter
Perimeter protection is the first line of defense against intrusions that can lead to costly delays. In addition to securing their perimeter, manufacturers also need to coordinate effective responses to threats in order to limit potential disruptions.
Increasingly, plants that produce highly sensitive or valuable materials are at risk of experiencing drone intrusions. A hacker or malicious agent can use a drone to access wireless networks and cause interference as well as gain access to proprietary information and trade secrets. As with any intrusion, a drone can cause delays that impact a manufacturer’s overall efficiency and output.
Mitigating the risks of intrusions requires a physical security solution that makes investigating and responding easier and more effective. Speeding up the processes and making them more efficient can help manufacturers get operations up and running again with minimal downtime. Security solutions that offer intrusion detection technology for Restricted Security Areas (RSA), including radar and laser-based systems, are important for protecting the perimeter and operations.
Keeping workers safe
While workplace safety has always been a top priority for manufacturers, it became increasingly important during the
pandemic. Like everyone, manufacturers focused on maintaining basic safety precautions, including enforcing social distancing measures on the production floor and sanitising workspaces. They also increased their monitoring of people entering and exiting facilities as well as dangerous locations.
With their access control systems (ACS), manufacturers are able to ensure that the right people have the right access to the right areas. This can include ensuring that only properly trained people can access sensitive equipment or potentially hazardous materials.
Working with a unified physical security solution means that manufacturers can modernise and streamline their access management process to increase operational efficiency and avoid costly downtimes. With a physical identity and access management solution, like Genetec ClearID™, manufacturers can strengthen security policies by automating visitor requests while also improving the flow of people. And, with detailed audit trails of every visit, security teams can quickly investigate incidents and help get production back on track.
The manufacturing industry has been experiencing strong growth despite uncertain economic times. To build on this success and capture growth in the future, manufacturers recognise that they need to find ways to reduce costly interruptions and ensure the quality of their products and safety of their people.
A unified physical security solution like Security Center can help reduce the frequency and length of interruptions in operations by protecting the supply chain, improving decision-making, reducing cybersecurity risks, and enhancing workplace safety.
“Organisations can increase supply chain resilience by using tagging and fleet monitoring technology to keep track of highly valuable material as it moves through their facilities”
In a recent survey of UAE organisations, 59% said they had been hit by a cyberattack in the past two years, and of those hit by ransomware, more than a quarter paid more than US$250,000. Indeed, paying out is still perceived by some as the best route to recovery: grit your teeth, swallow your pride, pay out, and move on. The reality is, it’s not that straightforward.
To attackers, payment is an incentive, an encouragement to keep doing what
you have been doing by going back to the status quo. Paying a ransom once increases the chances of being struck again, and then comes the question of recovery. In the case of the Colonial Pipeline in the US, for example, the victim paid. But the decryption tool that Colonial’s IT team received was reportedly so slow that they had to resort to using their own backups anyway. Delays ensued and this caused anxieties that business operations will not be restored swiftly.
Avoiding tears
What if there were a way to avoid such panic? To recover within hours and, as an added bonus, be in a position to send the digital bandits scuttling away? This latter point is not trivial. RansomOps groups want easy money. Once word gets around that your organisation is a poor prospect for a payday, they are much less likely to target you again. All of this is possible, through tiered backups and data bunkers. Risk managers are starting to
MORE TIERS FOR YOU MEANS MORE TEARS FOR THE ATTACKERS
In the ‘Age of Ransomware’, plenty has already been said about prevention, but far less attention has been paid to what can be done in the aftermath of an attack, says Omar Akar, Regional Vice President, Middle East & Emerging Africa, Pure Storage
realise that prevention is only part of the problem. Today, a cybersecurity plan has a far greater stress on the post-incident playbook. If the worst happens, stakeholders are not content with eventual recovery. They demand immediate recovery. Air-gapped storage solutions, where backups are kept offsite and offline, are certainly good for ensuring that ransomware cannot infect the means of recovery. But that recovery may be slowed if an air-gapped vault is
not easily accessible. So, to deliver the ideal scenario of payment denial plus turnkey continuity, we need to look at an organisation’s underlying infrastructure and ask if it can deliver the accessibility and speed that delivers no-waiting recovery. Which brings us to tiered backup and data bunkers.
Multi-tier backup architectures use data snapshots and multiple geographic locations to deliver a wide range of backup-and-recovery use cases. Here are
some of the most common architectures – organisations can use these in a combination that best suits their unique business needs and budget.
Tier 1: Active failover
We can think of this tier as a kind of non-recovery recovery, in that the primary resource is replaced by its backup automatically and instantaneously, with no data loss. The latency involved is so low that most users would not even notice
any performance degradation, much less have to deal with a change in the way they work. While the failure of the primary node would still need to be addressed, IT admin teams would never have to access or activate snapshots or backups.
Tier 2a: Local snapshots
If an organisation has large volumes of business-critical or sensitive data, taking regular snapshots of the data at intervals of anywhere between 15 minutes to a matter of hours, ensures highly up-todate data is available, should things go wrong. Stored locally for three to seven days on the organisation’s primary storage array, these immutable snapshots provide near-instant recovery in the event the Tier-1 failover is compromised, or if immediate rollback is required following an administrative error or bugs in development. The read-only design of a snapshot makes it impossible for an attacker to encrypt or delete it, while leaving it entirely usable for the purposes of system recovery.
Tier 2b: Local snapshot protection
Several organisations would prefer not to use their primary storage capacity for these local snapshots, or might want to store the snapshots for longer than the three to seven days. In this case, the local snapshots can be offloaded to a secondary storage array and stored for anywhere from 14 to 30 days. This frees space on the primary system while providing extremely high-speed restores.
Tier 3: Primary data protection site (aka DR site)
Now we move from acts of digital sabotage to physical disasters such as fires, floods, storms, widespread power outages, and other events that could take an entire on-premise data centre or cloud location offline and compromise Tiers 1 and 2. This is where a disaster recovery (DR) site might make sense for an organisation. This Tier-3 site is physically and geographically separate from all other sites. Every 30 days, the backup snapshots from Tier 2 can be replicated to the disaster recovery site, for up to 360 days’ worth of snapshots. And if called into action, the data can be restored to the primary storage within a matter of hours.
Tier 4: An optional data-only bunker
For organisations that require the absolute highest level of data recovery, a Tier 4 ‘data bunker’ can be implemented. This is a long-term data retention site where tape backups would traditionally have been used, although this is no longer common practice. A Tier 4 data bunker is an additional, one-way-in data lake for mass storage but is instantly accessible should the need arise. Such sites serve as robust defenses against the modern threat landscape, waiting in the wings behind primary and secondary tiers and DR sites to offer one more layer of durability. The bunker can also host critical workloads in the event of a disaster until higher-tier architectures
have been rebuilt.
