Page 1

March 2019

Volume III • Issue 8 • Monthly • New Delhi (102 pages including 6 for cover) RNI No. DELENG/2016/68892

` 200/-

India Risk Review

2019 Maximizing the Value of Data Privacy Investments Interview

Priyadarshan Lakhawat Deputy Director (Academics & Training) NCHMCT, Ministry of Tourism, Govt. of India


Infinova VS-series camera provides unbeatable perimeter prot range performance, reliability, and built-in analy Infinova VS-series camera provides unbeatable perimeter prot range performance, reliability, and built-in analy

VS110 VS110

2MPSmart SmartHDR HDRStarlight Starlight 2MP BoxCamera Camera Box

● People Coun ng

● Vandal Detec on

● Crowd include: Density Detec on ● Outstanding Mo on Detec on performance features ●●Crowd PeopleDetec Coun on ng ●●Fight Detec on Detec on Crowd Density ●●Queue on on CrowdLength Detec Detec

● ●Cross-Line Deteconon Vandal Detec ● ●Invasion Detec on on Mo onDetec ● ●Una ended Object Cross-Line Detec Dete on

n

● Fight Detec on

● Invasion Detec on ● Una ended Object Dete

n

● Queue Length Detec on

World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com Infinova Middle East (Kuwait): Office # 13, 5th Floor, Deema Tower, Mirqab, Kuwait Landline and Fax: +965-2247-5678, Email: Sales-ME@infinova.com

VS120 VS120

2MP Smart Starlight 2MP SmartCamera Starlight Minidome Minidome Camera


From the Editor’s Desk

(102 pages including 6 for cover) Volume III • Issue 8 • March 2019

®

Dear Readers, Greetings from SecurityLink India! Generally speaking, the public perception of police across India is not up to the mark. The Police are the most visible face of the State but over the period they have notched bad image for themselves. The mass notion about the police as a lackluster entity of the law enforcement agency is not conducive for a developing nation like India. But this state of police cannot be attributed to the police themselves but to a range of elements such as their extremely stressful work life, badly disproportionate public police ratio, unethical conduct by some of the seniors and VIPs, scarce provisioning of equipment, and so on and so forth. Aspirants for police service are not corrupt when they join it. They are quite passionate and enthusiastic, but their work environment is not so favorable that they could continue with the like spirit. The Government of India has taken several initiatives aimed at facilitating and supplementing the States/ UTs to augment citizen centric police services. Recently, the Ministry of Home Affairs has taken a commendable step and has commissioned the Bureau of Police Research and Development (BPR&D) to conduct a pan-India survey called ‘All India Citizens Survey of Police Services.’ This is aimed at understanding public perceptions about Police and to gauge the level of non-reporting of crimes or incidents to Police, understanding the position on ground relating to crime reporting & recording, evaluating timeliness and quality of police response and action, and to assess citizens’ perception and experience about women and children’s safety. The survey will be conducted through the National Council of Applied Economic Research, New Delhi. The outcome of the survey is expected to bring out useful recommendations that would help authorities in formulating and implementing appropriate policy and changes in the functioning of police at the cutting edge. It will also improve the state of community policing and crime investigation and prevention. Besides India Risk Review 2019, and an interesting white paper and various other updates, this issue of SecurityLink India carries an interview of the Deputy Director, Academics & Training, NCHMCT, Ministry of Tourism, Govt. of India who spoke at length on the safety and security stature in the hotel industry in India. Till next month, stay safe and happy reading! With warm regards,

Santosh Pathak Mob: +91 9968172237

ISO 9001-2015 CERTIFIED Editor-in-Chief Santosh Pathak Principal Consultant Pritam Singh Mehta SecurityLink India Registered Office: H-187/5, First Floor Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Vibha Dixit Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at: Infinity Advertising Services P. Ltd., Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)

FORM IV Statement about ownership and other particulars about SecurityLink India

Place of Publication: New Delhi Periodicity of its Publication: Monthly Printer’s Name: Santosh Pathak Nationality: Indian Address: H-187/5, First Floor, Jeevan Nagar Market, Kilokari, Near Maharani Bagh, New Delhi-110014 4. Publisher’s Name: Santosh Pathak Nationality: Indian Address: H-187/5, First Floor, Jeevan Nagar Market, Kilokari, Near Maharani Bagh, New Delhi-110014 1. 2. 3.

