Visit us at Secutech India 2018 Date: April 5-7 Booth: # B-1, Hall 1 Venue: Bombay Exhibition Centre, Goregaon-E, Mumbai World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune- 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com
From the Editor’s Desk
(102 pages including 6 for cover) Volume III • Issue 1 • August 2018
ISO 9001-2015 CERTIFIED
Editor-in-Chief Santosh Pathak
Greetings from SecurityLink India! The subject of the Goods and Services Tax (GST) implication for the Private Security Industry in India has geared up, and caught strong momentum with every pertinent forum in the country debating its unpleasant impacts on the industry and demonstrating their state of unease of doing business to the representatives of the government. The recently held FICCI – Private Security Industry Conclave 2018 echoed the issue and necessitated to have the GST rate rolled down to 5% slab. The FICCI Private Security Committee is said to have been in consistent pursuit with the Finance Ministry and other valid authorities to fix the issue. Shiv Pratap Shukla, the Minister of State for Finance, while inaugurating the Conclave asserted that the government acknowledges the contributions of the private security industry in creating jobs for the poor, ex-servicemen and those who have migrated from villages, and promised that he would exert the best possible to reduce the GST rate. Earlier, the Central Association of Private Security Industry (CAPSI) held a nationwide peaceful protest against GST. They also raised questions on the methodology of the payment of GST which is not viable and compelling a number of agencies to shut down their businesses. They demanded immediate enforcement of the reverse charge mechanism for the payment of GST whereby payments should directly be made to the government by the principal employers, the recipients of the service, and not by the service providers. This is because the security agencies, as per their business module, receive payments for their respective services after 60 to 90 days, and sometimes even later. Mr. Shukla had assured the CAPSI delegation as well to stay optimistic and expect an encouraging order soon. The CAPSI delegation also met the Minister of Finance – in charge – Piyush Goyal, who indicated that the demands are genuine, and would be examined and brought to a favourable conclusion soon. Over the last one year, the given inaptness of the GST ruling for the security industry at large, including physical and electronic security, has often been voiced and signified to the government by various associations and industry bodies. Though, by having a common goal, those voices had their own significant individual bearing on the authority, the desirable outcome is yet unaccomplished. The issue is vast in scope and it would need an intensified and more focused approach. It is also a fact that security is no longer a luxury but a basic essential for the citizens to cultivate a strong economy, which the government has also endorsed at various occasions. Moreover, the government counterparts have at no point, questioned and/ or shown reluctance to the authenticity of the demands made. A unified effort is proven to never die, and therefore, we trust and suggest that a concerted endeavour made by all the industry bodies in unison will surely bring appropriate end result to the industry. Till we meet next month, stay safe and happy reading! With warm regards,
Santosh Pathak Mob: +91 9968172237
Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: firstname.lastname@example.org Website: www.securitylinkindia.com Admin Vibha Dixit Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
CONTENTS NATIONAL ROUNDUP 24 25 26 27 28 29 30 31 32 33
CAPSI Protests Against GST Dahua Road Shows SAFE & OSH South India 2018 Matrix Standalone Access Control Solution Make in India for UAS New Wave of Ransomware Affecting India Indian Parents to Protect Children Online Ashish P Dhakan Recognized • Axis Appoints New BDM • Pelco Product Range Certified Netgear Ethernet Switches with 16 Ports
• Hikvision Training Program in Punjab • L&T and BEML Sign MoU
Netgear India Appoints Retail Distributor
Intelligent Transport System in Ahmedabad • IP500 Smart City Solutions • AI & Deep Learning Enabled Platform Unveiled
• Hikvision Secure Campuses Program • Videonetics Recognizes Partners of the Year
Matrix Secures Varsity Management
White paper Fundamental Shift A Look Inside the Rising Role of it in Physical Access Control
Benefits of Edge Analytics Camera
Records Stolen or Compromised in 2017
The Convergence between Security & IT
Examining the Risks and Benefits of Smart Cities
Mitigating Latency in Cloud-based VMS
Businesses Collect more Data than they can Handle
Building Statistical Foundation for Next-Gen Forensic DNA Profiling
Adoption of Under-display Fingerprint Sensor for Smartphones
SecurityLink India ■ August 2018
SecurityLink India â– August 2018
CONTENTS Application/ case studies 48
HID Secures Manhattan Skyscraper
New Meets Old in Suzhou
Hikvision Secures an Oil & Gas Company in Africa
Adding Outdoor Curtain PIR on IP CCTV System
CI & Govt. GSOCs Drive IPSecurityCenter V5.7
ACT365 in Action
PopSockets Get a Grip on Facility Security
London Borough Proof of Concept Success for Invictus Camera
Avigilon Secures The District Detroit
Pelco Enhances VMS User Experience
Visual Data Chooses StorNextPowered NAS
Automated Fare Collection for Public Transportation
Agent Vi at Cherokee Nation Casinos
Using Smartphone in Access Control
International updates Product showcase
SecurityLink India â– August 2018
SecurityLink India â– August 2018
With an unmatched nationwide presence, SIS Groupâ€™s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.
Soft Facility Management
Hard Facility Management
Janitorial, Housekeeping, FaĂ§ade Cleaning, Carpet Cleaning and Kitchen Stewarding.
Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.
Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.
www.sisindia.com A 5000 crore Indian multinational company
Benefits of Edge Analytics Camera By Milind Borkar – Vice President – India, Middle East & Africa – Infinova Group
dge analytics refers to the approach adopted by companies towards data collection and analysis. So, instead of waiting for the data to arrive at a centralized location or data store, it is analyzed by means of automated computation at the network switch or device. As the Internet of Things or IoT gains momentum, edge analytics is becoming crucial for companies
worldwide. The massive glut of data that gets collected over time is impossible to manage unless of course you have proper analytics algorithm in place. Edge analytics can save time, though full efficiency can be attained only if you have a good edge analytics camera. The role of edge analytics varies depending on the type of algorithms used and the kind of data that needs to be analyzed. So, if you are using an edge analytics enabled camera in a highly sensitive area, the camera can be configured to trigger an alarm on any kind of unusual movement in the zone of coverage so 20
as to alert the respective system operators or managers about the same. This kind of arrangement helps managers efficiently manage their facility. Scalability is yet another benefit that is making edge analytics extremely popular. Despite the vast number of connected devices, organizations do not feel the strain of processing such high volumes of data. Edge analytics, which is nothing but built-in intelligence within the camera, helps reduce the processing load on the server. It empowers the network video recorders or the NVRs to perform more efficiently. It also offsets the additional cost of having on-board analytics since the network bandwidth and storage requirements are less stringent. Edge analytics uses several algorithms to learn a particular situation and create alarms based on anomalies. Commonly used edge analytics include motion detection, loitering detection, wire cross detection, intrusion detection, abandon detection, loss detection, face detection, people counting, crowd density detection, crowd gathering detection, fights detection, queue length detection, customer focus detection, exceptional sound detection etc. The specifications of the edge analytics camera should therefore be strong enough to capture such intelligent information.
SecurityLink India ■ August 2018
Infinova Wins Recognition for Its Security Expertise Mr. Milind M Borkar, VP Sales (Infinova)—ME, Africa and SAARC, receives award at the Secutech Event for Lifetime Achievement Award from Secona Shield Awards.
ID: Infinovagroup/infinova corporation World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova Middle East (Kuwait): Office # 13, 5th Floor, KFH Bldg # 240, Mirqab, Kuwait Landline and Fax: +965-2247-5678, Email: Sales-ME@infinova.com Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com
SecurityLink India ■ August 2018
The Convergence between Security Systems & IT Networking By Sandesh Kaup, Country Manager – India, Srilanka, Bangladesh & Nepal – Allied Telesis
t wasn’t so long ago that deploying a CCTV system involved a number of cameras, a roll of coax and a digital video recorder (DVR). If an access control system was required, that made a standalone system that used twisted pair for the card reader and door strike, and the integration between the two systems was extremely limited. Today’s security systems have dramatically evolved and offer far greater functionality. They are truly integrated, and the integration lies not only between the different elements of the security system but extends to other systems as well; for instance, an access control system is integrated with the payroll and human resources systems for time and attendance information. The drivers for this integration or convergence are two-fold – first being the advances in technology that have enabled these systems to move from standalone to fully integrated ones, especially the standardization in the digitization, encapsulation and transmission of information. The second driver is the rising demand from customers for platforms that deliver greater functionality or improved efficiency, or both. As information from access control, CCTV, building management systems (BMS) and other associated platforms has evolved from analog to digital; they can easily be transported over modern communication systems. These communication systems include local networks where Category 5, 6 or 7 unshielded twisted pair (UTP) is commonly used, or where distance is the limiting factor, fibre may be used. Wireless technology is also becoming increasingly popular for temporary installations, or where deployment of copper or fibre infrastructure is either impractical or cost prohibitive. All of these physical mediums have one thing in common that they are used to deliver connectivity between devices or components of an integrated security system. These devices can include cameras, encoders, card readers, access control panels, servers, storage and workstations, to name a few. The 22
protocol or standard that enables them to communicate with each other, regardless of vendor or physical media, is the Internet Protocol or IP. IP, often referred to as TCP/ IP, is a suite of different protocols that are used to interconnect devices within a network. While IP may be seen by many as a black art exclusively for techno-geeks, due to the convergence that is occurring in many areas such as voice communications and physical security, it has become necessary for PBX technicians and security installers to have a greater understanding of how today’s IT networks work. This is not just limited to IP but also to the underlying physical media as the application for different media in an IP network may be quite different to that of an analog installation. The good news is that while there are plenty of individuals and organizations that profit from making networking out to be a black-art that is complex and difficult, the reality is that with the basic understanding of how networks work, it’s not as difficult. There are two primary protocols that are used within the IP protocol suite – Transmission Control Protocol or TCP and User Datagram Protocol or UDP. TCP can be seen as similar to a voice conversation on a telephone where a call is established, and information is transmitted and acknowledged until there is no further information to be transmitted, or where the call is torn down. If information is lost, an acknowledgement is not received and the information is resent. UDP is more akin to a letter that is sent by post where the information is encapsulated and sent across the network, and if all goes well, the information will arrive at its intended destination, but there are no guarantees. TCP is ideal for the transmission of lots of information where the accuracy of the information is important. Examples of applications that use TCP include Web traffic (using the HTTP protocol) and email (using the SMTP protocol). UDP is ideal for the transmission of real-time information such as
SecurityLink India ■ August 2018
voice (using the SIP protocol) and video (using protocols like RTP). The primary reason for using UDP over TCP for realtime transmission is that if information is lost, there is little point in asking for it to be retransmitted as it is no longer relevant; and with a well-designed network using equipment from a reputable networking vendor, the probability of errors is extremely low. In order to design an IP network for a security system or solution, there are many points/ questions that need to be asked/ addressed: ●● Which application or applications (i.e., CCTV, access control, IP intercom, BMS, VoIP) will operate across the network? ●● Do the applications use unicast or multicast system for the transmission of information? ●● If CCTV is in use – how many cameras, which frame rate, and what resolution of the cameras will be used? ●● Do the end-points require POE (802.3af) or POE+ (802.3at) or even POE++ (802.3bt), and if so, what POE class do the devices belong to? ●● What speed does each of the endpoints connect at? ●● Is the given installation new or an upgrade, or extension of an existing system, and what physical media exists or has been proposed? ●● What level of redundancy (interface, link, power, device, site) is required from the network? While this list may sound extensive, there is a reason for asking each question and the answer will better enable the network to be dimensioned. When designing a network, it is beneficial to create a virtual LAN (VLAN) for each different application in use on the network. This separation reduces the number of devices in any given VLAN which reduces the amount of broadcast traffic and improves performance, and also ensures that if one application is misconfigured or misbehaves, it is less likely to affect other applications using the network. Unicast traffic is similar to a voice conversation between two people where information is sent from one to another. This is the kind of traffic that is used between a workstation and the server when retrieving a file. Multicast traffic is similar to a magazine subscription where specific information is sent to specific recipients of that information but not others. Multicast traffic is often used by CCTV applications as the bandwidth consumed across the network remains relatively constant regardless of the number of viewers of a camera. In unicast traffic, as the number of viewers increases so does the bandwidth
used across the network. Multicast traffic is also used in IP intercom platforms where the same traffic needs to be delivered to a number of endpoints. It is important to understand that the multicast traffic needs to be supported as it affects the way the network needs to be configured, and particular attention needs to be paid to the number of devices sending and receiving the traffic. Video generated by CCTV systems consumes by far the greatest amount of bandwidth of any application likely to be deployed across a network. The consumed bandwidth is dependent on the number of cameras connected, their frame rates, and the resolution of the cameras. For cameras using 4CIF at 25 frames per second, bandwidth anywhere in between 2.5 and 4Mbps is needed to be allowed for; and for megapixel cameras operating at 25 frames per second, it can easily increase to 12 to 20Mbps. Power-over-Ethernet removes the requirement for separate power cabling to a device. All PoE devices advertise a ‘class’ that advises the network on the maximum amount of power that device will draw. It is important that the PoE class for each different type of device is known in order to ensure appropriate network switches are selected. While it is common to connect laptops and workstations at 1Gbps, many devices used within security networks support only 100Mbps. In these cases, there is little benefit in using network switches that support 1Gbps at the edge, as this will only increase the cost of the solution. Physical media may exist or may also need to be installed. Having knowledge of what media exactly exists and where it runs, is important to ensure that appropriate networking devices are chosen. If the media doesn’t exist, it is beneficial to run any backbone infrastructure in a ring topology to improve the availability of the entire solution. A security system is not particularly useful if a single failure causes the entire system to fail. For this reason, redundancy needs to be integrated into the solution. Increasing the redundancy of a system will also increase the cost, so it is important to understand what level of redundancy is required. Lastly, consideration needs to be given to how the system is deployed and managed over time, which ensures autonomous technology is integrated into the network that reduces the burden of network management and improve consistency and security will also reduce the total cost of ownership of the system as a whole. As a vendor with over 15 years’ experience in the delivery of networks to support building services and other embedded applications, engaging with Allied Telesis will ensure you are networking smarter.
SecurityLink India ■ August 2018
Private Security Agencies Hold Nationwide
Peaceful Protest Against the Imposition of GST CAPSI Delhi Unit made it at India Gate, New Delhi They demand implementation of the ‘Reverse Charge Mechanism’ for GST payment to save the interests of the industry
nder the aegis of CAPSI, huge gatherings of owners and employees of the private security industry across the country staged nationwide peaceful protests on 18 July 2018 against the existing modus of GST rules which in principle, largely goes in contradiction to the business module of the industry, and has brought various security agencies to the verge of closure owing to the imposed unwarranted financial burden. The major impediment stems from the fact that GST is due to be deposited every month without fail while agencies receive payments for their respective services after 60 to 90 days. They demanded immediate implementation of the ‘Reverse Charge Mechanism’ whereby the payment of GST is done to the government directly by the recipients of the security services and not by the private security agencies, the service providers. This mechanism hardly impacts the revenue collection of the government. The Delhi Chapter of CAPSI held their protest at the India Gate where hundreds of security professionals gathered 24
in black T-shirts to support the cause. The Chairman of CAPSI, KunwarVikram Singh was also present there. They showed their respect to the martyrs by laying the wreath at the Amar Jawan Jyoti before the protest. “During the last six months, we have raised this issue with the government at various levels to highlight problems being faced by the industry. We made representations to the Ministry of Finance, the GST Commissioner, the Competition Commission of India (CCI), and the MSME and so on, demanding the streamlining of the GST mechanism for our industry; but no viable solutions have come forth leaving CAPSI with no other option than to hold a protest. The major issue which forces owners SecurityLink India ■ August 2018
to close their companies is the methodology of depositing GST. The GST regulations mandate the security agencies to deposit tax on the 20th of every month when bills are raised; however, the payments against these bills are received after 60 to 90 days, or even more. This gap impacts the cash flows of our low-margin industry badly causing us to carry huge back-breaking burdens,” said Kunwar Vikram Singh, “The logical remedy to this problem is the introduction of the ‘Reverse Charge Mechanism,’ whereby the principal employer (to whom the security guards are outsourced) pay GST on due date and claim its refund later. This will reduce the financial burden on the owners of the private security agencies.” “Security service industry essentially recruits, trains, and then provides jobs to the trained manpower; which along with other statutory costs constitute about 90% of our billing amount. Our margin ranges up to 5% only. TDS at the rate of 2% of the billing amount further erodes the margins. Low mar-
gins coupled with delays in payments create a huge pressure on the cash flows in the industry. Most of the players often find it extremely difficult to pay even wages on time, besides to comply with the statuary requirements of depositing dues like PF and ESI. Under such circumstances the additional burden of GST is unbearable. The implementation of the ‘Reverse Charge Mechanism’ in GST is the only way out,” Mr. Singh concludes. The protest saw an active involvement of APDI as well.
The private security industry is one of the largest job providers employing over 80 lakh people, mostly retired personnel from the armed forces and the para-military forces. Most of the security guards come from the rural and economically poor backgrounds. Any government decision resulting in the closure of even one average security agency could mean unemployment to a large number of security guards causing large scale unemployment in the rural sector – Kunwar Vikram Singh Chairman, CAPSI
Road Shows D
ahua Technology, a leading solution provider of the global video surveillance industry organized another series of roadshows in Chennai, Jodhpur, Gwalior and Mumbai. The theme of the roadshows was ‘Partnering To Enable A Safer & Smarter Living.’ These roadshows were successfully organized by Dahua Technology along with its national partner M/s. Aditya Infotech. Commenting on the success of these roadshows, Robbin Shen, Managing Director, Dahua Technology India Pvt. Ltd. said, “I am indeed overwhelmed by the enthusiastic response in all these cities which clearly shows that our technological innovation, quality, and services to clients and customers are well accepted here in India. This encourages and motivates our team to give out their best. More awareness has been created as more customers
Roadshows are very important to us that help accomplish our mission of enabling a safer society and smarter living – Robbin Shen Managing Director, Dahua Technology India Pvt. Ltd.
throng to our security products.” The events were hosted in top-class and easily accessible venues in each city. The first 50 registered visitors were given early bird gifts. There were live demonstrations in all these cities on security products displayed for the benefit of the visitors. The customers were happy to get hands-on experience in operating Dahua products. Dahua officials freely mixed with customers, responded to the queries and cleared their doubts. The road shows in these cities created a special bond between the Dahua brand lovers and the company, and helped enhance its brand awareness among the people.
SecurityLink India ■ August 2018
SAFE & OSH South India 2018 Commence their Maiden Editions in Hyderabad Two uniquely designed expos focused on occupational safety and health, and security and surveillance by UBM India
BM India has recently organised the 5th edition of the Occupational Safety & Health (OSH) (28-29 June) as well as the 4th edition of the Security and Fire Expo (SAFE) South India 2018 (2830 June), for the first time in Hyderabad. Held at the Hitex Exhibition Center, the expos brought together internationally renowned exhibitors, consultants, industry experts and key government officials on a single platform from the Indian and the international industries. Speaking on the occasion of the maiden launch of OSH South India and SAFE South India in Hyderabad, Yogesh Mudras, Managing Director, UBM India said, “Governments all over the world recognize the importance of a safe and a healthy environment for citizens and firmly believe that without these vital components, social justice and economic growth cannot be achieved. Besides, education, training, consulta-
tion and exchange of information and good practices are essential for prevention and promotion of such measures. Through OSH and SAFE South India 2018, we have provided an opportunity for stakeholders across the health, safety and security industries to showcase their innovations and technology, understand new industry trends, and network and create new business connections. This is an industry that banks on newer and improved technological innovations on a constant basis. Naturally, there is an immense growth potential along with the learning and networking opportunities for suppliers and service providers at these expos.” “Notably, for the first time since their inception, the co-located OSH and SAFE expos for South India have been brought to Hyderabad this year as a strategy to rotate them across several key Indian cities in South India. This
(L to R) Yogesh Mudras, T. V. Sashidhar Reddy, Pankaj Jain during the inauguration of SAFE
SecurityLink India ■ August 2018
move also aims to bring the expos closer to the end-user community and spread awareness across this region on health and safety best practices. The response we have got here has been extremely encouraging,” he further added.
SAFE South India 2018
AFE was Inaugurated by T.V. Sashidhar Reddy, IPS, Addl. Director, RBVRR (Telangana State Police Academy), and R Nanda Kumar, President, Electronic Security Association of India, among other key dignitaries. SAFE 2018 brought together over 70 renowned Indian and international brands from surveillance, entrance and home automation industry, as well as consultants, business experts and key government officials from the industry to congregate, interact, network, view the latest innovations, source business solutions and gather invaluable expert support, all under one roof. The expo is supported by the Electronic Security Association of India (ESAI) and Asian Professional Security Association (APSA). Some of the key exhibitors present at SAFE India 2018 included Mark Electronics Corporation, Timewatch Infocom Pvt. Ltd., Road Point Ltd., N S Enterprises, ACJ Computronix, Advance Infotech, WYSE Biometrics Systems Pvt. Ltd., Mantra Softech (I) Pvt. Ltd., Matrix Comsec Pvt. Ltd., Prama Hikvision India Pvt. Ltd., Pictor Telem-
atics Pvt. Ltd., Axestrack Software Solutions Pvt. Ltd., R G International, Lana Technologies Private Limited, Tekno Electro Solutions (P) Ltd., Face ID Systems LLP, HiFocus Electronics India Pvt. Ltd., Enterprise Software Solutions Lab Pvt. Ltd., Futureeye Global Technologies, CAMTECH Solutions, Dahua Technology India Pvt. Ltd., Vamo Systems Pvt. Ltd. etc. The event also organized a unique conference on the first day focusing on in-depth speaker sessions and panel discussions on ‘Corporate Risk Management,’ ‘Key Strategies and Technologies to Mitigate Threats,’ ‘Bolstering Security of a New-Age City,’ ‘The Changing Role of a CSO in Crisis Management,’ and ‘Threat of Cyber Attacks on Security & Surveillance Systems.’
OSH South India 2018
SH South India 2018 saw an inaugural ceremony attended by Chief Guest – B. R. V. Susheel Kumar, IAS, Director of Mines and Geology, Government of Telangana, along with key dignitaries such as Hemant Sapra, President, Safety Appliances Manufacturers Asso-
Dignitaries inaugurating OSH 2018 ciation (SAMA); S.P. Garg, Executive Director, Corporate HSE, Gas Authority of India Ltd.; C. Laxiprasadh, Addl. Director, Telangana State Disaster Response & Fire Services, Hyderabad; M. Vijay Kumar, Director of Boilers, Govt of Telangana; Pankaj Jain, Group Director, UBM India and Yogesh Mudras, amidst an august industry gathering. Supported by associations like Safety Appliances Manufacturers Association (SAMA), IPAF, Indian Technical Textile Association, Indian Society of Ergonomics, and other safety training institutes, OSH brought together over 80 prominent safety brands including Venus Health & Safety, Acme Safetywears Limited, Draeger Safety India Pvt. Ltd., Indomax, Midas Safety Pvt. Ltd., Motorola Solutions India Pvt. Ltd., NIST Institute Pvt. Ltd., Oil & Gas Plant Engineers (I) Pvt. Ltd., Oshkosh India Pvt.
Ltd., Prolite Autoglo Limited, Rupa Enterprises, to name a few. OSH also includes a two-day conference including workshops focusing on the significance and business benefits of investing in the health and safety of the workforce and in-turn, the health of its own organization and the economy at large. The seminars focused on topics like fire safety strategies, hazards to workers’ health and solutions, challenges in implementing laws and legislation related to OSH in India, redefining mindsets in the construction industry regarding OSH etc. UBM India has also strategically tied up with prime organisations such as the International Power Access Federation (IPAF) that is holding an IPAF operator training program, while the Bureau of Indian Standards (BIS) held a workshop on ‘Indian Standards on Occupational Safety and Health.’
Standalone Access Control Solution E Key features
ntry/ exit within premises is generally a major challenge of an organization’s overall security strategy. To manage access to specific zones in a single location requires a standalone access control solution. For small and medium business organizations, Matrix has developed COSEC PANEL LITE (site controller), which works independently without requiring a server for access control application. All Matrix COSEC biometric and RFID Card based door controllers are connected to the site controller for implementing advance access control features
and restricting any unauthorized entry.
●● ●● ●● ●● ●● ●● ●●
License free solution. Eliminates server cost. Controls 255 doors and 25,000 users. 5,00,000 events storage capacity. Connects third party readers. Real-time monitoring and control. Integration with fire alarm and video surveillance.