Bunkers are fast, and because they only allow inbound communication, they are highly secure. Data is accessible and usable, albeit as part of a relatively slower-performance user experience. And bunkers make long-term, mass data storage affordable by using a mixture of data reduction and the highest capacity flash storage technology. The presence of a data bunker is also good for the purposes of analytics and compliance.
A sturdier estate
Cybersecurity professionals have long pointed out that attackers are using more sophisticated methods to deploy their payloads. Ransomware now extends its reach to any backups it can find. And given that most industry professionals will admit that being hit by a ransomware attack is a matter of ‘when’ not ‘if’, having the security defenses to thwart a ransomware attack is not enough. It is critical that organisations also have the storage infrastructure in place to ensure data can be recovered without much, if any, downtime.
Multi-tier data protection — some combination of Active Failover, Local Snapshots, Disaster Recovery Site and a Data Bunker — is the only answer to keeping an organisations’ data secure in the event of a ransomware attack. Threat actors will be frustrated by the new architecture. Put another way, more tiers for you means more tears for them. www.purestorage.com
“Risk managers are starting to realise that prevention is only part of the problem. Today, a cybersecurity plan has a far greater stress on the post-incident playbook.”
5 KEY SECURITY CONSIDERATIONS FOR DEPLOYING A PRIVATE CLOUD MODEL
A critical decision that every business faces at the outset of its digital transformation is choosing the right cloud deployment model. Most businesses opt for public cloud services and handpick the required services, which range from the fundamental database layer to the topmost application layer. Given the wider application accessibility and its elastic capacity, public cloud remains the popular choice in the business landscape. However, private clouds – known for their strong security benefits, data sovereignty, and low latency – are preferred largely by businesses that are hesitant to use public clouds due to industry-specific security and regulatory requirements, like financial and healthcare institutions to name a few.
The Middle East and North Africa region has been catching up to the global shift towards private cloud, which is mainly led by countries like Saudi Arabia
and the UAE. In Europe, this shift is mostly sparked by surging energy costs, however, in the Middle East it is a slightly different scenario. In 2020, both countries were the biggest targets of some unprecedented waves of cyberattacks. As it stands, the cost of data breaches in the region is 48% higher than the global average, which is currently at $4.24 million per data breach, according to an IBM report.
The region boasts a predominant financial, energy and healthcare sector, which constitute the bigger share of data stored on the cloud – meaning a big part of the cloud holds mission-critical data. This is one of THE primary factors driving companies to migrate to a private cloud model, or better yet, a multi-cloud model to gain greater control over security and data, as hybrid work models continue to remain prevalent in the workplace.
Private cloud and hybrid are quickly
gaining popularity in the region, and it’s crucial for IT teams to understand the responsibilities that come with migrating to a private cloud. For organisations looking to set up a private cloud environment for their IT operations, there are a number of security considerations, protocols, and other measures that need to be taken into account while building, as well as operating, the model.
Deploying and maintaining a private cloud requires highly skilled resources
With a private cloud, the entire architecture comes under the control of the business that deploys it, and so does the management of the entire infrastructure. Businesses need to build a specialised team with particular skillsets because most IT departments lack the experience to effectively develop and
Deepa Kuppuswamy, Director of Security at Zoho Corporation, looks at private clouds from a security perspective and that important decision of selecting the right cloud deployment model for your organisation’s needs
support the private cloud environment, and any lax in this regard can impact security. Aside from faulty workflows and actions, security loopholes can also arise from lack of knowledge within the organisation’s internal team structure. It’s also equally important to hold reskilling and upskilling sessions periodically to enable the team to update themselves with new technical abilities and keep up with the industry dynamics.
Keeping the platform up to date with robust lifecycle management
In private cloud, organisations have the tall order of configuring and operationally managing the complete technical stack, including upgrading and applying security patches with rigorous attention. IT leaders should encourage their core cloud engineering teams to implement automated deployment processes and CI/CD best practices to make lifecycle management prompt and easier.
Achieving compliance with regulatory requirements
In a way, private cloud provides a better way than public cloud for organisations to enforce regulatory compliance and
security controls. Data retention and deletion policies can be defined and implemented entirely according to the business’s regulatory and compliance requirements. Such customisations are not feasible in the public cloud and companies are limited by the CSP’s implementation, and requirements need to be enforced via contractual obligations. On the flip side, this means that, in a private cloud setup, the organisation will be fully responsible for establishing necessary checks that match regulatory standards—starting from physical security, network segmentation, and access controls to defining appropriate data retention policies.
Staying proactive with a security-first mindset
There is a huge misconception about the strength of ‘private’ security. It is always tempting for even the most securityconscious enterprises to take shortcuts on security when they physically possess their entire IT infrastructure in their private data centres. The complacency that they are within their boundary protected by network perimeter controls will not hold good in the current environment of cyber threats. Aside from traditional
external attacks, organisations should also consider the insider threat scenarios and the possibilities of privilege misuse by authenticated and authorised users with elevated access to the private cloud environment. It is imperative to have ‘zero trust’ policies implemented and enforced for the private cloud workloads.
Handling traffic spikes with proper capacity planning
Private clouds can spread the workload over multiple servers but are limited by the amount of server space a company owns or operates. A disaster or a sudden peak load could put key business solutions offline and pose a risk to business continuity. Proper capacity planning or moving to a hybrid model to handle peak load should be considered during the design.
In deploying a private cloud model, companies can reap the numerous benefits it has to offer. To do that effectively, drawing a clear roadmap and setting clear objectives – while keeping in mind critical security considerations –can make the shift successful and more effective.
www.zoho.com
Security. Style. Seamless Integrations
Network Logic
We know how important the look of a finished project is to architects and specifiers, so we don’t compromise that with poorly considered bolt-ons. Our technical and design teams incorporate third-party integrations seamlessly into the pedestal of the turnstile itself, treating them like an integral part of a complete system. It’s why Fastlane turnstiles secure some of the world’s most iconic buildings.
Escaping cryptomining attacks
Like company stocks, cryptocurrency too is a volatile market. It has its boom and bust phase from time to time. But, what doesn’t have a bust phase is cyberattacks. Although the value of cryptocurrencies nosedived significantly recently, criminal activity targeting cryptocurrency industry does not seem to be slowing down. In the first six months of 2022, businesses in the GCC experienced 802,029 cryptomining detections as reported by Kaspersky telemetry.