10

®

5. Editor’s Name: Santosh Pathak Nationality: Indian Address: H-187/5, First Floor, Jeevan Nagar Market, Kilokari, Near Maharani Bagh, New Delhi-110014 6. Names and addresses of individuals who own the newspaper and partners or shareholders holding more than one per cent of the total capital. Santosh Pathak: N-8, First Floor, Satyavati Colony, Ashok Vihar, Phase-III, Delhi-110052 I, Santosh Pathak hereby declare that the particulars given above are true to the best of my knowledge and belief. Signature of Publisher Date: 01 March, 2019


National Roundup

march 2019

CONTENTS NATIONAL ROUNDUP 16 17 18 20 21 23 24 25 26

Safe & Secure Workplaces Conference 2019 Olive Heritage Receives Best Training Institute Award CAPSI in a Bid to Secure FIFA 2022 Hikvision’s Latest Activities in India Fortinet Secures the Path to 5G • SPEEDO – A 24-Hour Service Resolution • CP PLUS Bags Realty+ INEX Awards 2019 Matrix Secures Coca-Cola Manufacturing Units Former IBM Security Executive Joins Cyberbit Ozone Makes Strategic Investment in TrulySafe

28 29 30 31 32 34 35 36

GajShield Helps Tapping Right Security Solutions Bosch 2018-19 – Quarter 03 Financial Results Old Microsoft Vulnerability Shows an Uptick No Seat Belt Detection Technology M4300-96X Modular Switch The Amanora Gateway Towers Select Meet Western Digital Rewards Isha Enterprises ClickShare Receives ISO 27001 Certification

Interview Priyadarshan Lakhawat Deputy Director - Academics & Training NCHMCT, Ministry of Tourism, Govt. of India

Report India Risk Review 2019 WHITE PAPER Maximizing the Value of Data Privacy Investments 12

SecurityLink India ■ March 2019

38

64

82


National Roundup

150 SecurityLink India â– March 2019

13


National Roundup

march 2019

CONTENTS Application/ case studies 42 44 46 47 48 49 50 52

Caesars Upgrades to Hyperconverged Infrastructure with Pivot3 Hochiki Safeguards HTM Hybrid Tower Hikvision Protects Witty Group of Institutions Qatari Bank Standardizes on March’s Surveillance Solutions Fujitsu Online Biometric Authentication for TEPCO NEC Provides Facial Recognition for E. SUN Bank 3xLogic Secures Flint Boys and Girls Club • Oncam Gets Complete Picture of School Security • HID Keeps Hospitals & Staff from Workplace Violence

53 54 56 58 59 60 61 62

CNL Saves Super Bowl LIII Vanderbilt’s SPC for Retail Security 100+ Invictus Cameras for Greater London Towns Johnson Controls Secures New Las Vegas Stadium New Gemalto Biometric Payment Cards Hanwha Secures HÄCKERS Grand Hotel MVP of Security for Stadiums by Avigilon Raymax and Raylux Travel to New Heights

International updates

70-81 Product showcase 88-97

14

SecurityLink India ■ March 2019


National Roundup

57

SecurityLink India â– March 2019

15


National Roundup

Safe & Secure Workplaces Conference 2019

C

orptive Research has recently launched a conference on Safe & Secure Workplaces with MitKat Advisory as the knowledge partner and Securitylink India as the official media partner. Organized on 14 February 2019 in Hotel Sheraton, New Delhi, the conference was a congregation of the security experts, consultants, industry experts and government officials under one common platform. Supported by the Forces Network, CRM Asia, GACS, Intelligensia, SECONA, Crisis Intelligence Community and BDO, the show saw participations from the leading security experts and delegates. The show brought over 100 domestic and globally renowned brands, government officials, consultants and busi-

16

ness experts. The visitor profile of the conference included professionals such as CSOs, admin heads, CIOs, facility heads, system integrators and dealers and distributors. The theme of the conference was focused on the roles and challenges of CSOs in securing the workplaces of today and future. The speakers spoke on myriad of topics like ‘India’s national security policies in the age of uncertainty: its impact on business environment’, ‘Using Advanced Analytics and Contemporary Technologies to Defeat Bad Guys’, ‘Security – a view from the hospitality industry’, ‘Workforce 4.0 and Fourth Industrial Revolution Risks’, ‘Technology is disruptive and game-changing’, ‘Future orientation of