SecurityLink India ■ August 2018
Make in India for UAS Promoting Unmanned Aircraft Systems Industry UAS has $50 billion opportunity over the next 15 years for the Indian Market
ICCI has recently organised a conference on ‘Make in India for UAS’ at Federation House, New Delhi, in association with Ministry of Civil Aviation, Government of India. Amitabh Kant, CEO, NITI Aayog, Government of India said in his keynote address that integrating UAVs in civilian space is a challenging job, and therefore, requires an appropriate regulatory framework, however, Unmanned Aircraft System (UAS) has the potential to transform many
be US $50 billion over the next 15 years. India must realize the full potential of this technology and leverage it as a powerful tool not only for the security and safety, good governance, increased productivity, but also to encourage consumer in commercial applications to develop a sophisticated UAS industry sector and make a new India by 2022.” He also recommended that: ●● The sector must aggregate the demand and push for make in India,
India must aspire to become a global manufacturing hub of Unmanned Aircraft System – Amitabh Kant CEO, NITI Aayog, Govt. of India sectors and modernize India rapidly. “It is important for India to facilitate and promote the development of UAS industry, strive towards global leadership, and also aspire to become a global manufacturing hub in times to come. Widespread adoption of UAS through a facilitative framework would be a transformation step in ease of doing business,” Mr. Kant said. He reiterated that drones are going to replace 80% of the operations presently carried out by the manned aircrafts. Indian market for UAS will 28
●● India should aspire to be a global hub for design, development and manufacture for all types of UAS, and ●● The regulatory framework for opening up UAS operations for civil and commercial services be promulgated early in line with the global best practices. Anil Aggarwal, Joint Secretary, DIPP, Govt. of India said that the Civil Aviation Ministry is likely to begin the registration process of drones soon, “We need regulations for usage of drones in terms of altitude, SecurityLink India ■ August 2018
endurance and categorization. UAS industry is at the cusp now. As per the estimates, by 2023, UAS industry has US$1 billion opportunity in India.” He added that the policy is going to be comprehensive, and we must have the capabilities of designing and manufacturing in India so that the IP stays with us. Rahul Chaudhary, Chair, FICCI Homeland Security Committee and Former CEO, Tata Power SED said that if the regulations are right, UAS industry can be a growth driver for the Indian economy in times to come. He added that the Indian UAV market is projected to grow at a CAGR of 18%. Vaibhav Gupta, Member, FICCI Homeland Security Committee and Director, MKU Pvt. Ltd. said that better policy framework will ensure safety and also an online portal for application and approval would make the process efficient and transparent thereby generating more interest and encouraging more usage. Rammohan Thygarajan, Partner, Advisory Services – Digital, EY, in his theme address said that there is a need to leverage synergies between UAS and emerging technologies to draw insights across industries. India should create an environment for various players in this ecosystem of companies and start-ups to collaborate and create value for each other.
Detecting a New Wave of Ransomware Affecting India L
ast year WannaCry created havoc across the globe, and due to its lateral movement, it penetrated into the networks and skipped across the countries and continents. The security community has been highly proactive in taking down the infrastructure associated with WannaCry, however, due to its ability to move across networks, eScan observes that it still exists in its dormant form. eScan’s telemetry servers have been picking up reminiscent artefacts of WannaCry ransomware on regular basis. Over the period of last few months, they have observed a steady decrease of incidents involving WannaCry, and hopefully by the year end WannaCry should meet the same fate as that of Conflicker worm/ DNS changer botnet. eScan has been observing various variants and newer ransomware being added into the family, however very few of them have shown active development viz., GandCrab and ZZZ. In the last few weeks, GandCrab has taken center-stage and is evolving at a much faster rate, which suggests that the ransomware developer/ criminal nexus is growing stronger and many of the criminals are now switching their loyalties to GandCrab. It is a sheer fact that the developers are taking keen interest and adding numerous weapons to its arsenal. The next step of the evolution for ransomware would be Crypto miners with Info stealers and a ransomware – all bundled into one. India has seen its share of ransomware attacks and Maharashtra is leading the way for the week, however, in states
like Gujarat, Telengana, Uttar Pradesh and Kerala eScan has observed a rise in activity of the GandCrab ransomware attacks, and xtbl, korean, Dharma and CrySiS variants of ransomware family are making rounds.
●● To stay safe from such ransomware attacks, all the organizations and users need to ensure that the patches released by Microsoft have been updated or patched immediately. ●● Administrators should block all executable files from being transmitted via e-mails. ●● Administrators should isolate the affected system in the network. ●● Administrator can restore the encrypted files from the backup or from system restore point (if enabled) for affected systems. ●● Install and configure eScan with all security modules active: o eScan real time monitoring. o eScan proactive protection. o eScan Firewall IDS/IPS intrusion prevention. ●● Users shouldn’t enable macros in documents. ●● Organizations should deploy and maintain a backup solution. ●● Most important, organizations should implement MailScan at the gateway level for mail servers, to contain the spread of suspicious attachments.
SecurityLink India ■ August 2018
Reminds Parents in India to Protect Children Online Unsupervised access to the internet & social media may expose children to malicious content, cyber bullying and identity theft
ortinet, the leading global player in broad, integrated and automated cybersecurity solutions, has recently cautioned parents to supervise children’s online activities and educate them on safe surfing. The Internet provides unprecedented opportunities for children to communicate, learn and develop new skills. However, parents need to
rya, Regional Vice President, India & SAARC, Fortinet, “While the Internet offers educational material, fun games and ways to connect with friends, it can also be a virtual playground for cyber bullying, malicious content, and for criminals or predators to prey on kids and their families, leading to things such as identity theft, crime and much worse.”
As every family situation is different, you need to decide what is best for your family. Parents need to help their kids become more cyber-savvy and at the same time, put effective protection methods in place to keep them safe online – Rajesh Maurya Regional Vice President, India & SAARC, Fortinet be aware that predators lurk online and could potentially expose children to inappropriate content, criminal behavior and falsehoods. According to a UNESCO global survey on cyber-bullying covering over 7,600 children and youth (aged 8-17 years old) in 25 countries, the highest rate of cyber-bullying is in Asia – China (70%), Singapore (58%), and India (53%). China and Singapore were also the only countries to report a higher rate of online bullying than face-to-face bullying. Other Asian countries that reported lower levels of cyber-bullying include Malaysia (33%), Pakistan (26%) and Japan (17%). “As the Internet, particularly mobile broadband, becomes more accessible and affordable, more children are going online for longer periods. Parents need to be more aware of the dangers lurking on the Internet,” said Rajesh Mau30
To help ensure kids stay safe online, Fortinet’s cybersecurity experts advised parents to: 1. Talk to children about your expectations for them online: Try setting boundaries that may include rules about how long they are allowed to be on the computer, what sites they are allowed to visit, what software programs can be used, and what tasks or activities they are allowed to do based on age suitability, knowledge and maturity. 2. Teach the importance of keeping information private: Personal information and photos posted on the Internet can be dangerous as they can be used against families by those who meant harm. Once uploaded on the public domain, it can be difficult to remove them and can have haunting effects later if misused. Check the kid’s privacy settings on social SecurityLink India ■ August 2018
media sites to prevent strangers from accessing personal information. Make sure your children understand: ●● Never to give their name, phone number, email address, password, address, school name, or picture without your permission. ●● Do not respond to malicious or hurtful posts. ●● Do not open e-mails or attachments from people they don’t know. ●● Do not get together with anyone they ‘meet’ online. 3. Let them know that if they see something, say something: Children should be warned about the dangers of the Internet so that they recognize suspicious behaviour or activity. Allow children to come to the parents with questions or concerns if they happen to see something on a website, in an email or in a chat room that does not seem right or makes them uncomfortable. 4. Be aware of their computer activities: Monitor your children’s activities online including which websites they are visiting. Ensure you have a sense of who they are communicating with and that your children actually know the people they are talking to if they are using email, instant messaging or chat rooms. 5. Keep computers in a common area: It will be much easier to monitor computer activity if you keep your computer in a common area. This prevents kids from doing things they shouldn’t do, and you can also intervene should you notice a behav-
iour that could have negative consequences. 6. Consider implementing parental controls: Certain web browsers enable you to restrict or allow only certain websites to be viewed on computer, which is known as ‘whitelisting,’ and these settings can be protected by a password. Although no technology is fool-proof, there are available commercial software applications that can be installed to monitor, filter
and restrict access to dangerous content online. Parents can also check with their Internet service providers and mobile carriers if they provide restriction services as optional addons. Fortinet secures large enterprises, service providers, and government organizations around the world, and empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take
on ever-increasing performance requirements of the borderless network – today and into the future. The Fortinet Security Fabric architecture can deliver security features without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 350,000 customers trust Fortinet to protect their businesses.
Ashish P Dhakan Recognized as IFSEC Global Influencer 2018
shish P Dhakan, India’s renowned The IFSEC Global influencer recognition is security technology leader and the an honour that reaffirms the faith in our vision, and MD & CEO of Prama Hikvision has been inspires us to develop more India specific products named as IFSEC Global Influencer 2018 and solutions. We remain committed to bring in our in the Security Tech Leaders category. globally acclaimed technology like deep learning, AI, He was the only Indian entry among the AI Cloud, big data and IoT to ensure that our country top ten security technology leaders list. and fellow countrymen remain safe Mr. Dhakan has been working re– Ashish P Dhakan lentlessly to raise the bar of the security MD & CEO, Prama Hikvision industry in India through innovation, technology, training, awareness and advocacy. He has been instrumental in the success of Prama Hikvision – the first joint venture company formed by Hikvision beyond China – through a pan-India network of dealers, distributors and system integrators. His ability to elevate the industry globally gave him this recognition. According to the IFSEC Global nomination, “His involvement with the relevant bodies in our industry, complemented by his blogs and contributions to industry media channels, has helped shape the shift from traditional people-based deployment to technology-led solution deployment. He has set up an exclusive forum for current and potential clients to debate and discuss the future of the security industry, challenging the norm and constantly assessing emerging technologies.” IFSEC Global defines an influencer as someone who plays a key role in driving technological innovations, has been a driving force in changing regulation and standards, an opinion leader, a turnaround business leader, and someone who has been an influential voice in the national media for the overall security and surveillance industry. Mr. Dhakan has played a key role in setting up a state-of-the-art training centre in India to train system integrators, partners and end-users. He is also a driving force behind Hikvision’s ‘Make-in–India’ plan supporting the government’s ambitious ‘Makein-India’ programme. With this initiative Hikvision will be setting up a world-class manufacturing plant to cater to India and the overseas market. SecurityLink India ■ August 2018
Axis Appoints New BDM Bolstering the Retail & Hospitality Portfolio Sujith Sebastian takes on the role as Business Development Manager, handling India and SAARC
xis Communications have appointed Sujith Sebastian as the Business Development Manager, India & SAARC to strengthen its market outreach in retail and hospitality. Based out of Bangalore, Sujith will be reporting to Sudhindra Holla, Sales Director, who is responsible for developing the retail and hospitality portfolio, a key focus for Axis this year. The newly created role reflects a strategic decision by the company to tap the prolific Indian retail and hospitality industry across the country. It will provide a direction to the sales team and gives an opportunity to increase visibility among end users, and overall profitability in network cameras and video analytics portfolio. Since there is an increased need for an intelligent technology solution in retail space, the focus is on video analytics, foot traffic counting, demographic mapping and queue monitoring solutions.
At Axis, we have always attempted to provide value and the best in class support to our partners, and to better understand end users in order to provide the right solutions to retailers and hoteliers – Sudhindra Holla Sales Director, Axis Communications, India & SAARC Announcing the appointment, Sudhindra Holla, Sales Director – India and SAARC said, “We are delighted to welcome Sujith, an extremely experienced hospitality professional to the team. With his strong track record, I am confident that he will be able to develop and grow the team and strengthen these verticals.”
Retail and hospitality are the two of the most dynamic sectors. I am excited to embark on the journey with Axis, the most innovative pioneers of end to end solutions. I look forward to supporting the partners, growing our customer base and looking to make the most of these high end quality to drive business growth – Sujith Sebastian Business Development Manager – India and SAARC Prior to joining Axis, Sujith was working with the Royal Caribbean Cruises in US with a Master’s in Business Administration (MBA) from Symbiosis Institute, Pune. His background in the hospitality industry, having worked with the Taj Group and Godrej’s Nature’s Basket, has made him gain valuable insights into the sector and drive growth in revenues. 32
SecurityLink India ■ August 2018
BIS Certification for Entire Product Range BIS certification testifies to quality, safety and reliability of Pelco products
elco™ by Schneider Electric has become Bureau of Indian Standards (BIS) certified for its complete product range, recently made mandatory for all CCTV products in India. Pelco has been BIS certified since May 23 to sell its security and surveillance solutions in the country receiving third party guarantee on quality, safety, and reliability of its products. “We are proud partners to many businesses and government agencies in India and respect the policies in place to allow continued use of our innovative solutions without fear of non-compliance,” said Robert Beliles, Vice President of Marketing, Pelco by Schneider Electric. Just as is the case with many other
Gs116lp & Gs116pp
We consider the BIS standards for CCTV cameras an excellent thing. Let’s put the bar as high as possible so customers can be certain to receive high quality products – Saranbir Baweja Country Manager, Pelco by Schneider Electric products that are sold on the Indian market, CCTV hardware now also needs to adhere to the BIS product certification scheme process. This requires that manufacturers provide samples to BIS to be tested in an independent lab. Pelco passed all tests successfully and can sell all of its CCTV cameras on the Indian market today; guaranteeing all stakeholders (channel partners, end-customers, partners or consultants) that Pelco products abide by the standards set forth by BIS. Pelco™ by Schneider Electric is a global leader in professional video surveillance and security system products and technologies with a local presence in 136 countries and over 1,500 channel partners worldwide.
Gigabit Ethernet Switches with 16 Ports Unmanaged switches with flexible Power-over-Ethernet options
ETGEAR®, Inc., a leading provider of networking equipment for homes and small to medium-sized businesses (SMBs) has introduced new 16-port Gigabit Ethernet unmanaged switches, using flexible Power-over-Ethernet (PoE) integrated technology. Businesses or even home offices needing affordable solutions with a reasonable PoE budget can now easily deploy denser PoE+ devices and high-power PoE+ devices connected to a single switch for energy efficiency as well as space and cost savings. The PoE devices can be easily deployed by businesses or offices for energy efficiency, as well as space and cost savings. The switches can also help offices with a dense number of devices in close proximity achieve power and connectivity. It can include VoIP phones, IP security cameras, video-over-IP endpoints, sensors, LED lighting, secure access door locks, and other IoT devices, as well as pan-tilt-zoom HD surveillance cameras with features such as night vision and built-in motion tracking. But what is most unique about these plug-and-play switches is that they have a built-in intuitive power selector and support optional interchangeable external power supplies that allow the users to easily increase PoE budget at any time to provide the
devices with the power they need. With this industry-unique feature in an unmanaged switch, one can start with a lower PoE budget and then cost-effectively increase it at any time to grow along with the business needs. If the business has to power more medium to high-power devices in the future, it can easily upgrade just by changing the external power supply. If the users already have multiple power-hungry devices, they can go directly to the high-power version switch for the best PoE budget. NETGEAR has designed these switches to adapt as needs change. “At NETGEAR we have constantly focused on continuous improvement and innovation and this is the reason we have remained a market leader in providing solutions to small businesses. This is why NETGEAR has introduced these flexible, cost-effective solutions to support the growth of these businesses,” said Marthesh Nagendra, Country Manager – India & SAARC, NETGEAR. Their silent operation and small form factor, combined with the rack-mount and wall-mount accessories, give a user the flexibility to place a switch in small cabinets, in a 19-inch rack, on a wall, or on a desk. But what is most unique about these plugand-play switches is that they have a built-in intuitive power selector and support optional interchangeable external power supplies that allow one to easily increase the PoE budget at any time to provide devices with the power they need. SecurityLink India ■ August 2018
Training Program in Punjab’s Patiala and Chandigarh Creates Security Technology Awareness among Professionals
ikvision has recently organized training programs in Punjab’s Patiala and Chandigarh cities to impart security product knowledge and training – first on 22nd June at Hotel Shourya, Patiala; and the second on 23rd at Hotel JW Marriott, Chandigarh. A comprehensive product introduction, live demos and training program were the key highlights of the event that got overwhelming response from the security professionals in both cities. It was a great experience for Hikvision team to meet with potential partners and SIs. This was instrumental in building trust and confidence for the quality and services offered by Hikvision. Ashish P. Dhakan, CEO and MD, Prama Hikvision India Pvt. Ltd., said in his introductory note, “The future of the security market in India is very bright due to robust growth prospects. Hikvision is the world’s leading provider of innovative video surveilParticipants at Patiala lance products and solutions. We are offering the latest products and innovative technologies including artificial intelligence (AI) and deep learning, big data, IoT (Internet of Things). The Hikvision Training Program is our initiative to impart training and product knowledge to the security professional community.”
Participants at Chandigarh
Hikvision team organized the Training Program in Patiala and Chandigarh in association with its respective regional distributors Bandagee Computers and Bright Computers. The events were one of the firsts in the regions hence they got overwhelming response from the security professionals. 34
SecurityLink India ■ August 2018
L&T & BEML Sign MoU to Address the Indigenisation Needs of Indian Defence Market B
EML Ltd., a public sector undertaking under the Ministry of Defence, and Larsen & Toubro, India’s leading engineering, technology and construction conglomerate have recently signed a Memorandum of Understanding (MoU) to jointly capitalise on the emerging opportunities in the domestic and export markets for defence products and systems. The cooperation between the two organisations is aimed to leverage ‘Make in India’ initiative for increased value addition within the country in development/ manufacturing and longterm support for defence and export business in identified areas/ projects/ programs, thus synergising their combined strengths. On the occasion, Deepak Kumar Hota, Chairman & Managing Director, BEML said, “PPP model is the way forward to meet the growing demands of the defence industry. With the vast experience and expertise in defence sector of BEML and L&T, I am confident that together we can address the
needs of the Indian defence market as well as explore export markets of various Products/ systems of mutual interest.” Jayant D. Patil, Whole-time Director (Defence) and Member of L&T Board said, “This MoU paves the way for public-private sector partnership between two industry leaders. By synergising capabilities of each other in system design and integration, manufacturing and marketing, the companies look forward to enhancing product range, evolve new products and improve business prospects.” BEML and L&T have collaborated and partnered on co-development and production of significant subsystems involving complex technologies and advanced engineering equipment such as Sarvatra Bridging Systems and various other vehicular platform-based systems for the Indian MoD. BEML Limited is a leading multitechnology ‘Miniratna-Category-1’ company under the Ministry of Defence, which plays a pivotal role in serving India’s core sectors like Defence, Rail, Power, Mining and Infrastructure. BEML operates in three verticals viz. Defence & Aerospace, Mining & Construction and Rail & Metro and has state-of-the-art manufacturing facilities located at Bangalore, Kolar Gold Fields (KGF), Mysore, Palakkad. Larsen & Toubro is an Indian multinational engaged in technology, engineering, construction, manufacturing and financial services with over USD 18 billion in revenue. It operates in over 30 countries worldwide. A strong, customer–focused approach and the constant quest for top-class quality have enabled L&T to attain and sustain leadership in its major lines of business for eight decades.
NETGEAR India Appoints Kaira as its Exclusive Retail Distributor N
ETGEAR, a leading provider of networking devices has announced the tie-up with Kaira, a regional distributor of IT peripherals, storage, networking, display products and services, as its exclusive retail distributor. This will help serve and expand NETGEAR’s sales channels in India and provide a direct access to the re-sellers and retailers.
Kaira has through organic growth established a regional distribution presence in Singapore, Malaysia, South Africa, Mauritius and Sri Lanka. Its efficiency in logistics and value-added services for its channel and retail partners has given Kaira a unique position in the IT industry. Furthermore, its product diversity accurately addresses requirements of a wide range of end
This partnership will enable us to strengthen our footprint in India. The partnership would help us in effectively and efficiently reaching to our customers. With Kaira’s efficiency in logistics and its focus on micro distribution, we would be able to connect people and businesses – Marthesh Nagendra Country Manager – India & SAARC, NETGEAR The tie-up aims in providing an elite experience of products from NETGEAR and pan India distribution. The company would be channellizing through Bangalore and would be directly taking care of the after sales queries and support of NETGEAR products. As an exclusive distributor, Kaira will accumulate the full range of NETGEAR products, particularly its retail consumer product range. Kaira guarantees a regular availability of stocks across a broad range of consumer and corporate products. Headquartered in Singapore, Kaira plans to rapidly expand customer base in India and foster micro-distribution. SecurityLink India ■ August 2018
users from SME, Education and Government agencies to online and large format retailers. Speaking on the occasion, Manoj Attal, Director, Kaira Technologies said, “We are delighted to expand our engagement with NETGEAR. It is our endeavor to take NETGEAR’s distribution to the smallest parts of India and make their products available at a wider spectrum to its resellers and retailers. “NETGEAR is a premium brand with high performance products focused on user experience. We have a long association with NETGEAR and thus can support their growth plans with confidence.” 35
Intelligent Transport System in Ahmedabad Expanding delivery of Intelligent Transportation Systems in India
EC Technologies India together with NEC Corporation has implemented intelligent transportation management system (ITMS)/ automatic fare collection system (AFCS) for BRT system in Ahmedabad with Smart City Ahmedabad Development Limited (SCADL). NEC in consortium with nCode Solutions (A GNFC Company) was awarded this project by SCADL to improve the efficiency and effectiveness of the existing bus rapid transit (BRT) system and city bus service with the help of most advanced cutting edge global technologies with the objective of providing seamless, fast, reliable, safe and convenient public transportation system to the citizens of Ahmedabad. This is one of the many techno smart initiatives being taken by SCADL to make Ahmedabad a truly citizen friendly and world class smart city. The system for BRT is now fully operational while the service for the city buses (AMTS) is expected to be operational in the following month. BRTS and AMTS are the lifelines of Ahmedabad serving 150 thousand BRTS passengers and 600 thousand AMTS passengers
daily. This ITMS project will upgrade 230 BRT buses, 158 BRT stations, 850 AMTS buses and 11 major city bus stations. NEC has implemented many world class cutting edge technologies like automatic fare collection system (AFCS), automatic vehicle location system (AVLS), passenger information system (PIS), vehicle planning scheduling & dispatch (VPSD) and depot management system (DMS), apart from dedicated Mobile App and Web Portal for both BRT and city bus service, and also entrusted with the operations and maintenance of all these systems for next 7 years. Use of advanced ICT and cashless services in the city are the two main components of the smart city projects envisaged by the GoI. Under this new system being implemented by NEC, passengers can use smart phones and Rupay based common mobility payment smart cards for fare payment at BRT stations and inside the city buses. Automatic fare gates equipped with validators at BRT stations will ensure most convenient and foolproof access to the BRT buses for authorized commuters. Advanced GPS tracking units installed in all buses will enable the real time tracking and monitoring of all these buses from central command center. Real time PIS system installed in buses and at bus stations will provide accurate and timely information SecurityLink India ■ August 2018
regarding expected time of arrival (ETA) of next bus, announcement and display of next bus stop and many similar useful information to commuters. Other advanced systems like VPSD and DMS will help bus operation agencies to optimize their resources and assets resulting in overall operational efficiency of the public transport system in Ahmedabad. “Efficient and sustainable public transport system equipped with modern technology such as ITMS/ AFCS with cashless payment is the need of the hour in view of smart city mission of the Govt. of India. We hope that ITMS and AFCS systems implemented by NEC will make our bus operations more efficient and help us in providing world class public transport service to commuters in Ahmedabad. We have also integrated the Rupay based Janmitra card with AFC system by NEC making it convenient for commuters to travel seamlessly across BRT and AMTS buses. In future we plan to extend the reach of this card to other modes of public transport in the city like taxis and Metro as well,” said Rakesh Shankar, IAS and CEO Smart City Ahmedabad Development Ltd. “In order to satisfy growing demand, NEC will utilize its extensive experience with traffic systems, both domestically and internationally, to introduce and integrate a variety of traffic systems to comprehensively support the achievement of a safer and more accurate bus service in Ahmedabad,” said Takayuki Inaba, Managing Director, NEC Technologies India.