Similarly, in Q3 2022, Kaspersky researchers saw a sharp increase in crypto miner variants globally – an overall growth of over 230% compared to the same period last year. The number is three times more than in the third quarter of 2021 and now exceeds $150,000.
What is cryptomining and why do cybercriminals need your personal or company devices?
Cryptomining is the unauthorised use of someone else’s computer to mine cryptocurrency. Cybercriminals install malicious miner programs on victims’ computers to use its processing power for mining, without incurring any of the equipment or electricity costs.
Cryptomining does not require much specialist technical expertise. In fact, all the attacker needs to know is how to create a miner using open-source code, or where to buy one. If the cryptomining malware is installed successfully on the victim’s computer, it provides its operator with steady earnings. Cybercriminals carefully analyse the workload of infected servers and take only part of the resources, to remain unnoticed.
What’s the impact of cryptomining?
Businesses and people alike can fall victim to cryptomining attacks. It is
common for cryptominers to infiltrate personal computers through malicious files masquerading as pirated content –films, music, games and software. For businesses, the threats are far worse. Unwanted cryptomining can lead to:
n Increased load on company servers, which, just like a DDOS attack, can take services offline.
n Unavailability or unstable operation of services means losses.
n Increased costs of maintaining cloud infrastructure, especially for companies that supply customers with services on the cloud. Cybercriminals can create multiple accounts on such services all at once, and use these to run miners without letting them consume more resources than the service provides under a free account.
What can companies do to stay safe?
The very fact that some kind of illegal activity is being carried out on your company’s computers means your IT infrastructure has vulnerabilities. Businesses can follow the following recommendations:
n Use reliable security solutions, preferably with specially designed anti-cryptomining technologies. Also install protection software on embedded devices (public displays, terminals, etc.) and enable Default Deny mode where possible.
Restrict access to infrastructure management — the fewer employees have high access privileges, the less likely access will be compromised. Monitor traffic and immediately investigate any abnormal increase in processor usage needs.
Pay increased attention to the timely remediation of vulnerabilities in software that handles the infrastructure or platform, as attackers can exploit them to hack into and install miners.
n Have a well-tuned alert system for atypical activity, and engage experts who can respond quickly.
For the general public, we recommend people to:
n Check the website’s authenticity. Do not visit websites allowing you to watch a movie until you are sure that they are legitimate and start with ‘https’. Confirm that the website is genuine, read website reviews and double-check the format of the URL.
n Security solutions will protect your computer and other devices from unauthorised usage of your PC computing power to generate cryptocurrency and prevent deterioration of PC performance.
n Always keep software updated on all the devices you use to prevent attackers from infiltrating your network by exploiting vulnerabilities.
The silver lining is that cryptomining can be detected if you know what and which red flags to look out for. That is why it is extremely important to raise awareness about the first signs and stop cryptominers in their tracks from profiting off your resources.
www.kaspersky.com
The experts at Kaspersky have compiled a cheat sheet for escaping cryptomining attacks
The
One and Only Integrated Security Exhibition in Asia
PRE-REGISTRATION
Why SECON 2023 ?
LATEST SECURITY TRENDS AND EXTENSIVE NETWORKING OPPORTUNITIES ALL IN ONE!
SECON 2023 is an unmatched opportunity to network and do business with the entire security buying chain, keep up-to-date with legislation, discover solutions and see real products put to the test across access control, video surveillance, perimeter protection and more. Those taking part will be granted the chance to meet over 400+ exhibitors and 25,000+ security professionals.
● Asia’s Only Integrated Security Exhibition representing the latest Security Trends
● Global Networking Opportunities with distinguished Buyers via the Hosted Buyer Programme
● Create more business opportunities through business matchmaking service
● A varied Conference & Seminar Programme focusing on cutting-edge Solutions and Security Guidelines
SECON 2023 KEY EXHIBITORS
Meet the speakers
Our highly interactive and muchanticipated conference is bringing together some of the greatest minds from the security industry in Saudi Arabia on the 9 May 2023, for the chance to discuss, debate and consider the evolution of the security sector.
Our carefully chosen speakers have all been selected for the value they can bring to this special event and the breadth of their knowledge. All will be sharing best practice examples to help educate our audience and the overall theme for the day will be discussing the innovations that can address the challenges facing the sector.
With a focus on the rapid development of technologies, smart cities and giga projects in the region, each of our speakers is expertly positioned to deliver insights opinions, guidance and solutions.
We are delighted to share with you the experts who will be joining us:
Craig Ross
Senior Safety & Security Manager –Diriyah Gate Development Authority
Craig Ross is Senior Safety and Security Manager at Diriyah Gate Development Authority in Riyadh, Saudi Arabia. He holds a masters degree in terrorism and politics and has more than 25 years’ experience in the built environment, critical infrastructure and security consultancy. He has also diversified experience in security projects and risk assessment.
Dr Mohammad Alketbi Founder – Forceis Security and Advisory Board Member – Intersec Dubai
Dr Mohammad Alketbi is the founder of one of the region’s leading professional security system integrators and provider of business security systems. He has a wealth of experience in futuristic and disruptive technologies and was elected by the security industry in 2019 to become the secretary general for SIRA’s Security Professionals Association.
With the Security Middle East Conference just months away we’ve been casting our net wide to secure the most influential and inspiring speakers to address our audience
Tech security expert
Dr Mohammed Aladalah has over 20 years’ experience in the public sector and has been involved in designing, implementing and managing security/ surveillance systems kingdom-wide.
Assistant Professor in Cybersecurity & Networks
Dr Alfouzan is a well-established Chief Information Security Officer with 10+ years working in information security in Saudi Arabia. He is highly accomplished and knowledgeable of best practices and innovation in cybersecurity and digital forensics.
Saudi Chapter Lead – Cloud Security Alliance
Ibrahim is a highly passionate cloud and cybersecurity professional and an experienced speaker at cloud conferences in the region. He has certificates in cloud engineering, architecture, and security such as AWS-SAA, COA, CCSK, GCLD, and forensics GCFE, JNCIP-SEC in Cybersecurity.
First sponsor announced
We’re delighted to announce that Genetec will be one of the sponsors for this event.
Tawfeeq Alsadoon
Executive Director, Red Sea Global
Tawfeeq Alsadoon is an experienced director with experience working within the field of security, safety and government relations. He is Executive Director at Red Sea Global, one of the world’s most visionary developers and a cornerstone of Saudi Arabia’s Vision 2030 ambition. He holds a diploma in security studies, focused on public security, from King Fahd Security College and has previously worked for Saudi Chemical Company and Economic Cities and Special Zones Authority.