SecurityLink India ■ March 2019

CSOs,’ and so on. The conference witnessed the presence and participation of eminent industry personalities including Nitin Gokhale, National Security Analyst, Author, CEO & Editor-in-Chief, Bharat Shakti; Maj Gen Ravi Chaudhary (Retd.), VSM; Priyadarshan Lakhawat, Dy. Director – Academics & Training, National Council for Hotel Management & Catering Technology, Ministry of Tourism, Govt. of India; Gyanendra Kumar, Head HR, TCS CBO; S M Kumar, Co-founder & MD, MitKat Advisory; Gautam Nanda, Associate Partner, Business Advisory Services, Leader Aerospace, Defense and Security, BDO; Dr Babu Lal, Ex Executive Director, BHEL; and Ranjeet Sinha,


National Roundup

Associate Director, PwC India. The divergence of topics and the amalgamation of perspectives from various industries added to the palette of the causes and concerns of CSOs. The panel moderators were industry stalwarts and the panels saw some heavy discussions. The speaker response was overwhelming and the panels saw par-

ticipations from 7-8 renowned personalities on each panel. Moderating the panel were Sushil Pradhan, COO, MitKat Advisory; Rajesh Sharma, MD – IFM & Asset Services, Cushman & Wakefield; and Hima Bisht, Head – Training, MitKat Advisory. The panel saw participations from panelists from Nestle, Expedia, Reliance, Adani, McKinsey,

Schneider Electric, Sterlite Power, Fortis Healthcare, Jaguar Security, and Delhi High Court, amongst others. Besides the presentations, the participants had the opportunity to attend panel discussions. The conference was accompanied by a networking lunch and networking coffee event. The event was sponsored by Siemens and SLS group.

Olive Heritage Receives Best Training Institute Award O live Heritage Gurgaon has received the best training institute (excellent placement record) by the Government of Haryana under Surya Scheme of Haryana Skill Development Mission (HSDM). Haryana Skill Development Mission (HSDM), the apex body for skill development in the state has progressed immensely, and has positioned Haryana amongst the top performing states across the country. To recognise the sincere efforts of all stakeholders comprising industry, SSC, government organizations, educational institutes/ universi-

Col. K K Singh (Retd.), Director, Olive Heritage receiving the Award from Vipul Goyal, Minister, Haryana Industries and Commerce, Skill Development & Industrial Training (2nd from right)

ties and training partners, the HSDM organized a Felicitation Ceremony cum Placement Summit – 2019 on 24 February 2019 at, Exhibition cum Convention Center, Sector 12, Faridabad, Haryana. The Olive Heritage, a premier security training Institute of the state under the aegis of Olive Heritage Education and Welfare Society was appreciated and awarded trophy of the Best Training Institute (Excellent Placement Record) by Vipul Goyal, Minister, Haryana Industries and Commerce, Skill Development & Industrial Training. SecurityLink India ■ March 2019

17


National Roundup

CAPSI Meets SCDL Doha, Qatar

Bid to Provide Security Guards for FIFA 2022

O

n a joint initiative of Government of Qatar and Government of India, a four member delegation of the Central Association of Private Security Industry (CAPSI) comprising Anil Puri, Vice President, CAPSI & CMD, AP Securitas; Maj Gen K Majumdar (Retd), CEO, CAPSI; and Samarjeet Mahurkar, Director, Checkmate Security; under the leadership of Kunwar Vikram Singh, Chairman, CAPSI met Jassim Al Kabbi, Director, Supreme Committee for Delivery and Legacy (SCDL) at Doha, Qatar on 17 February 2019 to present and discuss the potential role that CAPSI and its members can play in providing security services to the Government of Qatar during the entire conduct of FIFA World Cup 2022. This meeting was facilitated by the Ministry of Home Affairs and External Affairs Government of India. Rajesh Kamble, Counsellor (Consular & Community Affairs) from the Indian Embassy at Qatar accompanied the CAPSI team during the meeting.