IP500® Smart City Solutions
Wireless, Interoperable, Smart and Secure Presented at Protocol Summit in India
n partnership with the Indian Chamber of Commerce, the global IP500® Alliance will be spearheading a number of large-scale smart city projects in New Delhi. The overarching goal of this smart city initiative is to promote the integration of IP500® building automation systems in order to simplify facility operations, in essence making smart cities even smarter. The IP500® Protocol Summit, which will take place at the Hotel Lalit Ashok in Bangalore on September 6, 2018, will highlight the benefits of the IP500® Standard as well as potential opportunities for its application in various facets of home and building automation. The IP500® Protocol Summit will bring together heavyhitters of the IoT and building automation industries as well as numerous public sector officials from India’s Smart City Mission, Ministry of Urban Development, Ministry of Information Technology, among others. The goal of this event will be to facilitate open dialogue to empower both established companies as well as startups in India to utilize IP500® technology and international standards to address global challenges. It will provide a forum for stakeholders to meet, exchange ideas, and present innovations in IoT-based building automation management and smart city applications. Moreover, participants will also be actively identifying potential business opportunities for future projects in India. The IP500 Alliance is an international industry association launched by leading manufacturers (OEMs), users, and operators. The goals of the alliance are to jointly define, develop, and provide a secure and multivendor wireless communication platform for intelligent buildings. The IP500 platform guarantees, through the application of centrally established and accepted industry norms and standards, maximum interoperability for the industry-wide cooperation of various products. The IP500 Standard is moreover, the first and only solution that fulfills the most important regulations and norms for security applications. It guarantees that devices in security and safety applications like fire and break-in prevention, or access control can communicate with each other and can be controlled over a secure wireless network. The worldwide adoption of the IP500 Standard has already been realized by representatives throughout Europe, Asia, and the USA.
Unveiled AI & Deep Learning Enabled Visual Computing Platform at IFSEC
ideonetics announced its entry into the European market by unveiling the world’s leading AI and deep learning enabled visual computing platform at the recently concluded IFSEC International in London.
(L – Dr Tinku Acharya, Founder & MD; R – Avinash Trivedi, VP – Business Development, Videonetics)
Commenting on the grand success, Dr Tinku Acharya, Founder & MD of Videonetics said, “This year was our first experience with IFSEC International. We garnered huge response throughout the three days with record high footfalls ranging from manufacturers, distributors, installers, integrators, consultants to end users. IFSEC International provided an excellent opportunity to launch our AI and deep learning enabled visual computing platform which was well received and appreciated by the consultants, end users and system integrators. We were excited to see the response and the keenness shown by them towards our platform.” Continuing to bring the indigenous innovations and technological advances to the global market, Videonetics has been setting new benchmarks in the field of security and surveillance by using their patented intellectual property.
SecurityLink India ■ August 2018
‘Secure Campuses’ Program Prama Hikvision India initiates its ‘Secure Campuses’ CSR Program through a strategic partnership with Government of Rajasthan
75 higher education institutes across the state to receive its world acclaimed CCTVs and NVRs
rama Hikvision India Pvt. Ltd. (PHIPL), a leading provider of innovative security and surveillance products and solutions, has recently introduced its ‘Secure Campuses’ program in partnership with the Government of Rajasthan. The Government of Rajasthan represented by the Commissioner of College Education and PHIPL signed an exclusive MOU (Memorandum of understanding) on 21 July, 2018 to facilitate and drive this CSR initiative forward. It is one of its biggest CSR campaigns. As per the agreement, the company has committed to give away approximately 500 CCTV cameras and 75NVRs (Network Video Recorders) to 75 higher educational institutes across Rajasthan. The youth-focused ‘Secure Campuses’ program aims to improve the security infrastructure within the college campuses along with facilitating secured surveillance to ensure security and safe environment to the students and staff.
Vinay Mishra (Extreme left), Vice President Projects, Prama Hikvision India Pvt Ltd; Ms Kiran Maheshwari (center), Higher Education Minister, Government of Rajasthan; (Fourth from Left) Ashutosh T. Pednekar, Commissioner, Higher Education Department of College Education, Government of Rajasthan; (Fifth from left) Rajendra Sharma, Additional Commissioner, Department of College Education, Government of Rajasthan
“We are happy to announce the ‘Secure Campuses’ program as a part of our CSR initiative and extremely thankful to the Rajasthan State Government for supporting us in this special initiative. Through the program, we hope to create maximum security awareness among the young students,” said Ashish P. Dhakan, MD and CEO, Prama Hikvision India Pvt. Ltd.,“Prama Hikvision India Pvt. Ltd. has a CSR vision of providing security solutions, thereby building a secured society and a safe nation. Our company has been a part of several CSR initiatives undertaken in the pastfor hospitals, charitable trusts and education institutes. This year, we decided to secure the higher education institutes in Rajasthan by offering a substantial number of video surveillance systems on non-quid-pro-quo basis to the institutes. We discussed our CSR plans with the stakeholders of various states, and were highly impressed by the Rajasthan Government’s quick response and their willingness to secure the higher education institutions in the state.” 38
SecurityLink India ■ August 2018
Recognizes Key Performing Partners of the Year
ideonetics has recently announced its key partners for their outstanding performances during 2017-18. It awarded nearly 30 of them from India for their stupendous executions of solutions and remarkable contribution towards acquiring and retaining customers. “We are honored by their excellent contributions to the growth of Videonetics and making 2017 a remarkable year for us. We truly appreciate their dedication, commitment and timely support in setting a benchmark in the industry,” said Avinash Trivedi, VP – Business Development, Videonetics, “This year, we have introduced AI and deep learning enabled visual computing platform globally. The combination of our market-leading solutions coupled with partners’ proven domain expertise will acquire more projects in government and private sectors in the coming years. The partner recognition program will be launched globally.” Powered by its patented and awarded AI and deep learning framework, Videonetics introduced powerful and enterprise class solutions including intelligent VMS, smart urban video analytics, no helmet detection, triple riding detection, automatic number plate recognition (ANPR), red light violation detection (RLVD), speed detection, video data visualization, smart dashboard, highway traffic management software, IoT video analytics, and eyewitness description system, to name a few.
Varsity Management Secured Matrix Assists Reputed Educational Institute of Hyderabad with Centralized Time-Attendance Solution
arsity Management is an innovative education system focused on learning and leadership. Varsity offers well-designed courses plans that are in sync with the state and national board curriculum. Based on the re-engineered learning patterns, these plans help teachers provide multisensory learning and develop social and thinking skills in students. Varsity Management is empowering 3,85,000+ students annually with its presence across 465+ schools pan-India. The main requirement of the organization was to bring its time-attendance under the same network umbrella. Varsity Management Pvt Ltd wanted to manage time-attendance of more than 15,000 employees at 100+ locations across India. Initially, they were using traditional
methods for attendance marking. As a result, they were facing many problems in maintaining records of the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of staff members. They required a biometric hardware solution that could precisely capture employees’ attendance. Moreover, they needed instant SMS notifications for certain events like missing in/ out punch, attendance summary etc.
atrix meticulously studied the needs of the institute along with its regional partner Vigilant Technologies. Having discussed in depth with Varsity’s team, Matrix offered its comprehensive time-attendance solution for managing and tracking staff movement from a single place. Matrix has installed 130 biometric time-attendance terminals COSEC DOOR FOT V3 whereby HR/ Admin could easily track attendance of all employees and generate different types of reports for timely salary payment. Now users are updated instantly on different events like missing in/ out punch, attendance summary etc. when it occurs.
●● Centralized monitoring and control. ●● Efficient time-attendance management. ●● Quick and easy salary calculations. ●● Improved productivity. ●● Customized reports.
SecurityLink India ■ August 2018
How to Mitigate Latency in Cloud-based Video Management Systems
atency in video management system is the delay between the time a frame is captured from the camera source and the time the same frame is displayed. Every enterprise that uses video surveillance systems aims for zero or low latency for their video feeds. This article explains common types of latency in cloud-based video management systems and ways to mitigate them. The video management software market is witnessing a significant transition from analog to IP based video surveillance. The inherent benefits of IP based video surveillance such as scalability, flexibility, ease of installation, remote access, video analytics, and cost-effectiveness are making it a viable choice among users over analog-based surveillance systems. With so much to offer, the structure of cloud-based video management software is quite complex and creates problems like latency in the video feeds, which is more prominent in wireless networks as compared to wired analog networks. Latency in video feeds affects real-time video surveillance as it can delay the reaction time towards critical events captured by the system. It not only affects the prime purpose of VMS i.e., surveillance, but it can also hamper the efficiency of the connected third-party systems. Sometimes, latency can result in loss of data in the captured videos, while in some cases, its increased frequency can make the entire VMS application unusable.
Latency in a cloud-based video management system
atency in a cloud-based video management system can be defined as the delay (in time) between the event captured by the IP cameras and its display on the system application (display monitor through web and mobile apps). It can be measured in seconds or milliseconds (ms). The latency of the entire video management system can be a collective outcome of multiple processes in the system like image capturing, encoding, video compression, decoding, video decompression and display. 40
The major contribution to the end-to-end latency in the entire VMS system is done at four stages i.e., IP cameras, transmission network, streamer servers and display systems.
IP camera latency
P cameras are intelligent devices that comprise camera sensors, video compression codecs (encoders), and builtin camera CPU. They can capture, compress and send the necessary video images to the IP network or cloud at a specified frame rate. Latency in IP cameras is due to the delay in processing the video images through the following components: IP camera sensors: IP camera sensors are the electronic devices, which convert light into electrons, or capture pixels of light to form the image. Most of the IP cameras use two types of sensors, CCD (Charged Couple Devices) and CMOS (Complementary Metal oxide Semiconductor devices) sensors. CMOS sensors are more in trend because of the features like low latency, low power usage, faster frame rates, and lower costs. Latency introduced by camera sensors is referred to as capture latency. More fps in IP cameras results in better video quality, resulting in less ‘capture latency.’ Video compression codecs: Video compression codecs are devices or algorithms for encoding digital video signals inside an IP camera. Video codecs automatically compress the video files by eliminating unnecessary or duplicate frames. There are three types of video compression codecs – H.264, MJPEG, and MPEG4, out of which H.264 is considered as the most efficient compression codec. Latency introduced in this section during the encoding of the video files is referred as compression latency. Camera CPU: The role of CPU of an IP camera is to transmit the encoded data from codecs to the network. Other than supporting to the data transmission to the network, CPU also performs important tasks like de-interlacing, noise filtering etc. When CPU keeps the tasks other than encoded
SecurityLink India ■ August 2018
video data processing on high priority, the encoded data keeps on buffering, resulting in latency. Multiple camera manufacturers have a limitation on the number of clients connected to cameras. With the increase in the number of clients, camera feed is compromised in terms of jitter, lag and video quality. Usage of a video streamer can mitigate the issue as it can take streams from multiple cameras and stream to an unlimited number of clients. So camera limitations can be mitigated by streamers since they work on high-end server machines.
etwork latency in a cloud-based video management system can be defined as the delay caused during transmission of IP video signals from IP camera to the receiverâ€™s end through the end-to-end network. Video data in cloud video surveillance has to pass through the network (Cloud architecture) comprising streaming server (live feeds), playback server (recorded feeds), cloud storage, and content delivery network (CDN), before reaching to the client side for display. In on-premise VMS systems, where video data is transferred over LAN, the network latency can be of a few milliseconds. On the other hand, in cloud-based VMS or hybrid VMS installation, where video data needs to travel across the entire cloud infrastructure via routers, switches, and servers through the internet, the network latency can be of a significant amount. Latency in a VMS system depends on the bandwidth of the network and the amount of video data produced by the IP cameras for transferring (in bitrate). Allowing extra bandwidth capacity to the network can help in accommodating higher bitrate loads through video data traffic. Usage of H.264 codecs can also help in reducing the average bitrate of the data, which can help in reducing the network latency. More bandwidth in the network and good connection speed (with higher bitrate) can help in accommodating more data from the IP cameras to process through the network, resulting in reduced latency.
processing introduces latency from milliseconds to a second depending upon the software optimization achieved in streaming services and computing potential of the hardware. One possible way to mitigate these delays is by using hardware acceleration.
t the receivers end, the cloud-based video management system receives compressed video data, which is then unpacked, ordered, decoded and displayed on the system screen (computer, mobile, tab etc). The latency of video data in the process of decompression and display is dependent on the video resolution, frame rate, software decoders and configuration of the system (processor, RAM, graphics cards etc). The monitor device refresh rates and operating systems also play a crucial role in controlling the display latency of the system. Though it may be difficult to achieve zero latency in a video management system, it can definitely be reduced to the minimum by installing efficient sub-systems compatible and rightly placed in an optimized VMS environment structure. Enterprises aspiring for high performing VMS with minimum latency issues must consult with their VMS service providers and systems integrators while selecting hardware and software components for each section of their video management system i.e., IP cameras, network, streamers and display systems. eInfochips offers micro-services and multi-tenant federated architecture based video management solutions that help address the issues of latency in video feeds by running applications independently and supporting sub-systems of VMS architecture. Our solutions ensure that all the applications of VMS are scalable, compatible, and efficient to meet the real-time as well as offline video surveillance needs.
Streamer server latency
treaming services on the cloud generally receive feeds from cameras, and process these feeds to be transmitted to various viewing clients with multiple requirements in resolutions, codecs, bit rates etc. For such operations, these servers receive streams, decode, scale and encode into various codecs and then transmit to viewing clients. This
By Anshul Saxena Senior Executive, Corporate Marketing eInfochips
SecurityLink India â– August 2018
A Look Inside the Rising Role of it in Physical Access Control Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day operations By Vishwanath Kulkarni – Director of Sales, Physical Access Control - India and SAARC, HID Global
hile physical security professionals have suspected a shift toward increased involvement of the IT department in physical access control, recent research has shown this to be true. A survey conducted by The 05 Group of more than 1,500 IT managers, directors and staff, as well as chief information and chief technology officers, found that IT departments are now more involved than ever in an organization’s physical access control decisions and implementation.
IT departments are now more involved than ever in an organization’s physical access control decisions and implementation According to the survey, more than half (55%) of respondents reported IT as primarily responsible or having shared responsibility for access control within their organization. As a result, IT leaders are tasked with spearheading not only the protection of their company’s network, and cybersecurity related initiatives, but also those set forth by the physical security department to protect employees, visitors and assets from internal and external threats. Similarly, the 42
IT department will increasingly play a role in physical security to influence technology decisions (76%) through the integration of access control within the ecosystem (72%), by implementing access control technology (59%), and through the management of access control systems (39%). Along with the added responsibility to help implement security solutions alongside IT-related projects, IT leaders are also increasingly responsible for making budget decisions within physical security. According to the survey, more than 85% of respondents reported that IT was involved in making decisions regarding physical access control technology investments. “The numbers speak to a trend we’ve seen over the last several years as access control solutions and physical security solutions move from a predominantly siloed approach to a more collaborative method of management,” said Luc Merredew, Product Marketing Director, HID Global, “Ques-
SecurityLink India ■ August 2018
tions of connectivity, cloud-based vs. on-premise hosting, and capital investment vs. operating expense are common in this organizational environment.” The purpose of the survey was to gain insight into the relationship between an organization’s physical security and IT departments, how the two work together and how investments in new technology are made. In this paper, we explore these results and how they can be applied in the increasingly collaborative world of today’s organizations.
Physical access control responsibility rapidly shifting to IT
hile 67% of respondents reported having a dedicated physical security person, department or team in place, the majority of respondents (55%) reported that IT was at least partially responsible for physical access control within the organization. In fact, 26% reported that IT was primarily responsible, and 29% said that IT and the physical security departments shared responsibility. What this means is that since IT and physical security are starting to share responsibility, they also are beginning to share purchasing decisions and resources, including budgets. Of the respondents who answered that IT is not yet involved in physical access control, 36% reported that IT will play a role within the next year to five years. This indicates a fundamental shift in how organizations manage physical security. “This result shows the growth of collaboration between IT and physical security departments, necessitating improved relationships between the two entities,” said Merredew, “This is a pretty significant change in the way physical security has operated historically as a department that is able to make decisions unilaterally. Collaboration is no
longer a recommendation, it is a requirement for organizational security.” Going further, when the results are broken down by company size, larger companies (more than 1,000 employees) are more likely to have both IT and physical security share the responsibility for physical access control (36%). Smaller companies report IT having an even greater role in physical access control, with 37% of respondents reporting that IT has sole responsibility versus 14% of companies with more than 1,000 employees. As this fundamental shift takes place across organizations, many leaders are tasked with building or strengthening relationships between departments. This means incorporating best practices for communication, as well as establishing an emphasis on the influence of creating a holistic security approach with regard to decision-making. In this approach, the emphasis is on the entire breadth of a security solution, not just access control’s potential to be the weakest link in an otherwise sophisticated network security strategy. According to the survey, 76% of respondents said that IT will influence technology decisions as a result of the collaboration between the two departments; while 72% said IT will play a role in integrating access control into the overall ecosystem of the organization. Close to 60% said IT will be responsible for the implementation of access control technology across the enterprise, while 39% said IT will need to manage the access control system put in place. While this seems to be a relatively new phenomenon, of those who reported that IT and physical security shared responsibilities, 34% said that it has always been this way, while 39% said the change occurred within the last five
SecurityLink India ■ August 2018
years. For those who reported that IT owns this responsibility, 29% reported that this shift took place within the last five years. Many of these organizations have learned how to better understand the challenges each department faces with regard to security – whether it’s protecting people and critical assets, or protecting the information being transmitted within an organization – both of which are important to the overall organization.
Research shows it absorbing budgets for physical security
owhere is this shift as critical than in the process of setting budgets and allocating money for capital investments in IT and physical security infrastructure. As the role of IT expands, so does the portion of the budget this department controls, making it imperative for open communication about an organization’s security needs. Almost 44% of participants reported that both IT and physical security shared investment decisions related to physical access control, while 41% reported that IT is the primary decision-maker on these investments. Where the money is coming from is also in line with this reasoning, with 40% reporting that physical access control investments come from the IT department’s budget, while another 37% said that they come from both IT and physical security funds. This shift is logical, as physical access control systems become more and more involved with larger network and cyber security strategies. With this increasing interdependence comes the framework for establishing physical access control de44
vices on par with other connected hardware and software platforms. Legacy access control systems that do not place a premium on the latest security protocols should be replaced immediately in an effort to protect an organization’s overall security posture. “Physical access control systems cannot be the weakest link in overall organizational security. Without proper IT-centric oversight, they risk being just that,” said Merredew, “The results of this survey are clear that across the board, today’s organizations must treat physical security with the same focus and diligence exercised on IT networks. The good news is that many organizations recognize this and are evolving to meet this need.” However, the comfort levels of the IT department can be problematic when tasked with making decisions. Only 27% of respondents claimed to be ‘very comfortable’ with making decisions regarding physical access control systems, while 38% reported feeling ‘comfortable’ with making these decisions. This seems to indicate that while the decisions are shifting, there is still work to do in educating these individuals on the merits of various systems and solutions on the market. This demonstrates an opportunity for physical security teams to collaborate and showcase their experience to IT leaders when purchasing decisions are made and solutions are implemented. For many organizations, investments in cameras and card systems are looked at in the vein of longevity. However, as technology evolves and vulnerabilities are publicly revealed, it becomes imperative that physical security equipment be
SecurityLink India ■ August 2018
IT is primarily responsible or share updated on a cycle equivalent to that of IT. As such, physical access control systems should continually be updated as needs change and threats evolve.
Addressing the pain points of today’s access control systems
cross the board, respondents in both large (>1,000) and smaller companies (<1,000 employees) reported similar pain points related to their current access control solutions, with 50% reporting that lack of integration with IT systems topped their list. Another 26% reported that their access control solutions are difficult to troubleshoot or are prone to failures; 23% said that reporting is difficult or nonexistent; 20% reported that their system is outdated; and another 20% said the systems are not convenient for IT.
responsibility for access control within their organization. As a result, IT leaders are tasked with spearheading not only the protection of their company’s network and cybersecurity related initiatives, but also those set forth by the physical security department to protect employees, visitors and assets from internal and external threats Regardless of size, the results show the importance of developing a stronger relationship and shared training initiatives between the two departments to streamline and better understand the synergy between IT and physical access control. IT must also make the effort to become more familiar and comfortable with physical access control systems in order to better serve the goals of the organization.
It’s important to note that as this shift to IT takes place, the research shows there are still challenges that this department faces when managing physical access control systems. Almost 39% of respondents claim they are ‘comfortable’ with the individual features within their access control system, while only 16% are ‘very comfortable.’ Similarly, only 34% are ‘comfortable’ troubleshooting issues or failures, while only 17% are ‘very comfortable’ with the task. This leaves room for leaders within physical security, as well as vendors and integrators, to increase the level of training and education offered when a new access control solution is implemented within an organization.
Emerging technology and the features that make access control cohesive with IT
ritical to the success of a modern physical access control solution is the ability to prevent unauthorized individuals from accessing network-related hardware, while also presenting security directors with the ability to easily add options for emerging technology such as mobile devices or biometrics. More than 68% of respondents agreed, saying one of the main feature requirements in a new solution is the ability to add or support new technologies in the future.
SecurityLink India ■ August 2018
tions to have more flexibility in deciding which form factors are best for their unique access control needs.
Ease of use is another critical component, with 71% of respondents naming this as a requirement of a new physical access control system. Ease of use saves time, efforts and resources across departments, allowing for increased focus on higher-priority projects. Other requirements listed by respondents included integration with existing security platforms (54%), support for more advanced and higher security features (53%), open standards-based technology for easy integration (52%), and high-quality warranty and extended support services (46%). These answers support the argument that IT leaders want technology that is more easily integrated with existing and incoming solutions. This is also an indication of the need for organizations to be able to scale accordingly; the older the technology, the less likely it is to be able to integrate with existing security solutions and align with networking needs. Today’s organizations must invest in solutions that meet the requirements of IT and physical security leaders. More than 58% of respondents named mobile access as one of the features that they most require in a new physical access control system, indicating a shift toward mobility and flexibility for incoming solutions. ‘Mobile access’ includes the use of smartphones, tablets and/ or wearables for access control. This also indicates an increasing acceptance of mobile credentials for access control, which allows organiza46
oday’s organizations must be more collaborative internally than ever, especially within the realm of security. Physical access control decisions and responsibilities are seeing a fundamental shift toward the IT department, requiring both departments to better work together to achieve true security across the enterprise. It is clear the shift toward the collaboration between IT and physical security departments are resulting in a more unified approach to security, which results in a more united front to combat incoming problems. As a result, IT professionals need to rely on physical security teams for their expertise and support when implementing new technology, while physical security teams must do the same with regard to IT-centric decisions. Additionally, it is critical for physical security teams to demonstrate their value to the overall security posture of the organization. By focusing on the collaboration between the two departments, physical security teams can retain control over their budgets and investment decisions, as well as the ability to prioritize the safety and security of the organization. Similar to the threats today’s organizations face, the needs of these organizations are constantly changing leading companies of all sizes to the realization that physical access control solutions must fall in line with the standards that the IT department sets forth to protect assets and people. As new technology is introduced into the ecosystem of an organization, it’s imperative that close collaboration between physical security and IT departments continue to grow and thrive to meet and exceed the expectations of safety and security.
SecurityLink India ■ August 2018
SecurityLink India â– August 2018
application/ case study
Streamlining Fire and Safety System for
Iconic Manhattan Skyscraper R
AEL Automatic Sprinkler Company, an 85 year old fire protection provider, and integrator Automated Decision have deployed HID Trusted Tag® Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitize, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system. “HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now,” said David Israel, President, RAEL Automatic Sprinkler Company, “We plan to deploy it in other noteworthy buildings, and we’re exploring using it for other missioncritical equipment we inspect and repair as well.” HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones
and other devices can then be used for innovative use cases, without compromising the privacy of end users. The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair. Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. “Proof of presence was critical for us,” said Israel, “As property managers are now expected to deliver a much higher level of compliance reporting.” The solution also logs the user, tap time, and date into the Automated Decisions work order management platform. Mobile online access provides inspectors SecurityLink India ■ August 2018
with service request maintenance records, sprinkler part specifications, diagrams and photographs. “That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses,” said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global, “Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected.” In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved firsttime fix rates and fewer repeat visits.
application/ case study
New Meets Old in Suzhou Bosch provides state-of-the-art security to ultra-modern, multi-use complex in China
he venerable city of Suzhou, just west of Shanghai, is famed as a Venice of the Far East with canals, bridges, formal gardens and classical architecture. But in keeping with its modern, bustling population of nearly 11 million, the city has added some avant-garde. One of the newest showpieces is the ultra-modern Suzhou Center, a 1.1 million square meters waterfront complex of shopping malls, office buildings, residential towers and a sumptuous hotel. The Center, opened in November 2017, ambitiously aims to become one of China’s top international business hubs. How fitting, then, that the Center’s security system is also avant-garde. It comes from Bosch, and it provides video surveillance, intrusion alarm, access control and public address systems.
ver 3,200 Bosch HD cameras secure every aspect of Suzhou Center, covering the full range of operational security needs from surveillance to tracking. High-level surveillance is ensured through fixed DINION and FLEXIDOME IP cameras as well as AUTODOME IP pan, tilt and zoom (PTZ) cameras. In addition to its surveillance functions, the AUTODOME IP dynamic 7000HD cameras feature intelligent object tracking allowing security personnel to track moving targets automatically. If an object is detected, the camera’s intel-
ligent tracking feature is triggered based on a predefined alarm rule or manually by a simple click. Once it is activated, it ensures uninterrupted tracking of moving objects. Intelligent video analytics embedded in the AUTODOME IP cameras can trigger alarms automatically when a pre-defined alarm rule (e.g., a person crossing a line) is met, alerting guards and identifying potential security issues. Eight Bosch video management systems (BVMS) integrate all 3,200 FLEXIDOME, DINION and AUTODOME IP cameras for central management by the main control center.
ntrusion detection is managed by seven DS7400 intrusion panels that have over 200 sensors. Each of these can be SecurityLink India ■ August 2018
programmed for up to eight areas by local keypad or remotely. Access control is handled by two installations of Bosch’s Access Professional Edition (APE). APE controls doors, making sure only authorized personal can enter restricted areas. It also exchanges information regarding door control and door status with the other security systems.