Khalid Saad Al Medbel
General Director Information Security –Ministry of Health
Mr Al Medbel is an expert in the latest advances in cybersecurity & ICT infrastructure and technology trends. He is a thought leader with a deep knowledge of best-practices in threats management and governance and emerging areas of critical importance like business intelligence, IoT security and vulnerability assessments. He holds 20+ years of experience in security systems, including firewalls, intrusion detection systems, sandboxing, anti-virus, and EDR software.
As well as putting its support behind this exciting event, the leader in unified physical security software will also be contributing to the discussions taking place on the day. We will be joined by one of Genetec’s business leaders, who will join the panel for the smart cities discussion to share their thoughts, ideas, opinions and best practice examples.
The conference panel discussions will be targeting three key topics:
n Securing Vision 2030: Smart city development and navigating the threat landscape
n Cybersecurity: Resiliency in the age of digitisation
n Talent & Skills: Addressing the talent gap in Saudi Arabi’s security sector
To find out more about the conference visit securitymiddleeastconference.com
Dr Faisal Abdulaziz Alfouzan Ibrahim Al-Asaker Dr Mohammed AladalahINTERSEC 2023
All eyes were on Dubai last month, as the 24th edition of the annual Intersec exhibition opened its doors to the security industry
With the aim of advancing the security landscape, more than 800 exhibitors from 55 countries packed out the halls of the Dubai World Trade Centre ready to meet the thousands of visitors who were keen to hear the latest innovations, listen to world-leading speakers and network with their peers.
The show was officially opened by HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, Chairman of the Dubai Council for Border Crossing Points Security, who also took the opportunity to tour the 10 halls of exhibition space. At the Dubai Police stand he was briefed on the force’s latest public safety solutions. He also met with executives from Saudi Arabia’s National Security Services Company (SAFE) to hear about its latest initiatives to elevate the standards of the kingdom’s security sector.
Alex Nicholl, Portfolio Director at Messe Frankfurt Middle East, said: “The high level of interest in Intersec 2023 in the build-up to the event has carried forward into an exciting opening day with great energy, dialogue, deal-making and networking fuelled by positive industry growth forecasts and increased demand for the latest solutions for safety of people, places and a rapidly evolving cyberspace.”
Three days of innovation, learning and history making
The opening day of the show included a conference session with Helmut Spahn, Director of Safety, Security and Access at FIFA. He shared with the audience some of the safety learnings that were made at the recent Qatar World Cup 2022. The conference programme also included popular sessions with Sultan Al-Owais, Digital Lead, Prime Minister’s Office, who led a talk on the present and future of hybrid cyber warfare. Dr Bushra Al Blooshi, Head of Research & Innovation at
Dubai Electronic Security Centre also held a keynote session titled Pioneering Digital Economy: Integrated and innovative smart secured services ecosystem.
Day Two of Intersec featured the historic signing of a Memorandum of Understanding between the UAE Ministry of Interior and Chinese state-owned video surveillance company Hikvision. Under the terms of the MoU, which was signed by Brigadier Ahmed Humeid Al Suwaidi from the Ministry of Interior, and Xi Ming Xu, Senior Vice President at Hikvision, the two parties will work together to develop solutions that will benefit and maintain the safety of residents and visitors to the Emirates.
The third and final day of the show
featured one of the most popular seminars: a session on strategy and leadership, led by Rob Cooling, Executive Director of HSEQ at NEOM.
He detailed for the audience the challenges faced by leaders of a major programme, such as scale, complexity, schedule, unpredicted outcomes and internal and external stakeholders. Then looked at how to best overcome them based on his own experiences. He also narrowed down strategy to three main focuses: envisioning a better future, a leader’s behaviour and taking accountability.
Addressing the audience he said: “I feel proud that we certainly made a legacy when it came to safety and worker welfare. And that didn’t happen by accident; it happened
by defining what success looks like.
“That is something we can all do in our own organisations. Ask the question: What does success look like for health and safety? When you are developing your own health and safety strategy in your organisations, you should be asking the question: Where is the business going, and what are our vision and values. Use these answers to articulate and integrate health and safety into that.”
Stand-out features
As well as a packed conference programme there was also a host of features at the show to engage the audience and showcase the very best of industry.
The Loss Prevention Certification Board hosted the Attack Zone – where exhibitors had the chance to test their products in live-action demos.
For those looking to find the latest industrial safety gear, The Safety Walk, sponsored by EnSafe Evacuation Chair, Jutec and Teijin, was a catwalk doing just that. This was a new feature to this year’s show and one that was well received. It saw the likes of MSA Safety, KIVANC Group,
Centurion, Drager, Sensor Zone and others parade their latest safety equipment and protective clothing on the catwalk.
The Tech Stage was another packed out feature of this year’s event with people keen to see the latest innovations be unveiled. This year saw a host of new technologically advanced solutions on show including virtual reality solutions, anti-drone technology and new safety materials.
The Cybersecurity Stage featured a number of industry leaders all trying to tackle the same challenges from within their own fields of expertise. One of the panel discussion looked at the challenges faced when converging worlds collide – in this particular case information technology (IT) and operational technology (OT). Shahab Siddiqui from Petrofac, Andres Desa from Mubadala Investment Company, Biju Hameed from Dubai Airports, and Hamad Saeed Husain Abdulrahman from King Hamad University Hospital were all on hand to share their views.
Expert insights
For visitors to Intersec one of the most valuable benefits of attending is the
chance to hear so many world-leading experts share their views, opinions, best practice examples and own experiences. At the SIRA forum, Asma Abdelhamid, Customer Happiness Manager at SIRA, presented a session outlining the journey to a Smart-Safe city.
She explained: “A ‘Smart City’ is built around the use of sensors, technology, and communications infrastructure that can enhance the community. It is less about how many sensors or apps a city has and more about how they are used; are they connected?”
According to Abdelhamid levels of smartness can be measured using four criteria: infrastructure based around technology; environmental initiatives; effective and highly functional public transportation; and people’s ability to live and work using the city’s resources.
Get set for 2024
“This year’s show has demonstrated once again the importance of Intersec to both the regional fire safety, security, and fire prevention industries, but also international markets,” said Messe Frankfurt’s Nicholl. “With more than 800 exhibitors from 55 countries, including 10 standalone country pavilions, Intersec 2023 was truly a global exhibition. After this year’s success, the focus now turns to 2024 and making sure we continue to offer value to all attendees, exhibitors, and stakeholders.”
Next year’s edition of Intersec is set to return from January 16-18, 2024, at Dubai World Trade Centre with dedicated product showcases for commercial and perimeter security, homeland security, fire and rescue, safety and health and cybersecurity, special features, and a powerful conference and knowledgesharing programme.
www.intersec.ae.messefrankfurt.com
Intersec: Expo Live
Hear from key organisations who filmed with Security Middle East magazine live from Intersec
For the first time ever in the show’s history, Security Middle East magazine took along a camera crew to film short clips with some of the event’s exhibitors. Short interviews and product demonstrations were captured on film so we could share them with our audience – both those attending the show and those who were unable to get to Dubai. It gave organisations a chance to widen their net with the content being streamed across all of our channels.
These live slots were filmed on the show floor, giving viewers a taste for the show as well as the opportunity for exhibitors to share their knowledge, showcase their company’s latest innovations and offer soundbites on the future of the security sector.
From AMAG Technology we filmed product demos with company representatives including Chris Parry, Ziyad Tello, Chris Walker and Philip Verner. We also had the chance to catch up with Mark Williams, Director of Sales, AMAG Technology to discuss the key trends and challenges facing the industry and the solutions being rolled out by the company to tackle them. He picked out biometric access control and friction-less credentialling as two trends to look out for.
The company were on hand at Intersec to showcase its machine-learning intelligence for access control, a solution that learns what abnormal behaviour looks like for an organisation to help manage its access control requirements. Visitors to AMAG’s stand were also able to learn more about its biometric access control solution, which uses facial recognition.
From Motorola Solutions we filmed with Corporate Vice President Sales Video Security & Access Control, Pedro Vasco Simoes. He shared his thoughts on the biggest challenges facing the security industry, as well as outlining the key trends he believes will shape the security eco-system. He also discussed the strong
relationship that has been forged between Motorola Solutions and Ingram Micro.
The company used their attendance at Intersec to engage with their partners and end users so they could learn more about the challenges being faced and the synergy with their products to tackle these issues.
During Intersec Dubai 2023, Security Middle East Magazine also filmed with Mohammed Owais, Middle East Sales Director for Western Digital. Our team asked about the benefits of attending such shows as Intersec for companies, what trends he forecast to be on the
horizon and the challenges security companies can expect to face in 2023. We also got to hear about the exciting innovations that are being added to Western Digital’s repertoire of products. This includes a ground-breaking 22-byte terabyte hard drive. In addition, we were given a live demonstration of Western Digital’s resource manager which can be integrated with other systems for data storage and security.
All Expo Live videos are now available on our website: securitymiddleeastmag.com/expo-live
SMARt Awards
For the second year running Intersec 2023 set the stage for the SecurMiddleEast Awards for Excellence in Technology (SMARt) ceremony
Conceived to recognise those outstanding firms who are making a real difference in the security sector, the awards are run by Intelligent Security Systems (ISS) and supported by Security Middle East magazine. The winners of the awards were announced during the Intersec exhibition and were a celebration of the hard work and value that NFS Technologies, Al Fahad Security Systems and Gulf Networks Security Solutions are bringing to the security industry.
“The 2nd annual SMARt awards, which were held on the sidelines of Intersec 2023, is a great occasion to celebrate and recognise the outstanding firms in the region for the innovative ways in which they work and their dedication to always looking to advance security best practices,” said Sanjay Phatak, Managing Director of ISS for the Middle East.
“The selected firms have differentiated themselves by constantly being on the leading edge with the latest designs and technologies, and we have seen them delivering turnkey projects in the security industry,” added Phatak.
This year’s winners are:
innovation to everything they do and to stand out and be unique within the crowd.
The company has differentiated itself by incorporating industry best practices into its solutions – something that becomes particularly important in a rapidly growing and dynamic technology market such as the UAE.
The company’s projects range from surveillance and access control systems, GPS to consulting, working in the UAE and across the region.
In particular, NFS Technologies has achieved an impressive record in the oil and gas sector in the Northern emirates, with the deployment of the most advanced innovative technologies in order to meet the needs of this sector.
With leading-edge technologies, this company is truly a leader in delivering turnkey projects within the security industry.
intelligence for the government, military, and energy and oil sectors across the UAE.
Particularly noteworthy is its design of an advanced intelligent monitoring system used across public transportation systems in Abu Dhabi. It demonstrated the expertise of the company in leading projects in transportation and critical infrastructure.
Al Fahad Security Systems
Abu Dhabi-based system integrator Al Fahad Security Systems is a technology solutions and services company with a dedicated focus on providing security solutions, systems integration and project fulfilment and execution.
The company is recognised for its outstanding innovation and best practices for the design and execution of major homeland security projects, defence and
Gulf Networks Security Solutions
Gulf Networks Security Solutions is a leading systems integrator in Qatar that delivers turnkey projects to some of the most prestigious organisations in the country, including governments, police, military, industrial and the private sector.
It is regularly awarded large projects from both the private and government sector, a real testament to its expertise.
Last year it was responsible for working on the FIFA World Cup Qatar 2022 – where it delivered the most innovative security solutions to protect the facilities.
The FIFA committee entrusted them with the security and the safety of the players and the fans, and Gulf Networks Security Solutions delivered with the deployment of state-of-the-art solutions to protect this event.
issivs.com
NFS Technologies A total security solutions services provider with four offices across the UAE, NFS Technologies constantly strives to bring Above (left to right): Hany Salama (ISS), Mohamed Kasim, Shakir Munir, Aluisio Figueiredo (ISS) Above (left to right): Mohammed Jaber (ISS), Altaf Ahmed Autshi, Aluisio Figueiredo (ISS)World Police Summit
Taking place the 7-9 March at Dubai World Trade Centre, the show is the ideal platform for security personnel to find out more about the challenges and futuristic trends around crime prevention, forensic science, anti-narcotics, police innovations and drones.
This unique global law enforcement marketplace is set to be packed out with cutting-edge policing and security technologies, services and solutions. Visitors to the show will gain the opportunity to explore the latest thinking around policing, explore innovative products and solutions and experience the technological advances making waves in the sector.
Six reasons to attend
For anyone working in the sector this is a must-attend event. You can:
1 Forge new alliances
Visitors to the World Police Summit will be able to network with key industry stakeholders and decision makers to find out more about the latest investment opportunities.
2 Meet key industry figures
With over 250 exhibiting companies you’ll have the opportunity to create partnerships, do business and expand your own policing and security network.
3 Explore innovations and new technologies
Attend the show and discover the stateof-the-art technologies, tools and services you need to get your police force ahead and maintain that position.