Listen to it
or public address and evacuation instruction, Bosch has supplied a PRAESIDEO system with over 5,000 ceiling and cabinet speakers that are broken into over 80 zones and managed from two control centers. Thanks to its superb sound quality, the PRAESIDEO system also provides background music in the public areas of the Suzhou Center. 49
application/ case study
Delivering Total Security for West Africa’s Leading Oil & Gas Company T
otal Ghana, a leading oil and gas company with over 200 service stations in Ghana, needed round-theclock security not only for its premises based in Accra but also for its many service stations and their workers. Total is dedicated to delivering quality petroleum products and serving its customers in innovative ways. This means Total’s consumer operations involve a concentration of vehicle and pedestrian activity with people fuelling vehicles and moving between the retail outlets. This leads to complex security and safety challenges and keeping track of it all is not possible without an effective security system. The company wanted to automate the monitoring of its operations to ensure compliance with the safety procedures. Total turned to Steehold, a security solutions provider in Ghana renowned
for protecting companies across industries including financial services, mining, petrochemicals and telecommunications. Steehold was tasked with not only installing a new security system but also ongoing security monitoring and management across Total’s operations in Ghana. “Petrol stations operate day and night so video cameras need to provide excellent imagery in variable lighting conditions and we need to monitor areas both inside and outside. If cameras lack certain features, then the images they record may be insufficient for analysis, or for use as evidence, should it be required. Steehold knew how to combat these issues while also providing an effective monitoring tool for operational efficiency and worker safety,” said Samuel Tawiah, Executive Director, Steehold, “Steehold needed a video sur-
SecurityLink India ■ August 2018
veillance system that would cover Total’s premises and service stations from all directions and it knew exactly which solution would meet Total’s needs. We chose Hikvision as we knew its video cameras were grounded in innovation and quality, providing the best video footage in the widest range of conditions to help Total’s business.”
ollowing extensive consultation with Total staff, the final design of the surveillance solution comprised 120 Hikvision IP cameras to enable high quality 24/7 surveillance across Total’s premises and its new service stations in Ghana. The Hikvision EasyIP 3.0 cameras feature a wealth of innovative technologies to combat low-light, bright-light and extreme weather conditions, while still providing superlative image quality. The cameras also include capabilities such as object tracking, line crossing, intrusion detection and motion detection, with the ability to trigger alerts and make security staff immediately aware of any suspicious behaviour. At the heart of the solution lies Hikvision’s NVRs which store up to 12 terabytes of recorded footage from all cameras. While Total wanted to upgrade to an IP system, but it had already invested heavily in CCTV cameras and so wanted to retain the cameras that were functioning well. Steehold installed Hikvision’s video encoders which convert the exist-
application/ case study
ing cameras’ analog signals into digital. These encoders are connected to the NVR, and the system treats them like the other IP cameras. Steehold used PoE (Power-over-Ethernet) whereby power and data are supplied over a single Ethernet cable, making installation much easier because they don’t have to be located next to a plug socket.
Security covering all angles
otal is already reaping the benefits of the deployments. “The deployment of Hikvision’s innovative technology into our surveillance solution for Total has proven essential for our security operators to detect intrusion, theft and damage across Total’s operations. With crystal clear images day and night as well as advanced features that alert security operators of any suspicious behaviour, we are confident we can help Total respond quickly to any breaches,” said Mr. Tawiah.
Watchful IP eyes for operational safety
ikvision’s video surveillance system also helps Steehold operators to remotely monitor processes across Total’s premises, enabling supervisors to enhance processes to improve workflow and ensure the safety of workers. “At Total, the safety of employees is of utmost importance. Data from Steehold generated by Hikvision’s video surveillance system plays an integral role in helping us keep our employees safe and our operations compliant with safety policies. It provides a definitive way to ensure safety policies are being followed and that there are no hazards presenting a harmful threat to our employees,” said Total executive.
Looking to the future
ikvision’s security cameras deliver a live and recorded view of the facility which is accessible 24/7 and has helped ensure safety protocols are followed. For example, it has significantly increased employee compliance with PPE (Personal Protective Equipment) rules at Total’s sites resulting in a direct and immediate improvement in safety. Easy installation and integration with Total’s existing CCTV enabled Steehold to deliver a cost effective, efficient, high-end video surveillance solution, and it is planning to use Hikvision’s cutting-edge video monitoring systems as part of its security and emergency response solutions for its other customers, helping them minimize security threats and maximize operational safety and efficiency.
Adding an Outdoor Curtain PIR on an IP CCTV System O
ptex recently moved their (Europe) office, which provided the technical team with the opportunity to design and install a security system to protect both their office and warehouse. The system is a combination of access control, IP intrusion detection and CCTV system. Their technical colleagues planned the location of the long range outdoor PIRs and the laser sensors all around the building and identified one small, narrow area at the back of the building that would not be cov-
ered by the detection area of the long range sensors. The most effective solution for this narrow area was their new outdoor curtain PIR, the BX Shield. In order to add the BX Shield onto the IP security system, the team connected the sensor to their IP module PIE-1. The optional back-box for the wired BXShield modules proved to be the perfect dimensions to fit the PiE-1. Adding the PiE-1 onto the BX-Shield sensors, allows the sensor to be integrated with all VMS platforms that have integrated OPTEX Redwall Event code. Being able to connect their short-range outdoor sensors such as the BX Shield into the rest of IP system enabled the team to create a complete security solution tailored to the specific layout of the site.
SecurityLink India ■ August 2018
application/ case study
Securing & Revitalizing ‘The District’ Detroit Ilitch Holdings, Inc. selects a complete security and critical communications solution to enhance community safety
litch Holdings, Inc. has selected Motorola Solutions and Avigilon Corporation, a Motorola Solutions company, to help enhance customer experience and safety at its landmark properties in Detroit. Ilitch sought to reinvigorate its home city, Detroit, by investing in public infrastructure and local businesses, and by promoting public safety in and
rate Security for Ilitch Holdings, Inc., “We chose Avigilon and Motorola Solutions because together they provide us with a unique system for public safety that allows us to monitor, communicate and respond more effectively.” “The District Detroit is making an incredible impact on the city of Detroit by attracting new visitors from throughout the region where they can take part in this immersive sports and entertainment experience,” said James Henderson, Avigilon’s President and Chief Operating Officer, “This project is an excellent example of how Avigilon and Motorola Solutions’ technologies work together to provide a new level of public MSI and Avigilon’s complete security and critical communications solution selected safety.” to enhance safety in downtown Detroit Little Caesars Arena and Comerica around its state-of-the-art Little Caesars Comerica Park and Fox Theater. When Park are U.S. Department of Homeland Arena, Comerica Park, offices and re- a suspicious activity is flagged using Security SAFETY Act certified. As part tailers throughout ‘The District’ Detroit, the Avigilon solution, security staff can of the Homeland Security Act of 2002, a $1.4B sports and entertainment desti- quickly contact each other using MO- the Support Anti-Terrorism by FosterTOTRBO radios and take immediate ing Effective Technologies Act (SAFEnation located in downtown Detroit. Ilitch in partnership with secu- action to keep visitors to The District TY) encourages the creation and use of rity integrator Identify, Inc., installed Detroit safe. anti-terrorism technologies and practic“We’re proud to see downtown De- es. To enhance fan experience and safea complete Avigilon security solution powered by video analytics that in- troit thriving and our top priority is to ty, as well as to comply with SAFETY cludes more than 1,600 Avigilon cam- create a safe and welcoming environ- Act certification, Ilitch Holdings, Inc. eras, Avigilon Control Center (ACC) ment for our guests and local communi- selected Avigilon for its SAFETY Act video management software and Avig- ty,” said Tim Sopha, Director of Corpo- designated technologies. 52
ilon’s Access Control Manager (ACM) system. The complete solution enables security operators to quickly detect, search and verify critical events to save valuable time and effort during investigations. It uses Motorola Solutions’ MOTOTRBO™ professional two-way radios to communicate across its properties including Little Caesars Arena,
SecurityLink India ■ August 2018
application/ case study
Enhancing VMS user Experience with Two-Camera Immersive Surveillance & a Camera for Eye-level Viewing of Crowded Locations
elco™ by Schneider Electric, has recently made two announcements that improve the user experience for video surveillance operators by enhancing visibility of events and enabling faster response.
Feature-packed VideoXpert software release with enhanced panomersive viewing
elco’s VideoXpert video management system, version 2.5 (VX v2.5), is packed with numerous new capabilities including enhanced ‘Panomersive’ immersive context viewing when using Pelco’s Optera camera with Pelco Camera-Link technology and a Pelco ‘Enhanced’ series pan tilt zoom (PTZ) camera. This new feature allows system users to automatically and seamlessly shift from the panoramic view of Optera to a targeted subject or object within the same view using a nearby Pelco PTZ camera. “Combining immersive cameras with PTZs has been attempted by competitors in the past, but our ability to easily link separate Optera and PTZ cameras provides security directors with a great deal of flexibility in how they design their system while potentially saving money by using previously deployed cameras,” said Robert Beliles, Chief Marketing Officer, Pelco, “The operator simply clicks on the panoramic view in Optera, and the PTZ instantly moves to the same spot. This combination of immersive context viewing combined with PTZ detail and tracking at distance allows operators to spend less time locating the object or person of interest, and more time recording their movements.” VideoXpert v2.5 is one of the larger releases in terms of long sought-after features in a video management system (VMS). VX v2.5 delivers a new Rules Engine User Interface and a new flexible Monitor Wall enhancement to make the creation of any size monitor wall and the ability to send events to any specific monitor quickly and easily.
Beliles concluded, “Several features in the VX v2.5 release significantly advance Pelco’s efforts to drive relevant and contextual video where and when it’s needed, enabling impactful responses as well as effective automation. New analytics overlays in the VX v2.5 Ops center client allows operators to easily view and then export relevant video footage with the same analytics overlays to law enforcement far more efficiently than what is available in the market today.”
Pelco expands camera portfolio with the wall-mounted fisheye Evolution 180 panoramic camera
elco also announced the release of a new camera, the Evolution 180, which provides a dewarped view without blind spots to capture the areas of greatest interest, making it ideal for crowded areas like banks, hotels, malls, schools and eateries, as well as hospital and clinic waiting rooms. Typically, ceiling-mounted fisheye cameras present less detail on faces and objects that are situated at the periphery of the camera’s field of view, or captures the tops of subjects’ heads when located directly below the camera. Available in indoor and outdoor versions, the wall mounted Pelco Evolution 180 with true day and night capability is built by Oncam and is specifically designed to deliver a high-definition panoramic view, including a detailed eye-level view of people and vehicles. “In contrast to conventional fisheye panoramic cameras that waste pixels on low interest views of ceilings and floors, the Evolution 180 focuses on areas of interest while providing 12 percent more pixels per foot and minimizing storage and bandwidth requirements. Thus, the Evolution 180 is an affordable solution that further helps price-sensitive customers,” said Kevin Saldanha, Principal Product Manager for the Evolution 180.
SecurityLink India ■ August 2018
application/ case study
Visual Data Chooses StorNext-Powered NAS Managing 4K Workflows Post-production house gains competitive edge with cost-effective scalability for performance and capacity
isual Data Media Services (VDMS), one of the largest media processing, distribution, and localization service companies in the world, has deployed Xcellis Scale-out NAS to manage 4K transcoding workflows, high bit-depth film scanning, and support the heavy data rate required for high dynamic range (HDR) mastering.
Powered by Quantum’s StorNext high-performance file system, the Xcellis Scale-out NAS system supports multiple simultaneous 4K and UHD scanning and mastering operations, optimizing the workflow for VDMS and reducing the time to market. In addition, the solution’s advanced data management features have enabled the Visual Data team to increase capacity by six times – without increasing staff. The ability to scale performance and capacity independently will also allow Visual Data to grow its system to meet expanding and emerging needs without forklift upgrades. 54
4K workflows drive technology infrastructure upgrade
n innovative content preparation, distribution and localization company with branches in Los Angeles and London, Visual Data had been successfully providing end-to-end digital supply chain services, film scanning and media
asset management for a wide range of international customers, including preparing content for distribution across the world’s premier broadcast channels and digital platforms. However, with the number of 4K and UHD projects increasing, the company found that its existing NAS infrastructure was too slow to handle the kind of volume they were seeing. The Visual Data team realized it needed to upgrade its workflow engine including finding a way to remaster film content faster and more efficiently and to take advantage of a major new opportunity created by the company’s innovative approach to restoration. RemasterSecurityLink India ■ August 2018
ing older programs in HD and 4K posed a challenge – often with no cut negative to scan, the only way to get old features and TV shows to HD or 4K is to perform a match-back – scanning the original dailies, manually eye matching the images used in the final cut and then conforming the original in the new format. The team wanted a solution that could double capacity and deliver the performance to support multiple 4K and UHD operations at the same time. “We have revolutionized the process for restoring old Movies and TV shows,” explained Steve Spear, Visual Data’s Senior Vice President of Operations, “What used to take weeks, we are able to get done in just a few hours, and the process is much more economical, making more library content accessible for our clients’ sales teams to go out and sell. For it to work we had to have a storage and processing environment that could support this new workflow.”
StorNext-powered solution chosen for flexibility, performance
isual Data began its search with ten vendors and narrowed the field down to three finalists, comparing them on such key factors as performance, scalability, security, manageability, technical support and cost effectiveness. The team ultimately chose to work with integrator and technology solutions partner Diversified, and selected a configuration consist-
application/ case study
ing of an Xcellis Workflow Director running StorNext software, Quantum QXS RAID arrays, a fibre channel fabric and an Xcellis workflow extender to provide access to the files over the company LAN. Amy Lounsbury, Senior Account Manager at Diversified noted, “Diversified’s specialists within the Media Workflow Group presented the Quantum Xcellis platform based on its flexibility and performance characteristics as a true high-performance, hybrid storage solution. We were just as excited as the team at Visual Data to see the full potential of the new Quantum solution.”
“On the performance side, our tests showed that the Quantum system did everything that we needed and more,” Spear said, “With StorNext-powered Xcellis, we could run 4K scanning, UHD transcoding and a 4K playback all simultaneously, and everything worked perfectly without a single dropped frame.” “The Xcellis scalability was also a real advantage for us,” continued Spear, “It enabled us to increase performance and storage capacity independently – which means we’ll be able to grow to meet future demands while avoiding a complete system overhaul.”
Lowest overall cost
n overall economics, the Quantum solution was the clear leader. It gave the team the option of using fibre channel for some clients, while using Quantum’s distributed LAN Client (DLC) for others. DLC combines Ethernet connectivity with block-based transfer that outperforms NFS and SMB to boost performance and keep costs low. “Quantum’s cost-per-TB beat everybody, and the system’s flexibility will help us keep costs low going forward,” said Spear.
Boosts Security and Efficiency At Cherokee Nation Entertainment Casinos
an video analytics impact both security and the bottom line at a major entertainment facility? The newest customer story from Agent Vi looks at the video analytics deployment at Cherokee Nation Entertainment (CNE), where CNE casinos and hotels are utilizing Agent Vi’s advanced video analytics software for surveillance as well as operational efficiencies. CNE sought to reduce the time it took to review security footage, so their investigative team could remain focused on proactive tasks, and selected savVi, Agent Vi’s on-premise video analytics solution for its wide range of video analytics capabilities. Previously, the security team’s time was heavily occupied by observing hours of footage in search of a specific
person or incident. Following implementation, Agent Vi enabled CNE to run searches automatically, reducing search time from as much as 16 hours for a single search to a matter of minutes. Joshua Anderson, CNE Director of Surveillance and Technology said, “It was savVi’s swift and effective video search that caught Cherokee Nation SecurityLink India ■ August 2018
Entertainment’s attention when searching for an enhanced security solution, in particular due to the automated query ability. We have been extremely impressed with savVi’s capabilities and the quality of its performance, and fully expect savVi to increase efficiencies and provide true ROI which will have a major impact on the bottom line.” 55
application/ case study
Critical Infrastructure & Government GSOCs Drive
IPSecurityCenter™ V5.7 PSIM
NL Software, has recently released IPSecurityCenter™ V5.7, which includes many feature enhancements that increase performance and reduce operational response times in large-scale, multi-sited and mission critical deployments of IPSecurityCenter. These improvements also benefit those in the transportation, corporate security and public safety markets. With over a decade of development IPSecurityCenter leads the Global Security Operations Center (GSOC) market for PSIM with its flexibility, features, performance and sophistication. This latest release improves CNL Software’s unique ability to manage across multiple SOCs & GSOCs, keeping in the entire operation in harmony using enterprise wide visualization to support the overall security mission for critical infrastructure and large-scale
government homeland security programs. “We continue to invest heavily in developing the features that customers, partners and industry leaders inspire us to create,” commented Simon Knightley, CTO at CNL Software, “We listen to our customers and understand what is important to them. Their ideas help us innovate new ways to support them in making the GSOC a faster and more effective hub for all mission critical security and life safety related activity. They want their control rooms to see more, act faster and collaborate better throughout the whole organization, which we help them to achieve using IPSecurityCenter V5.7.” The V5.7 release differentiates CNL Software from other PSIM vendors and establishes IPSecurityCenter as the first choice PSIM solution for large scale, Government security
SecurityLink India ■ August 2018
programs, critical infrastructure and facilities protection. Some of the main enhancements within the release include: ●● More scalable for larger deployments: Enhancements support greater control over large scale federated solutions, driving tightly managed GSOC operations. ●● Faster and more responsive: Improvements include faster access to historic alarm data with fewer clicks and rapid access to video from remote locations. ●● Support for 64-bit video: Ensuring IPSecurityCenter leverages the latest developments in video technology and multi-thread processing for faster and more scalable solutions. ●● General Data Protection Regulation (GDPR) ready security platform: Enhancements ensure that IPSecurityCenter is ready for the most demanding compliance processes, with security features such as two-factor authentication to ensure there are no unauthorized changes to the system. ●● Improved decision support: Developments include new visually stunning interactive dashboards that allow operators to access key performance indicators in real time using customizable device that can highlight alarm, human, and machine data.
application/ case study
ACT365 in Action Keeping students safe while they study
CT365 is a complete access control and video management solution. Access control and video management are key security systems and ACT365 creates a unified integrated system, delivering a force that gives users far greater visibility and control of their assets. Ease of use and convenience are key ingredients to the productâ€™s strength and depth in the field. Critically, it allows end-users the ability to manage their systems remotely, including viewing live cameras. It is this remote monitoring capability that makes ACT365 ideal for multiple sectors.
Study Abroad University in London that hosts students from the USA wanted a security system to protect their student accommodation. The university wanted a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. ACT365 produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely.
If an incident should arise in the student accommodation, ACT365 links events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely and footage can be used in evidence.
ampus security can provide pin codes, access fobs, and cards to students. These credentials can be easily enabled or disabled remotely if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard.
SecurityLink India â– August 2018
application/ case study
PopSockets Get a Grip on Facility Security with Pure Mobile Credentials
opSockets manufactures phone grips and accessories, better known as ‘Little Life Changers.’ The company’s flagship product, the PopSockets grip, was invented in 2012 by David Barnett, with the first one sold in 2014. A simple item that people never knew they needed, the PopSocket grip is a stylish phone accessory that offers a secure grip for texting with one hand, snapping better photos, and stopping phone drops. These Little Life Changers have made big waves in the market, and their appeal to all ages and demographics has created an explosion in their business in the last few years. With a home office in the foothills of Boulder, Colorado and a growing staff, the safety and security of its employees ‘popped’ to the top of their priority list.
s PopSockets’ business and employee count grew over the years, they expanded into a larger office space and needed to secure their facility to ensure the safety of their employees. PopSockets wanted to restrict
facility access to employees in their corporate office in Colorado. Employees used keys to gain access to the building so tracking and restricting access manually with over 100 employees and the number increasing daily was a huge challenge that was becoming too costly. In addition, when an employee was let go or dismissed, there was a security risk and all doors had to be rekeyed. Another big issue was staying in compliance with their retail partners such as Walmart or Target who required that strict data and physical security measures were in place. It was important that the company passed their operational audit that was conducted annually.
mplementing an access control system would provide the ability to protect their facility, restrict access to specific areas and simply remove access when an employee was let go from a single software interface. PopSockets wanted to control access to six doors, five external doors and one interior suite door. The interior door would be restricted to just the finance, HR and IT departments and the external doors would be available to all employees. 58
SecurityLink India ■ August 2018
application/ case study
The management team wanted an access control system that could be managed remotely from any device allowing access to the system from anywhere at any time.
PopSockets opens the door to a safer environment for employees
fter looking around at various access control companies, ISONAS’S Pure IP™ access control system was selected by PopSockets based on lower costs, ease of use, and convenience for their employees and business. The ISONAS access control platform provides a systems approach by offering network connected hardware and a cloud-based software to secure facilities and a mobile credential to grant access. The edge based reader-controller eliminates the need for control panels and only requires a category 5 cable to provide power and data to the device. This drives a simpler installation and lower cost platform with flexibility to scale in the future. Pure Access Cloud, the ISONAS cloud-based software, fit perfectly with the PopSockets IT philosophy of being a SaaS based company. There is no on-premise server required, and no additional staff needed to maintain the IT infrastructure. With a cloud-based platform, PopSockets could focus on their business and leave the IT security in the cloud to ISONAS. In addition, the web-based application allows staff to manage access control from home with real-time access to control their facility. ISONAS worked together with their certified integrator partner, Interface
Communications to ensure that the installation was completed within two days. “ISONAS has brought a level of comfort and safety to all our employees by knowing that the building is secure – we now know who is in the building at all times,” states Mike Henning, Director of Information & Technology at PopSockets, “The installation process was fast and trouble free thanks to the team at Interface Communications & ISONAS.” The ISONAS mobile credential, Pure Mobile, offered convenience to their staff by allowing employees to enter the building with their mobile phone. There was no need to install additional software or purchase additional licenses to enroll mobile credentials, which reduced costs significantly for PopSockets. The RC-04 reader controller hardware and Pure Access software are ready to use with the ISONAS Pure Mobile credentials right out of the box; making it the right access control solution for the company. Moving forward, an employee at PopSockets can simply download the Pure Mobile application to their phone, present it to a reader-controller, and with the proper credentials can enter the building. With a complete access control system allowing for remote management and administration, PopSockets was now ready to complete their internal audit and meet the security requirements set by their high-profile retail partners. In addition, employees could now work after hours with complete peace of mind.