4 Share knowledge and skills
The show features more than 250 speakers across six different conference streams. You’ll be able to acquire insights into the future of policing, law enforcement and the security industry.
5 Gain access to influential individuals
Attendees will have direct access to meet
and interact with government officials, ministers, business leaders, investors and financiers to help build profitable partnerships.
6 Help steer future industry
Join in with discussions tackling the challenges the industry faces, explore the trends that will influence the future of policing and discuss the evolving nature of crimes and next-generation strategies to mitigate them.
Exhibitors
Over the course of the three days there will be a huge number of leading international and regional manufacturers and service providers across multiple product categories exhibiting. This includes: AI and video analytics; command and control systems; C41 systems; critical infrastructure
protection; forensics, optics, vehicles and motorcycles; uniforms and much more.
Knowledge sharing
The conference channel at The World Police Summit will be promoting better policing through knowledge sharing. It will open up conversations for police and security experts and provide an inspiring opportunity to promote better policing and to explore, discover and share the latest developments.
The six distinct conferences will cover the strategic and technical disciplines with each conference featuring keynote and breakout sessions. Nine vital themes for 21st century policing will be covered from cybercrime to forensic sciences and more.
To register to attend the World Police Summit visit worldpolicesummit.com
The World Police Summit is taking place next month and giving visitors the change to engage with global trends impacting policing and law enforcement
Security: Who’s responsible?
Even though today we can say that the United Arab Emirates and several European and Asian countries have a very wellestablished security system, situations can still arise where public panic can occur and culminate in a tragic event, such as the recent Halloween celebrations in Seoul, where 150 people died.
Ms Veronika Fáberová, a member of SPA with 30 years of experience in the eld of commercial security, has in recent years focused on the security of public spaces and is dedicated to the security training of non-security sta in the service sector, whether they are employees of health care facilities, hotel receptionists, teachers, employees of public authorities, banks, public transport drivers and employees of amusement parks or multi-purpose arenas.
Her surveys, which she conducts every year at several selected mass cultural and sporting events, show that people are convinced that their safety is the organiser’s responsibility, not theirs.
“Experience has shown me that the number of negative incidents has rapidly decreased where sta are additionally aware of the various safety policies,” she explained.
“Participants will get answers to questions on how to recognise a potentially risky situation and how to behave in it. Specialised training like this needs to be tailored to the client’s environment and to the situations that may arise there. That is why the training is performed directly at the client’s site, so that sta experience the correct procedures during the incidents that may occur in their environment.
“Everywhere there are various manifestations of verbal aggression, revenge, outbursts of anger, even out of
desperation, actions of people under the influence of narcotic and psychotropic substances, but also people who have some mental problems or, on the contrary, stupid pranksters who are able to cause a crowd panic quite easily. With continued tourism and multiculturalism growth, similar problems are occurring everywhere,” she added.
The modern training system also includes the work of professional actors and lm stuntmen who participate in the training by simulating various risky situations according to tailormade scenarios prepared in advance. It is important to properly play out the escalation of conflict so that employees learn to recognise the impending danger and take the necessary steps in time. To do this, we use the internationally recognised Run – Hide – Inform (Fight) procedure.
Clients need to be o ered a complete preventative solution using proven security trends that have already proven their usefulness in the world. One of the principles we work with is the CPTED method – Crime Prevention through Environment and Design. This concept
suggests that the design of buildings, landscaping and outdoor environments can either encourage or discourage crime or prevent the possibility of panic in which people get trampled.
In order for prevention to really work it is advisable to create a whole complex of measures, from a well-set organisational security policy, remembering the security of the environment (CPTED), creating various leaflets and brochures for employees, as well as for their clients and visitors, and above all training of all involved employees in the form of practical exercises and simulations. Such a complex policy then brings success and saves health and lives.
The more secure the country, the more people rely on someone else to take care of their own security for them, asserts SPA member Veronika Fáberová
5 cybersecurity trends for the Middle East for 2023
Twenty twenty two was a significantly turbulent year. The geopolitical backdrop was explosive, with a European war happening for the first time in many years. International relationships broke down and global trade was disrupted. With the west tentative about putting boots on the ground in Ukraine, many governments took the democratic route by implementing sanctions and trade embargos on industries like oil and gas, finance, manufacturing and weaponry. This arguably more surreptitious technique forced nation states and nation-state-backed actors to be more conceited in how they can influence the war itself, causing a broad range of disruptive cyberattacks.
Cyber criminals also doubled-down their efforts, with 2022 being a record year for ransomware and other forms of malware-related attacks. The threat landscape diversified significantly, with drones, 5G and artificial intelligence providing new delivery mechanisms for attacks globally. This technological advancement will likely continue to cause havoc globally for the next few years.
In terms of cyberattacks, the Middle East is in an interesting and potentially vulnerable position. Oil-rich and digitising rapidly across a variety of industries, this region will be one of the key targets for nation state attackers, criminals and cyber activists alike. Government policies in Saudi Arabia like Ambition 2030 and in Qatar post-World Cup, will usher in a new era of early-stage technological
innovation across a range of industries such as retail, hospitality, manufacturing and beyond. IT, IoT and OT infrastructure and environments will also continue to blend architecturally, making 2023 a risky year for organisations in the region. One thing that is guaranteed is that the region will experience more cyberattacks. Therefore, management of this key risk is crucial to hitting the ambitious digital targets set by the regions themselves.
Here are five cyber security trends that are set to accelerate for the Middle East in 2023 and beyond:
1 Senior management and boards in the Middle East will pay more attention to cyber security, increasing budgets and expectations of the workforce
Throughout 2022 cybersecurity was the number one risk of most risk registers across the region and this has focused attention on effective cyber risk management significantly. Moreover, regulations have ramped up throughout the UAE (Cyber Security Strategy Framework), Bahrain (National Cybersecurity strategy), Qatar (Cyber Security Framework) and Saudi Arabia (Essential Cyber Security Controls), enforcing penalties similar to the GDPR in Europe for non-compliance.
Typical objectives of these regulations are to safeguard critical national infrastructure, identify and manage cyber risks according to leading industry frameworks, foster collaboration between
organisations and industry bodies, and to strengthen critical assets across non-CNI organisations. Some large organisations in the region have even doubled their cybersecurity budget for 2023 to invest in effective cyber risk management frameworks, tooling and best practice methodologies, as well as technologies to identify, protect, detect and respond quicker to impending cyber threats.