SecurityLink India ■ August 2018
application/ case study
London Borough Proof of Concept Success For 360 Vision’s New Invictus Camera
nvictus, the latest ruggedised PTZ camera from leading UK CCTV manufacturer 360 Vision Technology, has been installed against a tight deadline to cover a major public event in a north London Borough.
ered, installed and commissioned within four weeks. “We like the authoritative appearance of the new Invictus camera, similar in style to 360 Vision’s Predator camera, but unlike imported speed domes that
Specified for installation by DSSL Group, the new high-performance 360 Vision Technology Invictus cameras were installed in record time, to complete the upgrade of the London Borough’s public safety camera system, to play a continuing role in the borough’s mix of public safety measures. Talking about the new town centre installation, Aaron Stephens, Director at DSSL Group commented, “From the initial decision to specify Invictus cameras for the borough’s High Street and surrounding areas, all 22 Invictus units in the first phase were deliv-
look less public safety and more commercial, Invictus looks very much the part in the town centre streets. Versus the use of domes on swan necks that inherently introduce a visual blind spot, In-
SecurityLink India ■ August 2018
victus uses an upright mount to provide unhindered 360-degree coverage. In addition and again unlike a dome camera, Invictus can look both up and down. “As highlighted in the Proof of Concept trial, the cameras’ excellent depth of autofocus is quite superb, with crystal clear focus across the entire image frame. This performance attribute is great for post event retrieval of recorded footage, where it will be used to assist the local authority in maximising their incident analysis and prosecutional evidence. It was also great to work with a respected UK manufacturer who provided on the ground technical support to help ensure the smooth delivery of this local authority project. From the superb operational results, we’d recommend Invictus to any other local authorities looking to upgrade their systems to the latest HD camera technology.” Discussing the integration of cameras to the system’s new Genetec video management software platform, DSSL Group’s commissioning engineer, Jordon Stephens, commented, “Adding the Invictus cameras as an ONVIF 2.4 Profile S compliant device to the Genetec Security Control Centre was extremely simple. In my experience, this process isn’t always straight forward, so the Invictus gets 10 out of 10 for easy ONVIF setup!” Jordon went on to explain, “The cameras’ pre-set factory default night-time settings are ideal for effective colour video at night.
application/ case study
Invictus copes incredibly well with the town centre’s mix of lighting conditions and shadow areas, providing excellent ‘colour at night’ imaging – whereas in the same locations, other existing HD cameras on the system had switched to monochrome.” Commenting on the installation, Adrian Kirk, Director of Strategic Accounts at 360 Vision Technology enthused, “We are proud that the new Invictus ruggedized PTZ camera was selected for such an important town centre project and especially as the cameras were commissioned in time to provide security and safety surveillance coverage for the major public event. Manufacturing CCTV cameras in the UK since 2002, this installation marks the introduction of 360 Vision’s next generation ultra-low light imaging technology – featuring incredibly detailed night-time HD quality colour images. “In addition, we couldn’t have asked for a better installation to showcase Invictus. DSSL Group’s attention to detail is phenomenal; they clearly take great pride in their workmanship. From the way they have contained the cable, through to the layout, neatness and set-up of system equipment, including the column equipment cabinets, the engineering team at DSSL Group really deserve great credit for their professionalism. “Celebrating the great men and women of the British Armed Forces, for each Invictus camera sold and including those installed in this installation, 360 Vision Technology is donating a contribution to the help the Heroes charity.”
Automated Fare Collection for Public Transportation with
Calypso Light Application Certified Solution H
ID is one of the world’s first ticketing solution providers to be certified to deliver more secure, lower cost, faster contactless tickets based on an open standard called Calypso Light Application (CLAP). Public transportation authorities around the world no longer need to accept lower security, incompatibility, and slower speeds or be locked into a proprietary low-end ticket system. HID’s CLAP-certified solution, SOMA Atlas, is now recognized by the Calypso Networks Association (CNA) as providing interoperability and greater flexibility to transportation operators. “HID Global is bringing a new level of trust to low-cost contactless tickets for public transportation by supporting an open standard that will overtake the proprietary memory cards commonly used for low-end tickets such as single trip tickets,” said Cesare Paciello, Vice President, Ticketing and Transport with HID Global, “Being the first ticket provider in the world to achieve Calypso Light Application certification positions HID strongly to lead the way to enable mid-sized and smaller public transportation networks to do next-generation automated fare collection.” Recognized widely and deployed in many countries for secure, fast and flexible ticketing, Calypso is an open standard of contactless ticketing, suitable for multiple applications, especially public transportation in which Calypso cards and NFC mobile phones are used. To extend the success of the Calypso standard and help solve the incompatibility of low-cost tickets, a worldwide group of transport operators in the Calypso Networks Association, a not-for-profit standards body, ratified a set of specifications for the Calypso Light Application standard. CLAP tickets have the same security as high-end tickets such as sports season tickets, but at a lower cost than typical Calypso tickets. CLAP is also simple to deploy because, unlike proprietary memory cards, the use of CLAP tickets does not require development work to be integrated into an automated fare collection (AFC) system. To become the first ticketing solution provider to receive the CLAP certification, HID had to pass the technical evaluation that was conducted by Elitt, a CNA-accredited laboratory. HID has been working with Calypso technology since 2014, resulting in the development of the SOMA Atlas, an OS architecture that combines the multi-application capabilities of the KIAT® operating system with the Calypso 3.1 standard. HID achieved its first Calypso certification in July 2016 with SOMA Atlas V1, which proved to be one of the fastest products of its kind. As the next logical step in its evolution of an open standards-based approach, HID’s ticketing and transportation team in Italy developed the CLAP-certified SOMA Atlas OS architecture to broaden the customer acceptance of more secure ticketing by small to mid-sized transportation operators. Known as the ticketing solution provider that delivered millions of tickets for the 2018 FIFA World Cup™, HID provides end-to-end ticketing solutions including transportation ticketing terminals, data capturing software, key management capabilities, RFID paper tickets, smart card tokens, smart wristbands, among other components. Its multi-application operating systems can be integrated with existing hardware. SecurityLink India ■ August 2018
application/ case study
Key to Successful use of
Smartphones in Access Control N
edap announces significant new possibilities in the MACE platform to seamlessly fit it into the technical and organizational environment of clients. MACE is used to send and revoke virtual access control cards to smartphones in any security or parking application. The announced expansion and enhancement of the mobile access control platform offer unlimited potential for integration and effective use. “MACE already offered a great deal of functionality to security managers that were looking to store virtual access control cards on a smartphone. With MACE, it is very easy for administrators to distribute and revoke those virtual cards; and for users it is very easy to gain access. This functionality is improved even further with additional features related to credential management and communication with users,” says Maarten Mijwaart, General Manager of Nedap Identification
Systems, “In addition, clients now can build the functionality into their own access control system and they can create their own custom apps. It is our belief that these new features make MACE the platform of choice for any organization that is looking for a solution to empower its users with the ability to use the smartphone as a key.”
Improved credential management and user communication
he newly announced features of the MACE platform for improved credential management and user communication include: ●● The new MACE App SDK that is used to develop a MACE compatible app with custom look and feel, and potential integration with client specific functionality. ●● The MACE REST API that is used to exchange commands between
SecurityLink India ■ August 2018
the cloud based MACE Admin Portal and third party access control systems. Access control administrators now can send and revoke virtual access cards to their users from within the application that they are used to. ●● The MACE Admin Portal that offers additional possibilities to automate the process of allocating and revoking virtual cards and the communication related to that. ●● The newest version of the MACE Apps for Google Android phones and Apple iPhones that offer enhanced BLE performance and additional security features.
Leading in mobile access control
he number of companies offering mobile access control is increasing. What makes Nedap’s MACE leading in mobile access control is that the platform truly matches the clients’ demands. Not only do the new features enable a seamless integration into any access control or parking management system, they also complement their processes. With the introduction of the MACE platform, Nedap responds to the global shift of smartphone credentials replacing physical cards. MACE can be used in combination with any access control system or any other system that requires the swift identification of people such as building or parking management systems.
application/ case study
For Exhibiting and more information please contact : Jay Sheth: email@example.com / +91 9967971606 I Eshita Sharma / firstname.lastname@example.org / +91 9818805922 Supported By
SecurityLink India â– August 2018
NIST Builds Statistical Foundation for NextGeneration Forensic DNA Profiling N
IST scientists have published statistical data needed for forensic DNA profiling based on a technology called Next Generation Sequencing. To do that, they sequenced forensic DNA markers for a sample population. The letters A, G, T, and C represent the building blocks of DNA. DNA is often considered the most reliable form of forensic evidence, and this reputation is based on the way DNA experts use statistics. When they compare the DNA left at a crime scene with the DNA of a suspect, experts generate statistics that describe how closely those DNA samples match. A jury can then take those match statistics into account when deciding guilt or innocence. These match statistics are reliable because they’re based on rigorous scientific research. However, that research only applies to DNA fingerprints, also called DNA profiles, that have been generated using current technology. Now, scientists at the National Institute of Standards and Technology (NIST) have laid the statistical foundation for calculating match statistics when using Next Generation Sequencing, or NGS, which produces DNA profiles that can be more useful in solving some crimes. This research, which was jointly funded by NIST and the FBI, was published in Forensic Science International: Genetics.
“If you’re working criminal cases, you need to be able to generate match statistics,” said Katherine Gettings, the NIST biologist who led the study, “The data we’ve published will make it possible for labs that use NGS to generate those statistics.”
How to create a dna profile
o generate a DNA profile, forensic labs analyze sections of DNA, called genetic markers, where the genetic code repeats itself, like a word typed over and over again. Those sections are called short tandem repeats, or STRs, and the number of repeats at each marker varies from person to person. The analyst doesn’t actually read the genetic sequence inside those markers, but just counts the number of repeats at each one. That yields a series of numbers that, like a long social security number, can be used to identify a person. STR-based profiling was developed in the 1990s, when genetic sequencing was hugely expensive. Today, NGS makes sequencing cost-effective for biomedical research and other applications. NGS can also be used to create forensic DNA profiles that, unlike traditional STR profiles, include the actual genetic sequence inside the markers. That provides a lot more data. That extra data might not be needed because in most cases, STR-based profiles contain more than enough information to reliably identify a suspect. However, if the evidence contains only a minute amount of DNA, or if the DNA has been exposed to the elements and has begun to break down, then the analyst might only get a partial profile, which may not be enough to identify a suspect. In those cases, the extra data in an NGS-based profile might help solve the case. In addition, evidence that contains
SecurityLink India ■ August 2018
a mixture of DNA from several people can be difficult to interpret. The extra data in NGS-based profiles can help in those cases as well.
Calculating match statistics
NA analysts are able to calculate match statistics for STR-based profiles because scientists have measured how frequently different versions of the markers occur in the population. With those frequencies, one can calculate the chances of randomly encountering a particular DNA profile, just as he can calculate the chances of picking all the right numbers in a lottery. NIST measured those STR gene frequencies years ago using a library of DNA samples from 1,036 individuals. To calculate gene frequencies for NGSbased profiles, Gettings and her co-authors cracked open the freezer that contained the original samples, which were anonymized and donated by people who consented to their DNA being used for research. The scientists generated NGS-based profiles for them by sequencing 27 markers – the core set of 20 included in most DNA profiles in the U.S. plus seven others. They then calculated the frequencies for the various genetic sequences found at each marker. It might be surprising that scientists can estimate gene frequencies from such a small library of samples. However, the NIST team was measuring frequencies not for the full profiles, but for the individual markers. Since they sequenced 27 markers, with each marker occurring twice per sample, the number of markers tested wasn’t 1,036, but more than 55,000. Although NIST has now published the data needed to generate match statistics for NGS-based profiles, other hurdles must still be cleared before the new technology sees widespread use in forensics. For instance, labs will have to develop ways to manage the greater amounts of data produced by NGS. They will also have to implement operating procedures and quality controls for the new technology. “Still, while much work remains,” said Peter Vallone, the Research Chemist who leads NIST’s Forensic Genetics Research, “We’re laying the foundation for the future.”
More than 2.5 Billion Records Stolen or Compromised in 2017 Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal threats were the fastest growing security risks for companies
emalto has recently released the latest findings of the Breach Level Index, revealing that 2.6 billion records were stolen, lost or exposed worldwide in 2017, an 88% increase from 2016. While data breach incidents decreased by 11%, 2017 was the first year publicly disclosed breaches surpassed more than two billion compromised data records since the Breach Level Index began tracking data breaches in 2013. Over the past five years, nearly 10 billion records have been lost, stolen or exposed, with an average of five million records compromised every day. Of the 1,765 data breach incidents in 2017, identity theft represented the leading type of data breach, accounting for 69% of all data breaches. Malicious outsiders remained the number one cybersecurity threat last year at 72% of all breach incidents. Companies in the healthcare, financial services and retail sectors were the primary targets for breaches last year. However, government and educational institutions were not immune to cyber risks in 2017, making up 22% of all breaches. The Breach Level Index serves as a global database that tracks and analyzes data breaches, the type of data compromised and how it was accessed, lost or stolen. Based on data breach reports collected in the Breach Level Index, the major 2017 highlights include: ●● Human error a major risk management and security issue: Accidental loss, comprising improper disposal of records, misconfigured databases and other unintended security issues, caused 1.9 billion records to be exposed. A dramatic 580% increase in the number of compromised records from 2016. ●● Identity theft is still the number one type of data breach: Identity theft was 69% of all data breach incidents. Over 600 million records were impacted resulting in a 73% increase from 2016.
SecurityLink India ■ August 2018
breached data in 2017. The second most prevalent type of breach was access to financial data (16%). The number of lost, stolen or compromised records increased the most for nuisance type of data breaches (560%) which constituted 61% of all compromised data. Account access and existential type breaches decreased both in incidents and records from 2016. ●● Internal threats are increasing: The number of malicious insider incidents decreased slightly. However, the amount of records stolen increased to 30 million, a 117% increase from 2016. ●● What a nuisance: The number of records breached in nuisance type attacks increased by 560% from 2016. The Breach Level Index defines a data breach as a nuisance when the compromised data includes basic information such as name, address and/ or phone number. The larger ramification of this type of breach is often unknown, as hackers use this data to orchestrate other attacks. “The manipulation of data or data integrity attacks pose an arguably more unknown threat for organizations to combat than simple data theft, as it can allow hackers to alter anything from sales numbers to intellectual property. By nature, data integrity breaches are often difficult to identify and in many cases, where this type of attack has occurred, we have yet to see the real impact,” said Jason Hart, Vice President and Chief Technology Officer for Data Protection at Gemalto, “In the event that the confidentiality, or privacy of the data is breached, an organization must have controls such as encryption, key management and user access management, in place to ensure that integrity of the data isn’t tampered with and it can still be trusted. Regardless of any concerns around manipulation, these controls would protect the data in situ and render it useless the moment it’s stolen.”
Data breaches by type
dentity theft was the leading type of data breach, accounting for 69% of all incidents constituting 26% of
Data breaches by industry
n 2017, the industries that experienced the largest number of data breach incidents were healthcare (27%), financial services (12%), education (11%) and government (11%). In terms of the amount of records lost, stolen or compromised, the most targeted sectors were government (18%), financial services (9.1%) and technology (16%).
Data breaches by source
alicious outsiders were the leading source of data breaches, accounting for 72% of breaches, however making up only 23% of all compromised data. While accidental loss was the cause of 18% of data breaches, it accounted for 76% of all compromised records, an increase of 580% from 2016. Malicious insider breaches were 9% of the total number of incidents, however, this breach source experienced a dramatic increase (117%) in the number of compromised or stolen records from 2016. “Companies can mitigate the risks surrounding a breach through a ‘security by design’ approach, building in security protocols and architecture at the beginning,” said Jason Hart, Vice President and Chief Technology Officer for Data Protection at Gemalto, “This will be especially important, considering in 2018 new government regulations like Europe’s General Data Protection Regulation (GDPR) and the Australian Privacy Act (APA) go into effect. These regulations require companies to adapt a new mindset towards security, protecting not only their sensitive data but the privacy of the customer data they store or manage.”
SecurityLink India ■ August 2018
2018. September 19, 20 & 21 BOMBAY EXHIBITION CENTRE - MUMBAI, INDIA
Unique plaorm with unparalleled business & networking oppounity for professionals involved in the Safety and Security Industry
www.capex.co.in / www.future-cities.in For space booking, panership, delegate registration and speaking oppounities: Vijay +91 98 3377 2109 / email@example.com Nikita +91 98 1910 7179 / firstname.lastname@example.org *Future Cities is the mega event that will present for the first time in India a 360 degree vision of the built environment: Municipalika - 15th edition of Sma & Sustainable Urban Solutions CAPEx - Innovative Building Materials & Technologies IIPM - India's first and the only B2B event for the real-estate sector SecurityLink India â– August 2018
Life Safety is a Right not a Privilege How FIREX International 2018 Formed Part of the Answer
ver 18,000 visitors representing a 12% increase on the 2017 event, and more than 140 exhibitors – 70 of which were new to this year, came together from 29 countries at FIREX International to drive and reflect on the life safety landscape in the UK. For three days at ExCeL London, fire safety professionals accessed over 10,000+ life safety solutions held to the highest standards. Amidst the present national agenda regarding fire safety in the built environment – with a particular emphasis on social housing – FIREX was the dedicated platform for engaging with leading experts, exploring proven technologies and receiving essential guidance. Gerry Dunphy, Brand Director of FIREX International explained, “It is reflective of the times we’re in that a full-fledged fire safety event is resonating so deeply with the market, and we’re pleased to see an increase in life safety professionals engaging with the event. The show’s growth is a testament to the industry’s demand for change. Both visitor and exhibitor sentiment reflected the criticality of FIREX, and the conversations held on the show floor speak volumes for the way in which FIREX is changing perceptions around life safety being a right, not a privilege.” Sales Engineer at Specialist Wiring Accessories explained, “The first 68
two days were probably the busiest days that I’ve ever known at any exhibition. It’s brought forward an extremely good quality of contacts and enquiries.” The show also welcomed the 5th International Tall Building Fire Safety Conference, exclusive to FIREX, in addition to an in-depth seminar programme across the Expertise & Guidance Theatre, sponsored by BAFE, and the FPA Infozone. A particular highlight of the seminar programme included Dr Chris Cocking’s talk ‘Human Behaviour During an Emergency.’ This hugely popular seminar, presented at the FPA Infozone, provided insight into the rarity of mass panic, and indicated that there is very little evidence to suggest that people panic if they are made aware of the threat; which means that information should not be withheld. His analysis was paired with a tangible solution to provide vital information about what’s going on, what the threat is and what they need to do to escape it. New to FIREX International 2018 were ‘show me how’ demonstrations in the brand new Sprinkler Zone. These addressed the fire safety concerns keeping visitors up at night by not only offering the latest solutions and technology, but showing how to use them. There were also live smoke demonstrations by GERDA, showing the crucial role of SecurityLink India ■ August 2018
fire doorsets in passive fire protection. With a newly introduced fire challenge, the 20th anniversary of the Engineers of Tomorrow competition saw fire apprentices compete in live installation challenges. The Inspirational Speaker Series also drew massive crowds as the show welcomed a fantastic line-up of world class speakers including comedian and mental health expert Ruby Wax OBE, English rugby legend Sir Clive Woodward OBE and Nicky Moffat CBE, formerly the British Army’s highest-ranking female officer. Jeremy Rees, Acting CEO, ExCeL London commented, “We were delighted to welcome FIREX to ExCeL London. Our teams are working closely with UBM to support their ambitions for growth and we are delighted that they had another successful event with us. This event, together with the wider P&M series, is playing a vital role in maintaining and creating safe and secure environments, something that resonates strongly with us. We look forward to welcoming visitors and exhibitors again next year, when they will be able to travel to ExCeL more quickly than ever before via the Elizabeth line.” FIREX International 2019 takes place from 18-20 June 2019 at ExCeL London.
Arrests and Seizures in Worldwide Operations
harmaceuticals, food, vehicle parts, tobacco products, clothing and agro-chemicals are among tonnes of fake goods seized in INTERPOL-led operations across four continents. Coordinated by INTERPOL between March and May 2018 in 36 countries across Africa, Asia, the Middle East and South America, operations sought to dismantle factories and supply chains behind a wide range of counterfeit goods and the organized crime networks directing them. With 645 suspects identified or arrested so far, and more than 1,300 inquiries launched, further arrests and prosecutions are foreseen as ongoing investigations unfold.
Global seizures worth USD 25 million
nvolving officers from a range of law enforcement agencies, customs and health regulatory bodies, operations triggered raids at shops, markets, chemists, retail outlets, warehouses and border control points. Global seizures include 7.2 million counterfeit, and illicit items weighing more than 120 tonnes and 90,000 litres of liquids. Beyond product seizures, national authorities have identified major trade routes and shut down points of sale as well as laboratories.
Crucial global police support from INTERPOL
hroughout operations, involved countries were able to check infor-
mation against INTERPOL’s criminal databases via its I-24/7 secure global police communications network. Coordinated by INTERPOL’s Illicit Goods and Global Health unit with support from the regional bureaus in Buenos Aires, Abidjan and Harare, the operations were made possible by the INTERPOL Foundation for a Safer World which helps raise funds globally to tackle the critical issues shaping the global security landscape. “By attacking the distribution networks, and by disrupting production at the source, participating countries have contributed towards globally protecting people from potentially unsafe goods, and made them safer by dismantling illegal networks which are often connected to other forms of serious crime,” said Tim Morris, “INTERPOL’s Executive Director of Police Services, “The sheer volume of seizures and follow-up investigations generated by these simultaneous global operations are testimony to the fundamental role of INTERPOL in shaping a coordinated response in regional and international operations : it is all about collaboration.”
A truly global exercise
perations were conducted across Africa (with two operations codenamed ‘Afya’ and ‘Heera II’), Asia (‘Rainfall’), South America (‘Jupiter IX’) and the Middle East and North Africa (‘Qanoon’). More than three million packets of cigarettes and cigars were seized across SecurityLink India ■ August 2018
South America during Operation Jupiter, along with 9.5 tonnes of food products, tens of thousands of fashion accessories, alcoholic drinks, school supplies and more than 35,000 litres of smuggled fuel. During Africa’s Operation Afya, Botswana police authorities arrested a man smuggling 2,500 counterfeit brand shoes, jackets, and handbags across the border with South Africa. In the Namibian capital, authorities seized 14,000 items of counterfeit goods. In Dar es Salaam, Tanzania’s Food and Drug Administration seized USD 8,300-worth of counterfeit medical products including antibiotics, antimalarial tablets, Ferrous Sulphate and analgesics. Zimbabwe police seized 5,700 tablets of counterfeit pharmaceuticals and 250kg of skin lotions smuggled from Zambia. In Western Africa, Operation Heera II saw the identification of smuggling transit routes including one where a counterfeit brand of antalgic tablet was being distributed to western African countries by road after importation to Benin, Ghana and Togo seaports. At Niger’s Makalondi Border Crossing Point, police intercepted 29 tonnes of counterfeit medicines in two trucks thought to be travelling from Ghana. Three suspects were arrested and investigations are ongoing. In Ghana and Cote d’Ivoire, authorities closed down 10 chemists and one illicit manufacturing facility and arrested 11 suspects. Across the Middle East and North 69
Africa, Operation Qanoon saw authorities in Saudi Arabia detect, investigate and shut down 100 social media accounts used to distribute counterfeit medical products and unlicensed cosmetics and herbal products. Mauritania seized tens of thousands of counterfeit medical products including
antihistamines, corticosteroids, antibiotics, antimalarial tablets, analgesics, pregnancy tests, and vitamin supplements. At Jordan’s Aqaba seaport, authorities seized a container from India containing 500,000 pills of antalgic pills bound for Iraq. In Asia, Operation Rainfall saw
Nepalese police seize 5,399 doses of opioid analgesics in a vehicle thought to have travelled from India. Laotian Customs, Food and Drug Department worked with Thai national police at the Lao-Thai Friendship Bridge, seizing 25 kg of illegal traditional medicines.
Certification for Cybersecure Business Practices M
arch Networks®, a global provider of intelligent video solutions, is one of the first companies in Canada to become Cyber Essentials Canada certified, designating it as a cybersecure business. Developed as part of the United Kingdom’s National Cyber Security Programme, the Cyber Essentials certification is awarded to organizations able to demonstrate good cybersecurity practices and an ability to mitigate risks from Internet-based threats in areas including firewalls, routers and other boundary security devices; Internet-connected email, web and application servers; desktop PCs and laptops; and cloud, Internet and other service providers. In addition to helping organizations identify the required controls believed to shield companies from most common Internet threats, the Cyber Essentials Canada toolset is an important asset for end user organizations eager to monitor and protect their supply chain. The certification is a further affirmation of March Networks’ holistic approach to security, which involves a 360° view of all aspects of its business – from product development and source code management, to operational processes and customer data privacy. For example, the company operates a secure network operations center, conducts background checks on employees working with product code, and has participated in extensive security audits with Fortune 500 customers. It also takes a proactive, transparent approach to identifying potential vulnerabilities in its products. March Networks’ Security Updates and Advisories program involves regularly tracking US-CERT reports, conducting in-depth investigations when required, and quickly alerting customers and partners to any necessary software updates via email alerts and information posted directly on the March Networks website. “As the video solutions provider of choice for many of the world’s enterprise organizations, including leading banks and credit unions, March Networks has always taken a responsible approach to our security policies and practices,” said Peter Strom, President and CEO, March Networks, “Achieving this Cyber Essentials certification, which is already well recognized in the U.K., provides our customers with yet another assurance of our cybersecure standards.” Cyber Essentials was created in collaboration with industry partners in the United Kingdom (U.K.) including the Information Security Forum (ISF), and the British Standards Institution (BSI), and is endorsed by the U.K. Government. CyberNB, a special operating agency of Opportunities New Brunswick, recently brought the program to Canada, where it is expected to be a major requirement to win business in both public and private sectors in the future. “Business today is largely conducted online, and every organization has a critical responsibility to protect its business data,” said Stephen Lund, CEO of Opportunities New Brunswick, “We are delighted to extend this certification to March Networks, in recognition of the security controls and best practices the company has in place within its IT systems to address cybersecurity effectively and mitigate Internet-based threats.” 70
SecurityLink India ■ August 2018
Lighting the Future
Dahua Charity Program for Children Strives On
he widely quoted motto ‘With great power comes great responsibility’ has been held dear and put into practice for years by Dahua Technology, and with that in mind, it deepened its corporate social responsibility (CSR) program ‘Lighting the Future,’ which aims to help children who suffer from sickness or poverty in terms of education.