2 The cybersecurity talent gap will become a real issue for HR
In the US and throughout Europe, the cybersecurity skills shortage has been a real issue for a few years now. With the covid pandemic changing traditional ways of working, securing a strong security workforce has become even more of a challenge. Couple this with the rapid digitisation and development in the Middle Eastern region in a range of industries, makes finding the right candidates a serious challenge.
To build a sustainable security workforce, organisations should adapt to market demands by seeking candidates with diverse competencies and skill sets and provide competitive benefits and structured career development. For some organisations in the Middle East these changes are already underway but for the majority, the approach is still new and untried. Workforce planning, the adoption of competency frameworks, along with a well-structured workforce management programme, also known as talent
January is always a good time to look forwards to the year ahead. Dan Norman, Regional Director, EMEA for the the ISF, predicts what we can expect to see for cybersecurity in 2023
management, are fundamental to the future success of attraction and retention strategies.
3 ‘Resilience’ will become a fundamental business driver for cybersecurity
Historically, security strategies have covered a broad spectrum of areas, but investment has predominantly focused intensely on building controls to protect the business from actually experiencing an attack, e.g. security incident event management systems, firewalls, phishing simulations, etc. However, cyberattacks have continued to grow in sophistication and scale, prompting organisations to take a different approach – one that focuses on key risk areas and focuses attention in a targeted manner.
Many organisations are now accepting that cyberattacks simply will happen, and thus are focusing significant effort on incident response, crisis management, business continuity and disaster recovery, with the aim of reducing downtime of core systems, managing the regulatory and reputational impact as quickly as possible
and aiming to ‘bounce-back’ as best they can. For example, running a range of cyber exercises to test and measure the ability of different individuals and groups within an enterprise will become even more popular as the ‘respond’ and ‘recover’ element of cybersecurity become more important.
4 The cyber insurance bubble will burst
Throughout the last 3-5 years, cyber insurance became increasingly popular and in some cases demanded by organisations to do business. Insurance policy development has been a significant challenge, as defining and scoping policy coverage is incredibly complex and contentious. Over the last few weeks many insurers have stipulated that they will not cover ‘systemic cyber risk, or the type of major, catastrophic disruption caused by state-backed cyber warfare.’
Whilst ‘acts of war’ have been excluded from cyber insurance coverage for a while now, this highlights that the cyber insurance wave has come crashing down. Many organisations will have to find alternatives to cyber insurance to manage the risk posed
by cyberattacks. For example, organisations should focus on: effectively monitoring and identifying threats; understand weak points and take concerted action; proactively mature and measure the cybersecurity programme; measure and report cyber risk more accurately and in alignment to industry best practices.
5 OT and IT security requirements will soon merge
Industrial control systems (ICS) and IT environments have been on a collision course since IT devices made their way into corporate estates. Their convergences has created a number of efficiencies across manufacturing, oil and gas, and many other industries, but has also ushered in a range of new threats, which are set to exacerbate and accelerate across the Middle East. This convergence will lead to a broader attack surface that does not necessarily benefit from effective network segmentation or protective controls – at least on the ICS side.
The fundamental task for information security teams is to protect ICS by reducing the risk of a security incident (whether malicious, accidental or negligent) whilst upholding safety, reliability and performance. Yet, introducing IT or information security controls into an environment for which they were not designed can be counterproductive if the controls are not implemented effectively. As more organisations move towards this convergence, and if attacks happen, production will be significantly interrupted, which will have considerable cost implications or, in the worst case, could contravene safety requirements with potentially catastrophic consequences, including loss of life (although for the most part ICS environments are explicitly designed to fail safe).
About the author
Dan Norman is the Regional Director, EMEA for the ISF. The ISF is a leading authority on cyber, information security and risk management. Its members comprise some of the world’s leading organisations featured on the Fortune 500 and Forbes 2000 lists. For more information visit www.securityforum.org
People drive results
Peter O’Connell, Chair of the Security Institute’s Mid-East Members Group, looks at how the ethos of ‘people drive results’ can be translated to address security challenges
As Chair of the Security Institute Mid-East Members Group (MEMG) I am honoured to hold such a position and proud to note that our committee is a team of individuals with a knowledge base that I can only describe as first class. The team comprise individuals able to engage at a strategic level across many facets of security management encompassing: physical, technical, cyber, security by design and urban planning, emergency and crisis management, business continuity and resilience.
Most of the MEMG team are Registered Chartered Security Professionals (CSyP) which represents the gold standard in security practice. Leading such a team of top-flight professionals is not only a privilege personally but also inspiring for me and I believe for every member of the group. Professional camaraderie, passion and respect, striving for the highest standards and sharing and learning has established us as a much respected and influential team across the security industry and regulatory authorities.
Security knowledge, communication, leadership, and professional development are amongst the core competencies required to gain the prestigious CSyP status. For those operating at a strategic level it is the foremost professional accreditation to hold, comparable to that of other chartered professionals such as engineers, architects and accountants. Genuine chartered security professionals are listed on the register’s website charteredsecurityprofessional.org
I am also proud to be a member of the Global Security team of a worldleading engineering and design company, supporting the Middle East and SubSaharan Africa element of the business.
The ethos of the business is, ‘People Drive Results’. So, what does this mean, and how do we convert this into the day-to-day security challenges?
Global adversaries
Our adversaries are more calculative and cunning than ever before, unassuming, relentless and non-partisan in pursuit of their malicious objectives.
We need to be alert to the constant danger that someone, somewhere is planning a new process, system or technique designed to:
n Steal your money
n Breach your firewall
n Steal your identity
n Breach your asset
n Steal your assets
n Discriminate you and your business
n Damage your personal or corporate reputation
n Cause serious harm to you or your business.
The technology train
One thing is certain to us all, technology is advancing at an alarming rate and reminds me of a moving train, with some people and organisations already on the train, some in front of the train prepared and awaiting its arrival, with others behind the train and unsure how to embark.
Tradeshows and events such as the recent Intersec 2023 provide everyone the ability to view the technology train, understand the advanced hardware/ software systems and get an idea of how such systems can support a particular business or asset.
Of course, as we discussed last year, the criticality of the asset or ‘critical assets it is deemed important to protect’, will all be identified within a risk assessment.
The detailed risk assessment enables us to select appropriate measures/ technologies commensurate and proportionate to the threats and risks against the asset we wish to protect.
One of the best examples of this are the measures implemented at a typical ATM machine across the region. The machine may be situated inside a shopping mall or hotel usually clearly advertised and easily accessible. The ATM will see people visiting and potentially exposing personal information and data. Whilst the mall or hotel will have generic security measures in place such as guards, the particular ‘critical asset deemed important to protect’, will have specific measures in place such as CCTV, FR etc.