Part of Dahua Technology’s donation to Long Xiang Elementary School & the thank you letter
Caring for kids with Autism
he ‘Lighting the Future’ program understands that charity is not only about material donations. Sometimes it also requires very personal participation and care, especially in the case of children with Autism. Behind every child who is suffering from autism, there is usually a stressful struggling family. The pain stems not only from the financial aspects but also more importantly from the mind and heart. These children undergo unimaginable pain in silence and most definitely need as much help from as many people as possible. Dahua Technology has recently organized a team of over 20 employees to visit the Carnation Recovery Center for Children, a facility that specializes in helping kids with Autism. They brought with them dozens of LeChange Baby Monitors, as well as many carefully picked books and toys as gifts for the children. More importantly, the employees were prepared to devote their time, love and patience for the children. They decorated the center to evoke a mood of Christmas and interacted with the children. Everyone had a great time and felt needed by each other. These kids did not need anything, but understanding.
Donation to schools for the children of migrant workers
ong Xiang Elementary School, located in the rural area of Bengbu City, Anhui Province, is a typical example
Dahua team decorated the Carnation Recovery Center and played games with the kids
Computers Dahua Technology donated to Hangzhou Binjiang Binhong school & the thank you letter
of a school that is established for the left behind children under harsh predicaments and very limited funding. Dahua Technology decided to reach out with a helping hand via its ‘Lighting the Future’ program and provided the school with school supplies and security products. They donated an entire set of video surveillance equipment, consisting of 103 items in total, across 20 categories. These include various types of cameras, monitors as well as hard disks. Later, Dahua Technology further donated 42 computers and 40 monitors to the school, which could not only be used for an educational curriculum that is in synchronization with schools in big cities, but also for treasured video communication with their working parents far away. Dahua Technology also donated 28 sets of computers to Hangzhou Binjiang Binhong School located in the Binjiang District of Hangzhou. ‘Lighting the Future’ is a charitable program that Dahua Technology keeps running. The flame of future can only be ignited if the children have the proper education, communication and protection that they deserve. For years Dahua Technology has been trying to deliver a safer society and smarter living, a future that should not leave anyone behind.
SecurityLink India ■ August 2018
Tackling Future Policing Challenges with AI, Robotics T
he latest robots, virtual communication tools and facial recognition software were recently on display at the INTERPOL Global Complex for Innovation, as experts from different sectors gathered to consider practical applications of these new technologies for law enforcement. Technological advances in the fields of artificial intelligence and robotics – from facial recognition to ‘future casting’ technology – can have many implications for police worldwide, both positive and negative. In the hands of criminals, these technologies can pose digital and physical threats, while at the same time these tools offer new opportunities to police in combating crime. The first global meeting to examine the opportunities and risks of AI and robotics for law enforcement was organized by INTERPOL’s Innovation Centre and the United Nations Interregional Crime and Justice Research Institute (UNICRI), through its Centre for Artificial Intelligence and Robotics. The two-day (11 and 12 July) conference brought together some 50 participants from law enforcement in 13 countries and partners from the private sector and academia to exchange expertise on the latest developments in the fields of AI and robotics, un72
derstand how they can be used by the law enforcement to support their activities, and gain insight on potential challenges. Discussions on ways that police could adopt these emerging solutions looked at the use of AI for conducting virtual autopsies; crime prediction systems to support police to optimize resources; behaviour detection tools; techniques to autonomously research, analyse and respond to international mutual legal assistance requests; blockchain-based traceability approaches that respect privacy; and autonomous patrol vehicles. The participants also considered ethical challenges such innovations could present to police such as ensuring AI is fair, explainable and transparent and balancing the need for security with the right to privacy. They underlined the need to have further discussions on ethics and privacy, and a call was made for a follow-up meeting on this topic. “Innovation is not a matter for police alone. Strong partnerships between all stakeholders with expertise is necessary to ensure police can quickly adapt to future challenges and formulate inventive solutions,” said Anita Hazenberg, Director of INTERPOL’s Innovation Centre. Several private sector companies SecurityLink India ■ August 2018
gave live demonstrations of virtual communications, facial recognition, and incident prediction and response optimization systems to provide their law enforcement counterparts a better understanding of how such technologies work and could benefit the policing community. Police forces which are already using innovative technologies such as the Singapore Police Force’s patrolling robots, to assist their daily work shared their experiences during the conference. “I believe that we are taking critical first steps to build a platform for ‘future-proofing’ law enforcement,” said Irakli Beridze of the UNICRI Centre for Artificial Intelligence and Robotics. “Initiatives such as this will help us prepare for potential future types of crime and capitalize on technological advancements to develop new and effective tools for law enforcement,” he concluded. Building upon the issues discussed during the conference, INTERPOL are exploring whether the many examples presented could be part of the Interpol Police Technology and Innovation Radar. INTERPOL will also hold a drone expert forum in August to further assist police in understanding how drones can at the same time be a tool, a threat and a source of evidence.
Hermes 900 StarLiner
New Unmanned Aircraft Capable of Operating in Civilian Airspace
lbit Systems commences global marketing of the Hermes™ 900 StarLiner, a powerful and trend setting Medium Altitude Long Endurance (MALE) Unmanned Aircraft System (UAS) that features adverse weather capabilities and is fully compliant with NATO’s Standardization Agreement (STANAG) 4671, qualifying it to be safely integrated into civilian airspace and fly in the same environment with manned aircraft. Concluding an extensive year-long flying schedule, the Hermes 900 StarLiner has been performing civil aviation authority certified flights in Masada National Park, Israel. Aseries of the Hermes 900 StarLiner (known as Hermes 900 HFE in the Swiss program) is currently being assembled for the Swiss Armed Forces and is scheduled to be delivered and integrated into Switzerland NAS during 2019. Security events such as the dismantling of ISIS and diverse geo-political tensions have caused European countries to re-orient defense efforts from involvement in far-away conflicts to coping with intensifying homeland and border secu-
rity challenges. This shift has resulted in a growing demand for advanced yet mature UAS that can be safely integrated into civilian airspace and provide the technological capabilities that are required to effectively and safely perform complex homeland and border security missions. Drawing on the legacy of the widely operational Hermes 900 and Hermes 450 and their proven technologies, Elbit Systems has conducted an extensive multiyear R&D effort focusing on producing a mature UAS that complies with civilian airspace regulations and can be safely integrated into European NAS. Meeting the strict safety and certification requirements of non-segregated airspace regulations required all the components of Hermes 900 StarLiner to be designed in full compliance with STANAG 4671, and to incorporate the most advanced aviation technologies including cooperative and non-cooperative detect & avoid systems, train avoidance warning system, automatic take-off
SecurityLink India ■ August 2018
and landing in near zero visibility, redundant broad bandwidth line-of-sight (LOS) and beyond line-of-sight (BLOS) data link, and adverse weather capabilities such as de-icing and direct lightning strike sustainment. These technological enhancements allow the aircraft to operate in both visual and instrument meteorological conditions, and its powerful heavy fuel engine provides improved climb rate, extended endurance and higher ceiling and maximum speed. Elad Aharonson, Executive Vice President and General Manager of Elbit Systems ISTAR Division, commented,” “Anticipating the rising security need for operating unmanned aircraft in the same environment with civilian manned aircraft enabled us to achieve this breakthrough. We are committed to maintain our approach of technological innovation based on an extensive operational experience and provide our customers with advanced yet mature systems that enhance effectiveness and safety when coping with the evolving national security needs”. 73
Online VMS Training Course On-demand platform makes learning simple and convenient
icon Industries, a leading designer and producer of security surveillance solutions, announced today that training and certification for its Valerus video management system is now available as a convenient online course. Following the same curriculum as Vicon’s popular in-person training program, the new online class provides in-depth instruction on all aspects of Valerus, from setup and programming to operational capabilities and special features. Course work includes hands-on learning and exercises that make use of the actual Valerus software. In addition, participants are encouraged to connect to any standard ONVIF compliant camera to simulate the most realistic user experience. The new online, on-demand format allows participants to schedule classes at their convenience, log-in from a location of their choice and learn at their own pace. The Valerus course is offered in two versions; both cover the same material. The Valerus Certification Course is recommended for installing dealers. It takes approximately 10-12 hours to complete, including required testing, and must be completed within 60 days after starting the session. The Valerus Basic Course does not include any exams, has no time limit for completion and does not confer ‘certified’ status. The Basic course is intended for end-users and others seeking a greater understanding of the Valerus platform. Unlike the certification course, there is no fee for the Basic version. “Vicon’s commitment to customer training has always been model for the industry, and we are proud to offer the same level of quality in our new online Valerus Training Course. We believe that the most positive customer experiences begin with thorough training and a full appreciation of what our system can deliver,” said Bret McGowan, Senior V.P. of Sales and Marketing. 74
Announces Winners from Open Source Spotlight Challenge O
NVIF®, the leading global standardization initiative for IP-based physical security products, has announced the winner of the first ever ONVIF Open Source Spotlight Challenge. The winning app, CAM X, submitted by Canada-based developer Liqiao Ying, offers an artificial intelligence-based object detection system that utilizes blockchain solutions for storing information obtained from ONVIF cameras. The two-month online challenge, offered in conjunction with Be My App, offered lucrative cash prizes for developers who use the protocol provided by ONVIF to create open source mobile or desktop applications for advanced video streaming. The submissions were required to be compatible with the latest release candidate, Profile T, which supports both H.264 and H.265 video compression standards. Developers connected to online prototype cameras with Profile T functionality from Axis Communications, Bosch Security and Safety Systems, Dahua Technology, Hikvision and Uniview for the challenge. “The purpose of the challenge was to solicit creative, open source ideas from outside the ONVIF organization and from outside the industry, helping to expand our perspective,” said Hans Busch, Chairman, ONVIF Technical Committee, “We are excited about the diversity of approaches that were employed amongst different submissions and the possibilities that exist for further development of the apps for future use by ONVIF.” In all, 37 submissions were judged on innovation, viability of implementation, functionality, and whether the app is easy to navigate and use. Seven finalists received $800 each, while first, second and third place earned $3,000, $2,500, and $2,000, respectively. All of the finalist app submissions, including second place winner RPOS Open Source Camera and third place winner Open Camera, will be viewable on onvif.org.
SecurityLink India ■ August 2018
Expansion Continues with New IoT Connecting Living Tech Customers in Iceland and New Zealand IoT leader inks agreements with Oryggismidstodin, Iceland and Securely, NZ for Home Control & Senior Care
ssence, a leading global provider of innovative connected living solutions, has continued to expand its worldwide presence by signing agreements with Oryggismidstodin Iceland and Securely of New Zealand for Essence’s flagship technologies – WeR@Home and Care@Home. The Iceland and New Zealand agreements further reinforce Essence’s business expansion, joining distributors, resellers, and white-label companies in the United States, Australia, Denmark, Italy, and Vietnam, among other countries. Essence focuses on creating highly sophisticated technologies that directly drive improvements in quality of life. WeR@Home is a fully integrated IoT connected living solution that offers a comprehensive security and safety system and full home management from anywhere, on any screen. It is compatible with Google Assistant, Nest products, Yale Lock and August Smart Lock, as well as a multitude of other Z-Wave compatible devices. Care@Home is an aging-in-place senior-care solution that leverages award-winning AI tech. Essence creates an ecosystem of excellence for its partners, from hardware and software to service and support. All Essence technologies come with complete, cloud-based front- and back-end systems to streamline the integration and adoption process of home-based IoT services. Remote security management with user apps and a complete cloud
management system have plugand-play connections to service providers’ existing systems, accelerating time to market. Oryggi, a leading security service provider in Iceland for homes and small businesses, wanted to upgrade its services and product portfolio by introducing interactivity and smart home capabilities. After evaluating several solutions, it found the WeR@Home platform is the best option due to its easy installation and simple and intuitive mobile app. “We were looking for a new generation of security system, with smart home options and user-friendly apps at an affordable price for regular users,” said Audur Lilja, Executive Director of Sales at Oryggismidstodin Iceland, “Only reliable and field-proven products that will increase loyalty and revenues while keeping costs down would do. That’s a lot, but Essence delivered them all. Sales are up 40% beyond our projections.” On the other side of the globe, Securely, a subsidiary of Electra, a 95-yearold electricity distribution company, is one of New Zealand’s premiere providers of IoT home management and senior aging-in-place solutions. “We were committed to finding the most thorough, home management tech available, and Essence was the SecurityLink India ■ August 2018
clear choice,” said Chris Barber, National Sales and Business Development Manager, Securely, “When we found the range of options available through the WeR@Home and the Care@Home suites – from home automation to elderly care, we were sold.” “With the increasing adoption of IoT and the desire of all people to have more interaction with their homes and security, our ground-breaking connected home solutions are a perfect fit because they address both the needs of the service provider and their customers,” said Ronnie Nir, GM Essence Smart Living, “All indices point to our continued rapid expansion well into the future, and we see the developed economies in Asian market as a significant driver.” 75
Voted Best AntiHikvision DeepinView People Counting Money Laundering Compliance Camera Wins Protector & Wik Award Solution Provider
ikvision has won the bronze Protector & Wik Award in the Video Surveillance Category. The accolade was bestowed upon its DeepinView indoor dual-lens people counting camera (iDS-2CD6810F/C). The award is judged by the readers of the magazine and its website, making this a ‘people’s choice’ success.
For Fifth Consecutive Year in 2018 NICE Actimize is recognized for its new suspicious activity monitoring solution which reduces investigation time for a single alert by up to 70 percent
Hikvision’s people counting camera serves critical functions in the security apparatus of crowd-centric applications. It can record the number of people who pass through an entrance and monitors crowd density. Loitering detection can be used to keep visitor traffic flowing and the camera’s alarm triggering function can prevent injuries. Data from the camera can be used to create reports analysing customer activity and build revenue. Anywhere there’s a crowd – tourist areas, train stations, sports venues, shopping areas, museums and more – this camera helps improve profits while protecting individuals. Allen Xue, Hikvision’s Area Sales Manager DACH said, “We are thrilled to receive this award as we are constantly striving to develop products that are high quality and innovative. Based on deep learning technology, our DeepinView camera will provide more structured and useful information for the application system, so our customers and users get the very best experience along with reliable security and peace of mind. It’s nice to be recognised for our hard work.” 76
SecurityLink India ■ August 2018
ICE Actimize has been voted the ‘Best Anti-Money Laundering Compliance Solution Provider’ in Waters Magazine’s 2018 rankings competition for the fifth consecutive year. It has been selected through an online voting process conducted recently by the publication. “In a highly competitive playing field, once again NICE Actimize was recognized by our readers and the antimoney laundering industry as a leader in AML compliance,” said Anthony Malakian, U.S. Editor, Waters Magazine, “Winning year after year is an impressive achievement for our top-ranked companies, securing votes from our publication’s readers representing both leading buy-side and sell-side financial institutions.” “We continue to make significant investments across our integrated AML suite and are currently focused on developing intelligent automation, machine learning and artificial intelligence based solutions that function as enablers
to enhance the quality and consistency of AML programs while reducing the cost of compliance,” said Joe Friscia, President, NICE Actimize, “We thank the readers of Waters for demonstrating their continued support of our anti-money laundering technology and services for an impressive fifth year in a row.” The 2018 Waters Technology Rankings Awards competition consisted of a total of 30 awards covering five categories including Trading Services, Trading Tools, Data Management, Compliance, Risk Management and the Back Office, and Infrastructure and Connectivity. NICE Actimize’s recently updated suspicious activity monitoring (SAM) solution, which combines machine learning analytics for laser-accurate crime detection with robotic process automation, virtually eliminates the manual search for third party data, increasing team productivity, and reducing investigation time for a single alert by up to 70 percent. The new suspicious activity monitoring solution introduces NICE Actimize’s innovative concept of autonomous financial crime management to the anti-money laundering category for the first time. NICE Actimize’s Autonomous financial crime management approach represents a massive shift in unifying and mitigating risk through targeted utilization of big data, advanced analytics everywhere, artificial intelligence and robotic process automation which in concert reduce reputational risk. NICE Actimize’s anti-money laundering solutions suite consists of suspicious activity monitoring, customer due diligence, CTR processing and automation, and watchlist filtering, as well as the capability to address FATCA legislation. The suite also includes the ‘AML Essentials’ cloud solution, targeting mid-sized financial institutions.
Dubai Police Visited Dahua HQs in China A
distinguished group of Dubai police officials has recently visited the Dahua headquarters at Hangzhou in China. Representing Dubai police, Colonel Essa Ahmad Salem Ahmad Alobeidli met with James Wang, CTO, Overseas Business, Dahua Technology and discussed topics of mutual interest. Known as one of the safest city in the Middle East, Dubai police aims to enhance the city’s security by adopting proven and innovative security solutions. Accordingly, the visit focused on Dahua safe city solution, which was introduced through an indepth presentation by Dahua Technology as well as a discussion on the applicability of safe city solution between Dubai and Hangzhou police based on their experiences.
Dahua Management & Dubai Police Officials
Dahua is an ideal partner for building municipal-level mega surveillance systems. In Hangzhou, Dahua Technology has successfully helped the Jianggan district police station implement Dahua safe city solution, which integrates cloud computing, big data, AI, and other cutting-edge technologies to enable higher efficiency and more effective police operation. “China and UAE have enjoyed a long-lasting friendship and history of business partnership. We are glad that Dahua Technology can play an essential part in enhancing the security of Dubai, and we will concentrate our resources to bolster our capabilities and provide better, faster and more effective service to the UAE,” said James Wang. Colonel Essa expressed optimism for future collaboration between the Dubai Police and Dahua Technology and stated, “We hope to enhance our partnership with Dahua through the safe city project and make the UAE one of the safest countries in the world.” SecurityLink India ■ August 2018
Ways to Help Installers Increase Revenue T
execom’s research shows there’s a yawning gap between what end users want and what security systems currently deliver. The irony is that, while security and peace of mind are high on the list for end users, once a security system is installed, most people simply don’t use it. This may seem irrational, but the truth is that traditional alarms are often seen as a ‘grudge purchase’ for domestic users. It’s not something people buy because they want to – they do it because they feel they must, to protect their homes and their families. The good news is that Texecom has many solutions available to help installers increase their revenue by helping defeat the ‘grudge purchase.’ Here are some ‘added value’ features installers may wish to consider promoting:
execom Connect puts users in control of building automation. From checking that appliances are turned off to receive notifications when children come home, it personalises how people automate their homes. It adds value to security systems by delivering the features and benefits that end users are demanding, giving them the flexibility
and freedom to enjoy an interactive and positive experience. Security installers can really benefit from this by offering systems that don’t feel like a ‘grudge purchase.’
customers. Built-in sounders provide stand-alone notification, while connectivity to Texecom’s Premier Elite control panels provides system-wide alarms and remote communication.
Aesthetic upgrades such as metal keypads
ameras also come into their own when controlled by Texecom Connect. With the app, users can monitor their cameras from anywhere in the world, from checking on their children or pets to making sure their automatic home lighting has been turned on.
icochet-enabled perimeter security systems offer real peace of mind by putting off an intruder – whether an opportunist or a planned break-in attempt – before they get near the property. Lights or alarms can be triggered using a variety of acoustic and vibration detection devices. Whether it’s an outdoor motion sensor or a wireless miniature contact for doors and windows, Texecom has the solution.
execom’s Ricochet mesh technology allows installers to offer commercial-grade, wireless gas leak detectors and smoke detectors to domestic
he Premier Elite range of metal LCD keypads with blue-backlights are elegant and offer the very best in keypad design. Ideal for luxury homes and high value premises, these keypads can be used with both Premier Series and Premier Elite Series control panels and are available in a range of stylish metal finishes including polished chrome, gun-metal and polished brass.
Adding value, increasing the bottom line
execom offers installers the addedvalue benefits that end users are demanding. Whether it’s automation, cameras, perimeter security, safety devices and aesthetic upgrades like metal keypads, installers and integrators can up-sell and offer systems that don’t feel like a grudge purchase but instead add real value to their customers and to their bottom line.
Finalizes Acquisition of A
llegion, plc, a leading global security products and solutions provider, has completed, through one of its subsidiaries, the previously announced acquisition of ISONAS. ISONAS has edge-computing technology that provides innovative access control solutions for non-residential markets. ISONAS intelligent devices – like its popular integrated reader controllers – utilize power-over-ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. Allegion announced its intent to purchase ISONAS in June 2018. 78
SecurityLink India ■ August 2018
Mobile Biometrics to Authenticate $2 Trillion of Sales by 2023 Driven by over 2,500% Growth Remote payments to account for 57% of all biometric transactions by 2023
new study from Juniper Research has found that mobile biometrics will authenticate $2 trillion worth of in-store and remote mobile payment transactions annually by 2023. This is 17 times of the $124 billion expected in 2018, as initiatives furthering secure remote payment transactions and more open biometric platforms proliferate. The research forecasts that the fastest growth will come from biometrically verified remote mCommerce transactions, reaching over 48 billion in volume by 2023. This will be around 57% of all biometric transactions, up from an estimated 28% in 2018.
Biometrics come to remote transactions, modalities broaden
he new research, Mobile Payment Security: Biometric Authentication & Tokenisation 2018-2023, expects this growth to be driven both by industry standardisation initiatives, like Visa’s secure remote commerce, and smartphone vendors introducing different forms of biometric authentication. Juniper anticipates that over 80% of smartphones will have some form of biometric hardware by 2023, representing just over 5 billion smartphones. This has traditionally meant fingerprint sensors, but facial recognition and iris scanning will become more prominent over the next 5 years, with adoption exceeding 1 billion devices.
Biometrics gets behavioural
espite this hardware proliferation, Juniper believes the main innovations in mobile biometrics lie with ‘Biometrics-as-a-Service,’ software which employs AI to check users’ identities on any platform. Juniper’s report estimates that nearly 90% of smartphones currently in use can support software-based facial recognition, while 80% are capable of voice-based payments. Juniper believes that these services, as well as tracking user behaviour, will enable secure cloud-based identity checks that are cross-platform and authenticate in the background. The research forecasts over 1.5 billion smartphones to use software-based biometrics by 2023. “The possibilities for software-based continuous behavioural biometric authentication are huge,” notes research author James Moar, “The flexible programming allows businesses to deploy any level of authentication they require relatively easily, while ensuring that transactions are properly authenticated.” Juniper Research provides research and analytical services to the global hi-tech communications sector, providing consultancy, analyst reports and industry commentary. SecurityLink India ■ August 2018
New Division for Hardware OEM Sales
DME, Inc., parent company of Apollo Security Access Control has announced creation of a new division for sales and support exclusively for its Software OEM and integration partners. This new division, named ApolloEM, will be responsible to provide support for industry partners that use Apollo’s hardware platforms along with their own software solutions. “Providing hardware-only solutions to our partners has been a significant part of Apollo’s business since the very beginning,” explained William Lorber, Vice President of Sales and Marketing, “Establishing a separate division to strengthen our role as an access hardware OEM became logical as more partners are coming on board to utilize our new product line.” Lorber went on to explain that Apollo’s new ASP series controllers allow easy integration as well as postfactory customization with App scripting. The flagship of the new hardware series, ASP-4 is a four-door integrated controller/ reader interface designed for secure, high volume applications. In addition to expansion options via OSDP to support up to 20 readers, the ASP-4 can work in a network device cluster to support up to 128 doors working as a single management unit. Other features such as a native open platform SDK, on-board app scripting and 3rd party serial device support make ASP series an attractive choice for system integrators and software OEMs in the security industry. ApolloEM will provide support for existing partners as well as market to potential new partners. 79
Cryptomining Replaces Ransomware As Most Popular Cybercrime Malware Analysis of vulnerability and threat trends shows cryptomining malware dominates threat landscape in the first half of 2018
kybox® Security has recently released its mid-year update to the Vulnerability and Threat Trends Report which analyzes vulnerabilities, exploits and threats in play. The report, compiled by the team of security analysts at the Skybox® Research Lab, aims to help organizations align their security strategy with the reality of the current threat landscape. The mid-year update explores trends observed from January to June of 2018. One of the most significant findings is
Cryptomining uses the computational power of compromised assets to create new blocks in the blockchain like Bitcoin and Monero. The malicious or unauthorized cryptomining approach indeed avoids several of the drawbacks of ransomware: ●● The victim doesn’t need to be notified of the attack in order to pay the ransom, so it can continue indefinitely in a stealth manner. ●● Cryptocurrency can be mined over long-periods of time, rather than
In the last few years, ransomware reigned supreme as the shortcut money-maker for cybercriminals, it doesn’t require data exfiltration, just encryption to hold the data hostage and a ransom note of how the victim can pay up. With cryptominers, the criminals can go straight to the source and mine cryptocurrency themselves. There’s no question of if they’ll be paid or not – Ron Davidson CTO & Vice President, R&D, Skybox the replacement of ransomware as the cybercriminal tool of choice with cryptomining malware. In the last six months of 2017, ransomware accounted for 32 percent of attacks, while malicious cryptominers accounted for seven percent. By the first half of 2018, the figures had switched almost exactly – malicious cryptominers accounted for 32 percent of attacks while ransomware dropped to eight percent. 80
the cybercriminal receiving a single lump-sum ransom payment. ●● There is no decision of payment on the part of the victim – the attack itself controls how much money will be generated. “Ransomware received a lot of attention in past years, especially thanks to the likes of WannaCry, NotPetya and BadRabbit,” said Skybox Director of Threat Intelligence Marina Kidron and SecurityLink India ■ August 2018
Leader of the Research Lab behind the report, “To some extent, organizations took note and put effective precautions in place, ensuring they had reliable backups and even thwarting attackers with decryption programs. So cybercriminals found – in cryptomining – a path of lesser resistance. The recent uptick in value of cryptocurrencies also made this an incredibly profitable attack option.” Other findings in the report appear to relate to this rise in cryptomining. Internet and mobile vulnerabilities made up nearly a third of all new vulnerabilities published in the first half of 2018. Google Android had by far the most vulnerabilities during that time period, exceeding the tally of the next five most vulnerable vendors combined. Android also logged 200 more vulnerabilities than it did in the second half of 2018. Malicious cryptomining has found an advantage in targeting the app store of the global market leader in mobile devices, with billions of potential targets worldwide. Browser-based malware is also on the rise in the first half of 2018. “Out of all software today, web browsers are considered the most prone to malicious attacks,” said Kidron, “They constantly interact with websites and applications that cybercriminals have infected with malware like cryptominers and other threats via the web, which are notoriously difficult to detect. The cryptomining malware could be active as long as the web session is active, and ‘file-less’
cryptominers also can hide from conventional security tools as there’s no download or attachment to analyze.” No matter the payload, attackers looking to exploit vulnerabilities have more resources than ever. Not only are dark web market places rich with attack tools and services, and criminal forums ripe with information, vulnerabilities themselves have skyrocketed. New vulnerabilities catalogued by MITRE’s national vulnerability database doubled in 2017 over the previous year, and 2018
looks to be on track to shatter even that record. The 2017 surge and continued elevated numbers are largely due to organizational improvements at MITRE and increased security research by vendors and third parties, including vendor sponsored bug bounty programs. But no matter the reason, organizations have to employ smarter and faster ways to find the signal in the noise and mitigate vulnerability risks before they’re used in an attack. Skybox recommends establishing a threat-centric vulnerability manage-
ment (TCVM) program to adapt to these changes in the threat landscape and those yet to come. The TCVM approach helps security practitioners focus on the small subset of vulnerabilities most likely to be used in an attack by incorporating vulnerability and threat intelligence with the context of their assets, network and security controls. This way, remediation is targeted at the greatest areas of risk while leveraging all response options – patching as well as networkbased changes.
F-Secure Acquires MWR InfoSecurity A Big Step Towards Cyber Security Leadership Acquisition adds industry leading threat hunting platform to F-Secure’s detection and response offering and expands cyber security services to the biggest markets globally
-Secure has recently signed an agreement to acquire all the outstanding shares of MWR InfoSecurity, a privately held cyber security company operating globally from its main offices in the UK, the US, South Africa and Singapore. The acquisition is a significant milestone in the execution of F-Secure’s growth strategy, and makes it the largest European single source of cyber security services and detection and response solutions. “The acquisition brings MWR InfoSecurity’s industry-renowned technologies to F-Secure making our detection and response offering unrivaled. Their threat hunting platform (Countercept) is one of the most advanced in the market and is an excellent complement to our existing technologies,” said F-Secure CEO Samu Konttinen, “I’m thrilled to welcome MWR InfoSecurity’s employees to F-Secure. With their vast experience and hundreds of experts performing cyber security services on four continents, we will have unparalleled visibility into real-life cyber attacks 24/7. This enables us to detect indicators across an incredible breadth of attacks so we can protect our customers effectively. As most companies currently lack these capabilities, this represents a significant opportunity to accelerate F-Secure’s growth.” “We’ve always relied on research-driven innovations executed by the best people and technology. This approach has earned MWR InfoSecurity the trust of some of the largest organizations in the world,” says MWR InfoSecurity CEO, Ian Shaw who will join F-Secure’s Leadership Team after closing of the transaction in July, “We see this approach thriving at F-Secure, and we look forward to working together so that we can break new ground in the cyber security industry.” The combined company will have hundreds of the world’s best cyber security consultants, making F-Secure one of the few truly global technical security advisors positioned to help organizations fight today’s most sophisticated threats. Learnings from the most challenging incident investigations and from targeted attack simulations provide insights that feed directly back into product creation, ensuring the company’s detection and response solutions are constantly upgraded to meet the latest threats. SecurityLink India ■ August 2018
Examining the Risks and Benefits of Smart Cities A
dvancements in AI, as well as Internet of Things (IoT) connected devices, have made it possible for cities to increase efficiencies across services like transportation, water management, and healthcare. To do this, smart cities rely on interconnected devices to streamline and improve city services based on rich, real-time data. However, the fast adoption pace of networked technologies is potentially creating a deep well of vulnerabilities. There are already millions of smart home devices in the world including smart alarms, locks, lighting, baby monitors, and thermostats and televisions. It is predicted that there will be more than 21 billion connected devices by 2020.
The danger of hacks
s smart cities rely on accurate data to properly function, if information is hacked, it has the potential to bring a city to a standstill. For instance, traffic control systems could be exploited to cause jams or crashes. Other risks include subways grinding to a halt, or water supplies being contaminated. This scenario is not as far-fetched as it may sound. In 2011, hackers gained control of the water control system in Ohio and destroyed a pump that serviced 2,200 customers. Furthermore, hacking entry points can be quite straightforward to unleash this chaos. For instance, smart lights bulbs and vending machines on a college campus were recently used as a starting point to launch a cyberattack against an unnamed university in the US. The most obvious low hanging fruit when targeting smart cities will be to target people. Targeting people opens the door to the ‘weakest link’ and can uncover vulnerabilities such as lack of authentication and encryption, and weak password storage that can allow attackers to gain access to systems. Given the huge quantity of smart devices now in our everyday life, defending against the sheer volume of attacks will become a 82
challenge for smart cities. In a report by Cisco Cybersecurity in 2017, 35 percent of chief information security officers and security operations professionals said they see thousands of daily cyber threats, but only 44 percent are investigated.
Data, data, everywhere
ealistically, in the environment of a smart city, from smart meters to intelligent transportation infrastructure and sensors, they are likely to capture a lot of data about us as individuals. This data may be used to provide better services, efficiency, and other smart-city goals. That said, this also means lots of data including personal information, is collected, stored, and used in a smart city. This will make smart cities a very tempting target to attack for hackers. That is why it is crucial that best security practices are built into a smart city’s means of data-gathering and processing. For instance, the amount of data that IoT devices can create is colossus. A Federal Trade Commission report entitled ‘Internet of Things: Privacy & Security in a Connected World’ found that less than 10,000 households can produce 150 million distinct data points daily.
Where we’re leading
hysical security has moved from being very simple inputs and outputs, to being always-connected devices. This makes the industry very much part of the IoT world. This has changed how Vanderbilt thinks when designing and developing their own security systems, in particular SPC. This intruder detection system has been designed so that should an attack penetrate, such as Denial-of-Service, the system has multiple communication paths available as a backup. Therefore, if one server is flooded and taken down, the system can immediately switch to a backup server and then change communication paths to bypass the attack and ensure messages still operate successfully. So, the system will remain operational, and it will still be able to communicate
SecurityLink India ■ August 2018
out, but it will start to shut down elements of itself to protect the system from further damage in the attack.
The bright side of smart cities
f course, it is not all doom and gloom. Smart cities are springing up at a rapid rate for a reason. In Barcelona, smart water meter technology is helping the city save $58 million per year. In South Korea, one city cut building operating costs by 30 percent after implementing smart sensors to regulate water and electricity usage. According to the United Nations, 66 percent of the world’s population will live in cities by 2050. This will have many varying effects, including in transportation, energy, and health and safety. Cities consume 75 percent of all energy and are responsible for 40 percent to 60 percent of greenhouse gases. Air quality remains a concern, including so-called ‘black rivers’ of pollution in urban areas that are leading to an increase of respiratory disease. The impact of congestion on emergency response and waste management also must come into consideration. As seen by the success stories in Barcelona and South Korea, smart cities can help combat these problems and thus will play a key role in benefiting the lives of its citizens.
Precautions to consider
o, while technology will help to change some of these problems for the better, security for smart cities must come first and foremost. Employing more machine learning algorithms to scour the web for vulnerabilities ahead of time could be a possible solution to combat vulnerabilities. Naturally, cyberattacks and data breaches can’t be avoided entirely. But rather than trying to accomplish the impossible, smart cities should focus on investment in IT infrastructure capable of resisting outside attacks. This includes forcibly shutting down potentially hacked systems until security experts can resolve vulnerability issues. One must remember that technology’s growth also means that security defenses are developing in parallel. At its core, security is about being continuously observant, following best practices, and being ready and able to react against a security issue.
With IoT devices, security is now an endless game of cat and mouse in staying ahead of the latest threats and hacking innovations. Therefore, vulnerability testing is also a valuable weapon in your overall defensive arsenal. As well, as vulnerability testing its systems, Vanderbilt has various other forms of obstacles and barriers to deter and deceive would-be hackers.
ncrypting sensitive data and deploying network intrusion mechanisms that can regularly scan for suspicious activity and protect against hackers trying to breach control systems remotely is also another key step to take. FlexC, Vanderbilt’s communications protocol, was built from the ground up solely with cybersecurity in mind. The protocol is a bespoke design that ensures everything is encrypted, all communications are monitored, and multiple types of attack are considered for defensive purposes to provide the best security possible. The encryption used by FlexC communications between panels and the cloud is an AES 256-bit SSL encryption. By encrypting anything before you send it to the cloud, it adds an extra cushion of control and power over that data. It not only provides an added defensive structure around a company’s information, but it also adds peace of mind to the equation when relaying this data to the cloud.
aving an environment within the software industry of open disclosures only means that we can learn from mistakes, we can see how hackers are attempting to breach systems, and ultimately, it can help us stay ahead of the curve and one-step clear of hackers’ latest intentions. When vulnerabilities are reported, it just means that testing down the line will improve. However, one of the most obvious places to start is to choose equipment from reliable suppliers that have a knowledge and interest in cybersecurity and are focused on protecting your data. When your security system is designed from the ground up to protect against cyberattacks, naturally your organization will be in a much better place.
SecurityLink India ■ August 2018
Businesses Collect more Data than they can Handle W
ith pressure to ensure consumer data is protected mounting, Gemalto has recently released the results of a global study which reveals that two in three companies (65%) are unable to analyze all the data they collect and only half (54%) of companies know where all of their sensitive data is stored. Compounding this uncertainty, more than two thirds of organizations (68%) admit they don’t carry out all the procedures in line with data protection laws such as GDPR. These are just some of the findings of the fifth-annual data security confidence index, which surveyed 1,050 IT decision makers and 10,500 consumers worldwide. The research found that business’ ability to analyze the data they collect varies worldwide with India (55%) and Australia (47%) best at using the data they collect. In fact, despite nine in 10 (89%) global organizations agreeing that analyzing data effectively gives them a competitive edge, only one in five Benelux (20%) and British (19%) companies are able to do so. “If businesses can’t analyze all of the data they collect, they can’t understand the value of it, and that means they won’t know how to apply the appropriate security controls to that data,” says Jason Hart, Vice President and CTO for Data Protection at Gemalto, “Whether it’s selling it on the dark web, manipulating it for financial gain or to damage reputations, unsecured data is a goldmine for hackers. You only need to look at the recent hacks on the World Anti-Doping Agency and International Luge Federation to see the damage that can be done. What’s more, data manipulation can take years to discover, and with data informing everything from business strategy to sales and product development, its value and integrity cannot be underestimated.”
Confidence in securing the breach is low
hen it comes to how data is being secured, the study found that almost half (48%) of IT professionals say perimeter security is effective at keeping 84
unauthorized users out of their networks. This is despite the majority of IT professionals (68%) believing unauthorized users can access their corporate networks, with Australian companies being the most likely (84%) and the UK the least (46%). However, once the hackers are inside, less than half of companies (43%) are extremely confident that their data would be secure. UK businesses are the most concerned with just 24% prepared to say they’re extremely confident, with Australia the highest (65%). Even though there is still faith in how they’re securing their networks, one third (27%) of companies reported that their perimeter security had been breached in the past 12 months. Of those that had suffered a breach at some point, only 10% of that compromised data was protected by encryption, leaving the rest exposed.
Consumers say compliance is critical
ccording to the study, a growing awareness of data breaches and communications around GDPR have led to the majority (90%) of consumers believing that it is important for organizations to comply with data regulations. In fact, over half (54%) are now aware what encryption is, showing an understanding of how their data should be protected. Hart continues, “It’s time organizations got their houses in order; starting with who oversees their data security. A central figure such as a Data Protection Officer – essential in some circumstances under GDPR – must be appointed to the board to lead data security from the top down. Next is having more insight and analysis on the data collected to ensure that it is both correctly protected and enabling more informed business decision making. Finally, a mindset changes. Organizations must realize that it’s no longer a case of if, but when a breach occurs, and protect their most valuable asset – data – through encryption, two-factor authentication and key management, rather than solely focusing on perimeter protection.”
SecurityLink India ■ August 2018
Adoption of Under-display Fingerprint Sensor for Smartphones Expected to Top 100 Million Units by 2019
martphone brands are expected to increase their adoption of under-display fingerprint sensors, which allow phones to have full-screen displays with an invisible fingerprint feature, according to IHS Markit, a world leader in critical information, analytics and solutions. Shipments of smartphones using ‘underdisplay fingerprint sensor’ is forecast to reach at least 9 million units in 2018 and top 100 million units by 2019, according to the new Display Fingerprint Technology & Market Report – 2018 by IHS Markit. The market will keep growing remarkably for the next three years, led by Samsung Electronics and Chinese smartphone brands such as Vivo, Huawei and Xiaomi. By integrating the fingerprint sensor under the display of a smartphone, the phone can offer an invisible and front-side fingerprint feature with 18:9 or higher ratio full-screen displays. Applications using under-display fingerprint sensors, including the Vivo X20 and X21 and the Huawei Mate RS, were finally launched in late March. More are expected to come to market in the second half of 2018. Apple was the first to introduce fingerprint recognition as major biometric identification. It launched Touch ID on the iPhone in 2013, followed in 2015 by Android system’s native fingerprint sensing support, which has contributed to the market’s dramatic growth for the past few years. Due to its convenience and intuitive use, fingerprint recognition was applied to more than 60 percent of total smartphone shipments in 2017. User preferences for a better viewing experience gave rise to larger, full-screen displays on smartphones, but earlier models were limited to having the fingerprint sensors being placed outside the screen boundary. The introduction of rear-side fingerprint sensing came as a compromise to overcome these limitations with full-screen smartphones. Now, the under-display fingerprint solution allows for the sensor to return to the front side of the smartphone. “With Vivo and Huawei recently launching several models
with the under-display fingerprint solution, it is certainly rising as a new trend,” said Calvin Hsieh, Director of Touch and User Interface Research at IHS Markit, “This also pressures Samsung Electronics, which hasn’t decided whether or not to adopt the solution in its Galaxy Note 9.” If Samsung applies the solution to the Galaxy Note 9, shipments of smartphones with the solution will hike to more than 20 million units in 2018, from the currently estimated 9 million units, IHS Markit predicts. Almost all fingerprint IC makers are interested in developing under-display fingerprint solutions because the profit margin is much higher than discrete solutions. Leading solution makers include Synaptics, Goodix, Qualcomm and Egis, followed by Samsung LSI, FPC, VkanSee, CrucialTec, BeyondEyes and FocalTech. Among panel makers, Samsung Display – with mature active-matrix organic light-emitting diode (AMOLED) panel manufacturing technology – takes the leading role as the underdisplay fingerprint can be only applied to AMOLED for now, followed by BOE. The Touch Panel Market Tracker by IHS Markit provides a variety of in-depth analyses on touch panel market, including touch user interface technology, market dynamic and emerging trends.
SecurityLink India ■ August 2018
Advanced 5 MP Stainless-Steel & 4K Dome Cameras For Solid Performance in Harsh Environments
xis Communications has newly introduced dome cameras which are perfect for surveillance in a wide range of areas such as critical infrastructure, city surveillance, airports, railway stations, harbours, healthcare, pharmaceutical and food industries. The two models of multi-megapixel, outdoor-ready fixed domes complement the top-of-the-line AXIS Q35 series, and ensure solid performance in challenging light conditions and rough environments. Based on top-quality ½” sensors and Axis latest and most advanced image processing, AXIS Q3518-LVE delivers 4K, and the stainless-steel AXIS Q3517-SLVE delivers 5MP, in 30fps with outstanding image quality in challenging light conditions. This includes support for Axis OptimizedIR illumination, forensic WDR and Lightfinder technology. The new models also support Axis award-winning Zipstream technology, which preserves important details in full image quality, while reducing the storage and bandwidth needs by an average of 50% or more. The advanced AXIS Q35 cameras have been designed to withstand the harshest conditions, with stable operation in extreme temperatures from -50°C to +60°C. AXIS Q3517-SLVE features a marine-grade stainless steel casing that is highly resistant to the corrosive effects
of salt, detergents and other chemicals. AXIS Q35LVE/ -SLVE cameras are IK10+ rated and have been tested to ensure they can withstand 50 joules of impact. The shock detection feature means they can send an alarm when exposed. The cameras’ electronic image stabilization (EIS) means they provide steady video even during intense vibrations. In addition, the cameras feature: ●● Pre-installed AXIS Motion Guard, AXIS Fence Guard and AXIS Loitering Guard analytics for proactive surveillance. ●● The use of dynamic overlays to add extra information such as weather update to the video feed. ●● External sensors can be connected to input ports to trigger alarms or actions, and if the connection to a sensor is cut the camera can send an alarm. ●● Relays and other external devices can be connected to outputs to, among others, activate lights, and lock/ unlock doors. ●● If there is a power outage, redundant DC power and Power-over-Ethernet help ensure a reliable power supply to the cameras. ●● Installation is made easy with flexible cable management, optional connection to any conduit and helpful tools such as levelling assistant, auto rotation, remote zoom and focus. Petra Bennermark, Global Product Manager at Axis Communications comments, “The new additions to our topof-the-line AXIS Q35 series will help our customers ensure safety even at the most challenging conditions, whether it comes to light, weather or a rough environment. The cameras’ outstanding image quality give the operators the best possible chance of identifying people, objects and vehicles, and the pre-installed analytics provide excellent support for proactive surveillance.”
SecurityLink India ■ August 2018
Setting Another Record for Resolution and Dynamic Range with
The New Panomera® S8 Ultraline
ince 2011, the patented Dallmeier Panomera multifocal sensor technology has provided comprehensive video protection for vast areas in many football stadiums, perimeters, airports and city areas all over the world. The new Panomera® series, the ‘Ultraline,’ has exceptionally high effective resolution for these situations. Dallmeier presents the first model of the new series, the Panomera® S8 Ultraline, which delivers up to 190 megapixel at 30fps. ®
abling individuals to be recognised over the entire distance. Identification of persons (250p/m) is supported up to a distance of 46m depending on the model, observation (62p/m) is possible even up to a distance of 322m. This corresponds to a huge image space of more than 26,000sqm. with continuous depth of field.
he multifocal sensor system captures and stores all regions of the image space in the highest detail resolution. At the same time, it is not important whether the operators are concentrating on a specific region in live mode (multiple detail zoom) or if regions of interest are displayed in detail based on video content analysis (multiple auto-tracking). The Panomera® recordings always include the entire area of interest and allow every operation to be analysed.
‘Made in Germany’ and GDPR-ready
ike all Dallmeier cameras the new Panomera® model is manufactured entirely in Germany, at the Dallmeier factory in Regensburg. This in itself is a major factor in the manufacturer’s data protection and data security strategy, since it is then impossible for unauthorised persons to gain access through ‘backdoors.’ In all, 14 functions such as the setup of private zones, people masking or the very latest encryption-authentication technology in the processing chain of Dallmeier solutions ensure that the strict requirements of the GDPR relating to data protection and data security are met. The manufacturer also offers detailed information specifically with regard to video technology and the GDPR. The Panomera® concept has revolutionised video technology. With up to eight sensors in a single camera, it is possible to capture enormous distances in unprecedented resolution quality. With fewer cameras and considerably less expense for both infrastructure and management, the total cost of ownership of video solutions are reduced significantly. At the same time, customer specifications regarding pixel density and coverage can be satisfied very precisely.
Up to 26,000sqm. coverage with one camera
he first model of the new Ultraline series, the Ultraline S8, has an excellent dynamic range of 130dB UWDR (effective) for an extreme Panomera® effect. This enables a resolution of 125p/m up to a distance of 160, 104 or 82m, en-
New Matt Black Monitors Added To Hands Free 6700 Video Entry Series
he monitors, which feature a 7 inch high resolution colour LCD screen are now available in both a matt black or satin white finish for a number of Videx popular door entry systems. Video door entry is a very popular access control choice because it enables a resident to see and talk to a caller prior to opening the door which offers additional peace of mind
SecurityLink India ■ August 2018
and security as they have the option to deny access to a caller without having to open the door first. Videx 6700 series of hands free monitors carry a number of advanced features such as entrance recall, door release, a do not disturb function, and an optional video clip record facility while maintaining ease of use and installation. The monitors are available with a video memory feature that can be used with or without a Micro SD card to capture an image or short video of a caller enabling the occupant to see any visitors they may have missed throughout the day. Without the Micro SD card installed, the 6700 series is able to store up to 100 still images of the caller while with a Micro SD card it’s possible to store up to 4096 still images or up to 512 15 second video clips of callers. The facility can be used manually where the user can press a button to either take a picture of the caller, start recording a short video clip or it can be used in an automatic mode where the picture/ video clip will automatically be taken when a visitor calls, allowing the user to review any missed calls when they arrive home. The Micro SD card can also be removed allowing the images and video clips to be used in another device such as a mobile, tablet or PC.
Due to popular demand, Videx is now able to offer the monitors in a matt black soft touch high end finish as well as the standard satin white finish, so that they complement any surrounding area or environment, as well as providing a great access control solution. With the video monitors, there’s also a number of programmable features such as ring tone, privacy time and number of rings allowing each apartment to be customised to the client’s needs. Currently the monitors are available for the full video kit range, VX2200 6 wire system for low and high rise apartments and the VX2300 2 wire system enabling these monitors to be used in one apartment systems through to systems with up to 1000 apartments.