What is the most critical asset we own?
No matter how we grade our assets or class the criticality of the asset, it is important to remember that the most important asset of all is our ‘people’.
People drive results, whether from an adversarial aspect, in a design capacity, developing risk assessments, security management plans, emergency and crisis management planning or generally building the resilience of any business or asset. The core knowledge base derives from people.
With technology becoming increasingly relied upon we cannot afford to become complacent and forgot the importance of those who protect us: our people. We
need to continue to ask the basics, for example: Are our guards 100% confident in conducting a detailed and thorough search of a person? Do they know how to search personal baggage and belongings?
Do they know the approach and technique for searching a car? Do they know how to conduct a 3-sweep search of a room, building, complex, zoning and tagging as we advance throughout an asset search? Should they know? Should you know? Do you know?
Do we train our people to observe for behavioural traits and threat indicators?
Should security leaders be aware of these factors and are you?
Investment in security personnel training is essential to minimise risks to
a business, technical security measures are important, but their value diminished without the people element. Ultimately security is everyone’s responsibility, from our guard force, across our middle management leadership team through to the board room, our people are our key drivers and pivotal in delivering the security outcomes.
People drive results
We must all embrace technology as a layer and key component for delivery on objectives, but one must never forget that people drive results.
If a determined adversary wishes to attack an asset, they will study the asset for weeks, months, maybe even years.
They will monitor all activity, processes, procedures and daily actions undertaken at the asset, identifying weaknesses and via meticulous planning will decide upon ‘when, where and how’ to strike.
We can guarantee the timing and delivery of a complex attack will not be expected nor will it favour the asset being attacked.
When a complex attack has been planned, an initial phase of the assault may well target the power and lighting, rendering technology redundant as the next phase of the attack is implemented. A complex attack may have many phases, including cyber strikes. Insiders are often at play. Insider threats and risk mitigation methods are areas prominent in the minds of security leaders and involve issues around staff vetting procedures, threats of and posed by intimidated or corrupt staff and industrial spies and the modus operandi.
Our people are critical to our success, conducting awareness training for all employees, then ensuring security personnel (and managers with designated security responsibilities) conduct drills, exercises, day/night will not only build the capacity of the workforce, but more importantly ensure the asset is resilient and better prepared for the unexpected.
FEBRUARY
APRIL
MAY
16-18 May
IFSEC International London, UK ifsecglobal.com
22-23 February
IDC Middle East CIO Summit Atlantis, The Palm, Dubai idc.com
MARCH
25-27 April
The Security Event NEC Birmingham, UK thesecurityevent.co.uk
26-28 April
Secutech 4F, Taipei Nangang Exhibition Center, Hall 1, Taiwan
secutech.tw. messefrankfurt.com
7-9 March
World Police Summit Dubai World Trade Centre, UAE worldpolicesummit.com
8-9 March
Data 2030 Summit MEA Dubai, UAE mea.data2030summit.com
7-9 May
SEDEC Congresium, Ankara, Turkey sedecturkey.com/en
9 May Security Middle East Conference Saudi Arabia securitymiddleeast conference.com
9-11 May
IDEF’23
JUNE
6-8 June
Securex South Africa Gallagher Convention Centre, Johannesburg, South Africa
securex.co.za
OCTOBER
Securex West Africa Landmark Centre, Lagos, Nigeria securexwestafrica.com
TÜYAP Fair Convention and Congress Center, Istanbul, Turkey idef.com.tr
9-12 May
10-12 May
3-5 October
Future Urbanism Smart City Summit & Expo
IDEF’23
TÜYAP Fair Convention and Congress Center, Istanbul, Turkey idef.com.tr
Dubai World Trade Centre, Dubai, UAE futureurbanism.ae
10-12 May
Future Urbanism Smart City Summit & Expo
Dubai World Trade Centre, Dubai, UAE futureurbanism.ae
Intersec Saudi Arabia Riyadh International Convention and Exhibition Center (RICEC), Riyadh, Saudi Arabia intersec-ksa.ae. messefrankfurt.com
Please check the event websites for the most upto-date details as dates can change all the time.
Traka Intelligent Solutions for Banking
In the banking sector, operational risks lurk everywhere–in people, in processes and the systems used. Operational risks can be catastrophic, not just in the monetary sense, but in terms of the impact on the bank’s overall business and reputation. Securing a financial institution and its valuable assets is not a straightforward task. With a complex facility, dozens of employees, and millions in cash and sensitive assets, it can quickly consume valuable resources and affect your bottom line.
Access Management
Having well-managed control around employees’ access to keys and assets is vital for financial institutions. By automating the access governance provided for each staff member, it can reduce human operational risk. Banks can have a direct and measurable impact on their bottom line when losses are reduced.
Traka Solutions mainly addresses three challenges in the Banking and Finance Sector.
Ensuring secured access to keys and assets, with multiple inbuilt features like the Vault Pairing, Reason Logging, Remote Release and Multiple Authorizations. Process Automation by automated access of the keys and assets to only authorized users, real-time update, assurance that keys and assets never leave the facility with the Asset Return Assurance feature, and remote system lockdown.
Critical Processes
Major banks suffered billions in losses from operational risks in the last five years, mostly from client interactions and process management. Most of these losses stemmed from preventable mistakes made when employees and systems interacted with clients Flaws in workflows led to potential fraud as these processes were not being reviewed, controlled or audited regularly.
100% Regulatory Compliant
Since the global financial crisis, regulators have increased the number and complexity of the compliance rules concerning privacy and security that banks must follow. Lapses can be expensive and embarrassing, triggering regulatory sanctions and customer defections.
Ensuring compliance with governing authorities by providing a full audit trail and customizable reports.
Bank employees no longer need to manually manage keys, and the audit trail capability has helped them to remove manual paper recording and see the instant status of keys at any one time.
Traka works closely with banks to understand bespoke requirements for key management across its branch network, ensuring a seamless installation process under a tight timeframe for delivery.
Once installed, Traka works closely with individual branches to ensure staff has full training in the use of key management systems and access control solutions for authorized personnel.
Multiple banks in the region, have partnered with Traka to provide an intelligent key management system in their branches. The partnership enhanced the bank’s processes in its network, for the benefit of its employees and customers.
Traka is the global leader in intelligent management solutions for keys and equipments. Traka’s solutions help all types of organizations control their important assets, improving productivity and accountability, and reducing risk in critical processes.
For more information on Traka’s specialist key management solutions for retail banking, please visit: www.traka.com