VAX Access Control Version 2.9.60 Hardware and software enhancements provide flexibility, cost savings and more effective monitoring
icon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components, has recently released VAX Access Control, version 2.9.60. This latest VAX version includes powerful feature enhancements to software as well as new hardware options that offer cost savings and programming flexibility. VAX now offers a master multi-door controller for 2 to 8 doors. Compact and powerful, the new panel is designed for mounting in equipment rooms and for seamless conversion to VAX in retrofit projects, where it will significantly reduce labor and hardware costs. The multi-door controllers offer all the same functionality as VAX over-the-door controllers including the new ability to program and store customized actions at the door level. These can be executed from inputs, triple swipes or user credential presentations and require no connection to the server. In addition, all new VAX controllers now support live firmware updates that can be automatically pushed to them from the VAX server, ensuring that entire networks stay current with minimal to no down time. VAX’s updated software interface offers a new monitoring layout that clearly displays easy-to-view tiles for each of the last 12-16 reader events including users’ names and photos. System operators can customize the layout of the tile display depending on their monitoring preferences. In addition, administrators can receive an immediate, pop-up notification for specified events. These notifications may include custom text, images and even display corresponding video from a surveillance camera. VAX 2.9.60 also provides enhanced monitoring capabilities for unmanaged doors. Doors without access readers can now be monitored for door strikes and operators can easily call up associated cameras. This provides security teams with important visibility into the access of unsecured areas within facilities. Mobile credentialing offers a new level of convenience
SecurityLink India ■ August 2018
for VAX customers who prefer to use their smartphones instead of cards or fobs. Upon installing a special smartphone app, users can scan their own unique VAX credentials into their phones, allowing them to communicate via Bluetooth with specialized door readers. When users come within a few feet of a reader, the door will unlock without any need to remove their phones from pockets or purses. Other new features include enhanced controls for time zones and holiday schedules, more complex logic-based programming at the door level, and the ability to support installations where site codes are not available or are inconsistent. Bret McGowan, Vicon’s V.P. of Sales and Marketing explains, “In the past two years, VAX has proven to be popular with our customers both as a standalone solution and for its built-in integration with Vicon’s Valerus VMS. With the launch of our new master door controller, as well as many new software features, we expect to see continued strong market growth, particularly from retrofit projects.”
Akida™ Development Environment The Akida Development Environment is a complete machine learning framework for the revolutionary Akida™ Neuromorphic System-on-Chip (NSoC)
rainChip, the leading neuromorphic computing company, has recently announced the availability of the Akida™ development environment. It is a machine learning framework for the creation, training, and testing of spiking neural networks (SNNs), supporting the development of systems for edge and enterprise products on the Company’s Akida Neuromorphic System-on-Chip (NSoC). Akida is the flagship product in BrainChip’s mission to become the leading neuromorphic computing company that solves complex problems to make worldwide industry more productive and improve the human condition. Applications that benefit from the Akida solution include public safety, transportation, agricultural productivity, financial security, cybersecurity and healthcare. These large growth markets
represent a $4.5B opportunity by 2025. The Akida development environment includes the akida execution engine, data-to-spike converters, and a model zoo of pre-created spiking neural network (SNN) models. The framework leverages the Python scripting language and its associated tools and libraries, including Jupyter notebooks, NumPy and Matplotlib. “This development environment is the first phase in the commercialization of neuromorphic computing based on BrainChip’s ground-breaking Akida neuron design,” said Bob Beachler, SVP of Marketing and Business Development, “It provides everything a user needs to develop, train and run inference for spiking neural networks. Akida is targeted at high growth markets that provide a multi-billion dollar opportunity and we are already engaged with leading companies in major market segments.”
Akida Execution Engine
he Akida execution engine is at the center of the framework and contains a software simulation of the Akida neuron, synapses, and the multiple supported training methodologies. Easily accessed through API calls in a Python script, users can specify their neural network topologies, training method, and data sets for execution. Based on the structure of the Akida neuron, the execution engine supports multiple training methods including unsupervised training and unsupervised training with a labelled final layer.
Data to Spike Converters
piking neural networks work on spike patterns. The development environment natively accepts spiking data created by dynamic vision sensors (DVS). However, there are many other types of data that can be used with SNNs. Embedded in the Akida execution engine are data-to-spike converters, which convert common data formats such as image information (pixels) into the spikes required for an SNN. The development environment will initially ship with a pixel-to-spike data converter, to be followed by converters for audio and big data requirements in cybersecurity, financial information and the Internet-of-Things data. Users are also able to create their own proprietary data to spike converters to be used within the development environment.
Akida Model Zoo
he Akida development environment includes pre-created SNN models. Currently available models include a
SecurityLink India ■ August 2018
multi-layer perceptron implementation for MNIST in DVS format, a 7-layer network optimized for the CIFAR-10 dataset, and a 22-layer network optimized for the ImageNet dataset. These models can be the basis for users to modify, or to create their own custom SNN models.
Akida Neuromorphic System-on-Chip
Akida is the Greek word for ‘spike.’ The Akida NSoC is the culmination of over a decade of development and is the first spiking neural network acceleration device for production environments,” said Peter van der Made, Founder and CTO of BrainChip.
HW-18 Explosive Ordnance Disposal Robot
wireless transmitting antenna, and hardware tool including cutter, hook, rake, drill and clipper.
●● Transfer and destruction of the suspicious objects in public places (metro, airport, railway station, shopping mall, conference center etc.), ●● Detection of prohibited to carrying goods by their images in 7 projections, ●● Applied in such environment as dud elimination, roadside bomb elimination and mine elimination etc., ●● Material fetching and transfer under hazardous biological and toxic environment, ●● Reconnaissance, detection, material fetching and transfer within the ruins environment after disaster, and ●● Material fetching and transfer under nuclear radiation environment, simple detection and maintenance work.
It is a special equipment for explosive ordnance disposal personnel to handle and destroy suspicious explosives in conditions of complex topography!
W-18 EOD Robot is to replace EOD personnel, carry and transfer suspicious explosive and other hazardous goods; and what’s more – it can destroy bomb by disrupt or installed through water cannon interface, observe on the spot and transmit images in real time for security personnel, be equipped with shotgun to attack criminals, and carry detecting equipment to inspect hazardous area and goods. EOD robot consists of mobile robot body and control system. Optional touch screen of control system is suitable for the beginners to operate. Optional accessories are tail,
MOBOTIX MOVE with Additional Features Designed to address widest range of use cases including support for H.264, Integrated IR light, Wide Dynamic Range and first mechanical pan-tilt and zoom models
OBOTIX has launched MOBOTIX MOVE, a new video surveillance camera family that supplements its current portfolio allowing end customers to benefit from additional features to meet a wider range of indoor and outdoor use cases. Customers can now obtain MOBOTIX MOVE products as they provide standards-based technology as well as products with unique MOBOTIX features from a single trusted source backed by industry leading quality and reliability. The new MOBOTIX MOVE series are the first MOBOTIX cameras to support both the ONVIF S and G profiles with
SecurityLink India ■ August 2018
video streaming at 3 and 4MP resolution up to 30 frames per second. Available in 4 models including bullet, vandal proof bullet and fixed dome, and two speed domes; all models are PoE powered and IP66/ IK10 rated for flexible deployment. “MOBOTIX MOVE is a recognition that we need to bring the same level of MOBOTIX expertise to a wider range of projects that have a specific requirement,” explains Thomas Lausten, Chief Executive Officer of MOBOTIX, “We listened to our global customers and integrators and created a new product family that delivers standards-based features while retaining the build quality, reliability and innovation that MOBOTIX is renowned for within the security and access control market.”
MOBOTIX MOVE is also the first MOBOTIX camera range with motorised varifocal lenses, high speed mechanical pan-tilt-zoom, speed domes and wide dynamic range sensors at up to 4MP resolution. The built-in software offers smart event functions, remote zoom and focus plus iris control on autofocus lens. Each device includes a built-in SD card slot and certain models have integrated IR LED illumination. The true day/ night feature with integrated movable IR cut filter technology provides colour images at day time and monochrome infrared sensitive images at night. With full ONVIF support, MOBOTIX MOVE cameras can natively support the widest range of video management software and NVR devices including PTZ control, audio, multicasting and relay outputs. “With the addition of MOBOTIX MOVE, our customers now have more choice without compromising on quality,” said Lausten, “All MOBOTIX MOVE products are specified and tested by MOBOTIX in Germany and manufactured under supervision. Our customers can be sure that we won’t lose our product DNA and all MOBOTIX MOVE branded devices are delivered and supported according to the same high-quality standards our customers expect.” All MOBOTIX MOVE devices can be controlled via
integrated web GUI using PC based browsers and will also be natively supported in the upcoming 2.0 version of MOBOTIX Management Center due for release in Q4 of 2018.
Ble-Id™ App for Ios and Android For use with the new Csn Smart™ readers
osslare Enterprises Ltd., a leading worldwide provider of professional security solutions including access control, detectors, and guard patrol, has recently launched the Rosslare BLE ID™ apps for iOS and Android. By installing the apps onto their smartphones, users can use the smartphone as a credential for access control and automation applications. The ID code generated by the app is unique to the device, and may be transferred easily by email to the system administrator. Rosslare’s new CSN SMART™ readers will appear in the app, and the user just needs to tap on the reader name to submit the credential to that particular reader. The main benefit of this technology is that the user is no longer obligated to carry a physical RFID card. In addition, the 10-meter operating range of the app introduces a new set of convenience factors. The CSN SMART™ readers feature a multi-credential UID read technology for contactless smart cards (13.56 MHz) that can read the card serial number (CSN) of many smart card RFID standards. The readers have the ability to read Rosslare’s BLE credential technology and PIN codes (AY-H6355BT), providing the most cost-effective credential solution for any application. The readers are rated IP65 and feature a modern design that can fit comfortably in any installation environment, indoors or outdoors. The app is available for download from Google Play Store and APP Store. Users of the app will immediately enjoy the flexibility and convenience of the new system. With the new release, clients utilizing Rosslare technology are able to secure their facility entrances and exits using personal devices as identification. This new app makes access control more cost-effective and easier for Rosslare clients everywhere.
SecurityLink India ■ August 2018
“The creation of the BLE app evolves from our customers, who needed an alternative credential that is affordable, reliable, and their users will embrace; and that can be used together or as a physical credential card. Step into the future with Rosslare smart solutions,” said Ezra Ozer, Director of Marketing of Rosslare’s Security Products Division.
Ultra HD Cameras with Four New Products
IVOTEK has recently released four top-tier 4K cameras – the FD9391-EHTV, IB9391-EHT, IP9191-HP and IP9191-HT. These four brand new ultra-HD cameras provide 3840x2160 resolutions at 30 frames per second and 1920x1080 resolutions at 120 frames per second. Compared to other devices with standard 1080p resolution, the video quality in these cameras has seen significant advancement, delivering images of four times the resolution to viewers.
tailed imagery while compression technology reduces the size of recorded data to a level below that of a 2-megapixel camera. Moreover, VIVOTEK has launched four network video recorders (NVR), ND9424P, NR9782, ND9441P and ND9541P. All four NVRs are capable of supporting outstanding 4K imagery to offer a total solution for users. Under the strategy of ‘See more in smarter ways,’ the FD9391-EHTV and IB9391-EHT include VIVOTEK’s latest technology smart motion detection. Smart motion detection is able to recognize human activities with precise accuracy, without being affected by a change of lighting or other factors. In addition, the technology reduces time spent on configuration and fine tuning, thanks to its intuitive configuration panel and clear visual confirmation. Smart motion detection results in a significant reduction of false alarms and the continued protection of people in smarter ways.
Face Recognition Terminals
ikvision has launched a range of ground breaking face recognition terminals. Hikvision’s face recognition terminals are embedded with deep-learning algorithms for access control and office scenarios for improving building operations, workforce management and safety operations.
Taking into account security as well as image quality, these four flagship cameras have embedded Trend Micro’s antiintrusion software to provide users higher levels of network protection. The resultant combination means that this series of cameras are well suited for city surveillance, transportation and industrial monitoring due to their outstanding image quality and ability to accurately render fine detail. Thanks to the unique combination of H.265 compression and Smart Stream III, video compression of these four cameras has been brought into a new generation, enabling savings on both bandwidth and storage consumption of up to 90%. This means that users can enjoy engaging and de92
Three face recognition terminal models are available, each one uniquely and flexibly designed for a wealth of applications and scenarios: ●● Wall-mounted face recognition terminal: DS-K1T604MF & DS-K1T606MF.
SecurityLink India ■ August 2018
●● Base- or wall-mounted face recognition terminal: DSK1T605MF. ●● Face recognition component for access turnstile: DS-K5603-Z.
mission delays and a reduced load on backend components. As a result, the terminals have a high success rate – the facecapture rate can hit 99% accuracy at less than 0.5 seconds. During rush hours, access turnstiles equipped with Hikvision’s face recognition terminals can respond in less than a half-second, passing up to 40 persons per minute.
DS-K5603-Z with access turnstile
H DS-K1T604MF & DSK1T606MF
All three of these models are easy to install and use. The wall-mounted terminal is well-suited for quick access at an entrance. The base and wall-mounted terminal can be mounted on convenient vertical surfaces or on the front desk. The face recognition component is designed for use in conjunction with access turnstiles. If needed, this model can be rotated horizontally upon installation for capturing facial images at the most effective angle. Various models and types are available with a wide variety of front-end or back-end combinations to meet a multitude of scenarios and environments. Hikvision’s face recognition terminals support 1:1 or 1:N matching modes, authentication via Mifare cards, and TCP/IP or RS-485 connectivity.
Accurate and fast face recognition
ikvision has embedded Deep-Learning algorithms into its face recognition terminals, providing fewer trans-
DS-K5603-Z with access turnstile
ikvision’s face recognition terminals apply to a wide variety of scenarios and environments and can be highly personalized. Multiple authentication modes are available – face images, swiping ID card and comparing images, custom modes, and more. Applications range from commercial real estate, government agencies, small to very large businesses or factories, just to name a few.
Upgrading Q’center To support ARM-based NAS and Windows active directory
NAP® Systems, Inc. has recently released Q’center v1.8, an upgraded version that not only extends the host server capability to ARM-based NAS models but also adds more functions to enhance privilege and security management. As a central management platform that consolidates the management of multiple QNAP NAS, Q’center provides immediate and complete information to assist IT administrators in making crucial decisions with greater efficiency. “The new Q’center focuses more on strengthening security management in business storage environments, while also making Q’center host servers available for ARM-based NAS to lower the threshold for small and medium businesses to deploy a NAS central management system,” said Ripple Wu, Product Manager of QNAP. With Q’center v1.8, QNAP’s new 64-bit ARM-based NAS models can perform as host servers to deliver higher cost-efficiency. Besides managing physical QNAP NAS systems, Q’center host servers can now manage vQTS - virtual QTS operating systems. By centrally deploying and monitoring multiple vQTS, IT administrators can easily manage integrated NAS experiences including aspects from vQTS.
SecurityLink India ■ August 2018
cured via SSL 128-bit encryption ensuring complete privacy when transmitting over the network. These communication pathways are also extremely fast with up to 100,000 card downloads in 15 seconds. Up to 250,000 cards and 100,000 events are stored on each device for complete database redundancy at every on-board access point.
Q’center v1.8 adds integration with Windows® Active Directory, allowing multiple NAS to be easily joined to Windows AD and allows the domain users to use the same Windows AD account name and password to connect to different QNAP NAS on the local network. IT administrators can also efficiently create shared folders with access rights verification for different AD accounts, allowing them to save precious time for other more important tasks. IT administrators can use Q’center to set alerts for unauthorized access. If unauthorized access is detected, they can quickly change the user name and password for multiple NAS systems at once using Q’center and centrally collect all the access logs for a greater control of NAS data security. Q’center delivers a total solution for business storage environments. It provides reports for current and previous NAS statistics, and the ability to create universal and unified NAS settings for managing multiple NAS units efficiently, including firmware updates, app installation, shared folder creation, and privilege settings for multiple client NAS.
With the ability to be customized with app scripting and embedded software, the ASP-4 can provide infinite post factory customization allowing providers of access control software to easily use the controller with their own software solution with a combination of native and programmed features, as well as be able to add new features for future requirements without replacing hardware. The native open platform SDK allows quick and powerful integration and includes code samples, tutorials and online developer support. With configurable inputs and outputs as well as add-on capability, the ASP can be a multi-function device handing access, alarm and elevator features.
ASP-4 4-Door High Speed Clustering Network Integrated Controller
he ASP-4 is an intelligent 4 door controller, with native connection for four doors/ four readers, expandable up to 20 total readers. The ASP-4 can be clustered with up to 31 other ASPs for up to 128 doors in a single management unit. The ASP-4 also supports OSDP readers and devices providing flexible and secure control of door hardware (readers, inputs, outputs, biometric). In addition to utilizing OSDP secure channel, every communication path of the ASP is se94
innoVi™ Real-Time Anomaly Detection Offering self-learning anomaly detection capability to detect and alert to irregular incidents
gent Video Intelligence (Agent Vi™), the leading global provider of video analytics solutions, has announced the launch of its breakthrough Anomaly Detection capability, as part of Agent Vi’s cloud-based Software as a Service (SaaS), innoVi™. Combining Agent Vi’s extensive research into artificial intelligence
SecurityLink India ■ August 2018
(AI) and development of deep learning powered algorithms with the company’s 15 years of experience in providing cutting-edge video analytics solutions, the new Anomaly Detection is a robust self-learning capability that instantly alerts users to a typical incident. While innoVi’s Anomaly Detection can be applied to surveillance systems of all sizes, it is particularly valuable for large-scale deployments such as smart cities, where the sheer volume of cameras prevents video feeds from being monitored continuously. In such scenarios, and without pre-definition by the user, Agent Vi’s Anomaly Detection can quickly learn the regular movement and traffic in a scene, and alert to irregular incidents such as a crowd forming or running, a traffic accident or interruption, and more. innoVi turns unstructured video data into structured metadata by detecting and tracking all objects in the camera’s field of view, and then further analyzes the metadata to discover typical object types, motion patterns and models. Anomaly Detection continuously analyzes the scene in real-time and compares it to the learned models to identify and alert users to irregular incidents that may have otherwise gone undetected. This is achieved through autonomous and continuous learning by innoVi without any pre-definition by the user, eliminating the need for manual rule configuration and testing. innoVi boasts Anomaly Detection as well as highly accurate, user-defined rules for real-time event detection, making it an optimal solution for scenes where the events of interest are predicted and well-defined, as well as scenes with continuous motion where it is impossible to predict the range of irregularities that may require user attention. Implemented over scalable cloud infrastructure and applicable to any type of surveillance camera, innoVi is the ideal solution for any type of surveillance deployment, especially large smart city installations. Agent Vi CTO, Zvika Ashani, commented, “By utilizing the latest advances in AI and unsupervised learning, we are able to deliver a solution that fits our customers’ highest priority, namely, increasing their ability to quickly respond to unforeseen security and safety events, and improving overall management of their cities and facilities.”
Radar and Thermal Products For Border Patrol and the Dismounted Warfighter New Drone and land target detection radars plus lightweight monocular offer advanced portable surveillance capabilities
LIR Systems has recently announced the availability of three products for use by global militaries and government agencies including border patrol agents. These products include two FLIR Ranger® mid-range panel radars, one with airborne drone and ground target detection, and the Recon® V UltraLite thermal monocular. The products are part of FLIR’s Soldier Solutions family and demonstrate the company’s commitment to deliver the most advanced equipment to armed services personnel. The FLIR Ranger R8SS-3D and R8SS radars, part of FLIR Ranger family of radars, offer mid-range detection capability for both fixed-based installation and forwarddeployed operations personnel. The R8SS-3D detects both land and air objects such as micro-drones, and differentiates birds from drones. The Ranger R8SS-3D reports the altitude and location of small drones at ranges of 2 miles and can also detect vehicles and people walking or crawling. Both the R8SS-3D and the R8SS, the latter of which offers land detection only, can detect over 500 threats and their exact
FLIR Ranger R8SS-3D drone-detecting radar
SecurityLink India ■ August 2018
locations simultaneously, and work within an existing data network. The R8SS series mount to either a vehicle, surveillance tower, or tripod, and allows for full 360-degree surveillance, ensuring that threats within surveillance range are detected. The FLIR Recon V UltraLite is the latest thermal monocular in the Recon series, which is currently used by military, government, and police forces around the world. Weighing less than three pounds (1.4 kilograms), 2.5 pounds (1.1 kilograms) lighter than previous versions, the Recon V UltraLite can be used as a handheld device or mounted to a tripod or other fixed location. The system also has Android Tactical Assault Kit (ATAK) network capabilities to provide warfighters real-time understanding of what’s going on around them. Durable and easy to operate, the Recon V UltraLite uses commercially available AA batteries and features up to 4 hours of continuous use.
SATATYA MIDR20FL28CWP 2MP IP IR Professional Dome Camera
atrix project series IP cameras are built using superior components such as Sony STARVIS sensor and higher MTF lens to offer unmatched image quality especially during the low light conditions. Powered by true WDR algorithm, these cameras offer consistent image quality even in highly varying lighting conditions. Built in intelligent analytics including intrusion detection, trip wire etc., ensure real-time security. Moreover, H.265 compression and automatic motion based frame rate reduction save bandwidth and storage up to 50%.
The 2D EYE A unique iris recognition device
he TBS 2D Eye is a revolutionary combination of iris algorithm and face detection designed for high security and multi-functionality at point of access. The sensor captures the iris of both eyes while the face sensor is used to automatically adjust to capture the height of the users, highly user-friendly and hygienic for sensitive applications. Developed in cooperation with a leading specialist in iris technology, the new 2D
EYE is fully integrated into TBS platform, offering all the communication, integration and adaptability advantages that make the TBS solutions unique in the market. 96
●● The dark observer – Sony STARVIS series sensor. ●● Crystal clear night vision, color images at 0.08lux. ●● High efficiency video coding – H.265 compression technology. ●● Save up to 50% of storage space. ●● Vision adaptive – true WDR 120db ●● Best image quality even in varying light conditions. ●● Capture more – wider field of view. ●● Eliminate blind spots with 113° view. ●● Versatility – adaptive streaming. ●● Record more frames during motion, less during no motion. ●● Analytics – intrusion, motion detection, no motion, trip wire. ●● Certification – BIS, IP66 CE, FCC, IK10.
SecurityLink India ■ August 2018
SightSensor HD Camera New Ex-Proof Communication Box
ideotec is expanding its range of explosion-proof products with the new MBA communication box, which has been designed for optimal installation of Maximus, IP or analogue cameras in potentially explosive environments. Much more than a simple junction box, this communication box provides low-voltage local power and allows a Fast Ethernet connection, thanks to the integrated Ethernet switch that has three RJ45 ports and an SFP port for fibre optic connection. The type of SFP module can be chosen according to the installation requirements.
The internal spaces are designed to make access to cables easier and to increase user-friendliness when it comes to connection procedures. The internal circuitry also allows a bypass of analogue video signals, and all inputs/ outputs available across MAXIMUS Videotec products. MBA has been designed to integrate and work exclusively with the MAXIMUS range of Videotec products, and so that it can connect a PTZ camera to the associated washing kit (or two fixed cameras to their washing kits). MBA is made of marine-grade aluminium that has an epoxy-powder protective coating. This means that the unit can operate in corrosive areas such as industrial or marine environments. MBA is the complete and competitive solution for professional installation of the Videotec MAXIMUS range of explosion-proof products.
Breaking Price Barrier with New ThermalVisible Smart Camera
ightLogix introduces SightSensor HD, a high performance, thermal-visible smart camera for securing outdoor areas at an MSRP starting at $1,495. The dualstream SightSensor HD combines a thermal sensor for intruder detection, a high-definition color imager for detection verification, integrated video analytics and NIR illumination. The breakthrough security camera is available now through certified SightLogix integrators. “The SightSensor HD raises the bar on the performance for securing areas outdoors while providing the most economical solution available,” said John Romanowich, SightLogix President and CEO, “Through considerable innovation in engineering, packaging and production, we’ve met our customers’ needs for a less-costly camera with the high levels of performance they expect from SightLogix.” Smart thermal cameras have long been recognized as the best intruder detection solution for outdoors, due to their low nuisance alarms, high accuracy and day/ night reliability. But their historically higher cost has limited their use. The thermal SightSensor HD combines SightLogix’s highly regarded video analytics, currently protecting some of the most critical infrastructure in the world, with HD color video into a single, cost effective solution for shorter ranges at critical sites, and at commercial applications like car lots, construction sites and storage facilities. SightSensor HD is available in three models that detect inbound targets at 42 meters (140 feet), 75 meters (245 feet) and 80 meters (260 feet), offering narrow and widearea fields of view. Integrated NIR illumination eliminates the cost of external lighting. Both thermal and color video streams are viewable through a wide range of third-party VMS systems.
SecurityLink India ■ August 2018
Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)
“Security Link India” payable at New Delhi dated__________
* Please subscribe through email@example.com
WE ARE UPDATING OUR DATABASE For free listing in Database:
Advertisement Contact: firstname.lastname@example.org
* Send your detail to email@example.com
Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 100
SecurityLink India ■ August 2018
leading Security Magazine - Latest Security News on Cyber, Video Surveillance, Fire & Safety,Physical, Risk Management, Access Control,Artif...
Published on Aug 10, 2018
leading Security Magazine - Latest Security News on Cyber, Video Surveillance, Fire & Safety,Physical, Risk Management, Access Control,Artif...