The delegate gave a detailed presentation highlighting the capabilities of the Indian security agencies in carrying out like tasks. They also presented the quality of training being imparted to the Indian security personnel at various state-of-the-art training centres across the country. The discussions were held in a very cordial atmosphere, and it is hoped that the meeting will fructify and India will provide the desired number of security personnel to Doha for controlling and safeguarding the event. Earlier Jassim Al Kabbi informed that Qatar was very keen to conduct an absolutely hassle free tournament and in that respect the Government of Qatar was looking towards India to provide professionally competent security personnel to assist them organize the event successfully. He also expressed his willingness to visit India if required and respective opportunity arises. Qatar is preparing to host spectators in greater numbers than those who visited Russia during FIFA 2018. The Chairman extended an invita-

tion to the Government of Qatar to send a delegation to India who can observe and evaluate themselves the standards of guards and the quality of training being imparted to them in India. The CAPSI delegation later called on P Kumaran, Ambassador of India in Qatar at his Office. The Ambassador expressed his keenness to see that an Indian security guard contingent gets an opportunity to provide the desired security cover for the event. He suggested that there are more than seven lakh Indians working in Qatar and the authorities are well satisfied with their behaviour and décorum in the country. He was hopeful that CAPSI has a fair chance to secure the assignment. CAPSI has already formed a consortium of private security agencies to jointly bid for this one of the most prestigious ventures of sport security. Kunwar Vikram Singh said, “CAPSI shall soon be starting special training of security guards as per the recognised international standards.”

CAPSI delegate with Jassim Al Kabbi, Director, SCDL, Doha (3rd from right) and Rajesh Kamble (1st from left)

18

SecurityLink India ■ March 2019


National Roundup

With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.

Soft Facility Management

Hard Facility Management

Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.

Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.

Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.

www.sisindia.com A 5000 crore Indian multinational company

SecurityLink India ■ March 2019

19


National Roundup

Hikvision’s Latest Activities in India Hikvision have been ever dynamic who actively involve themselves in organising and participating in various activities. Recently they were the part of some exciting events and received overwhelming responses. Two of them are as follows:

Hikvision Certified Security Associate (HCSA) Program Successfully Concluded in Mumbai

H

ikvision has recently conducted their three day Hikvision Certified Security Associates (HCSA) program in Mumbai. The program got an overwhelming response from the young security professional community who came from nearby areas of Mumbai and Indore to participate in it. The three day comprehensive program included training sessions on Optics basics, Turbo HD analog solution, PTZ configuration, network basics, IP camera, NVR, fish eye camera, iVMS 4,200 and smart functions and applications. The HCSA training program was conducted by Vinit Narvekar, Manager – Customer Trainings, Prama Hikvision India Pvt. Ltd. The idea behind HCSA is to give hands on training, and demonstration as a part of the training program. There is a dedicated online examination after every training session and HCSA certificates are given to the successful participants.

“Hikvision has set the industry standard by offering professional video surveillance certification to validate video expertise under Hikvision Certified Security Associate (HCSA) program in India. This Hikvision certification program is specially designed for the security professionals. Besides, Hikvision provides meaningful endorsement to those who succeed in the exam and become Hikvision Certified professionals,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. The HCSA level certification focuses on training participants in essential configurations, operations & maintenance of Hikvision video surveillance products and its features. It is designed for technical engineers, who have worked in the security industry for some years and have already gained knowledge and experience about security basics. The certification program is open to anyone looking to gain expertise in video surveillance and total security solution. The trainee should have at least one year of work experience in the security industry and be familiar with security basics.

FONOCOM Expo Showcasing Latest Innovations

H

ikvision participated in the recently held FONOCOM Expo as its presenting partner to showcase its latest security and surveillance solutions to key stakeholders of the security Industry. The event was organized by Madhya Pradesh Computer and Telecom Association (MPCTA) at the Abhay Prashal Sports Club, Indore. FONOCOM is one of the most successful electronics and IT trade fairs of Central India across all categories. “We are happy to be associated with FONOCOM Expo. It is the most important event for security, IT and telecom industries in central India. We have showcased the latest face recognition and face comparison solutions by Hikvision. We showcased innovative security solutions in video surveillance, access control and intruder alarm categories,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. 20

SecurityLink India ■ March 2019


National Roundup

The three day event received good response from government representatives, police and defence and security professionals. Hikvision booth at the expo displayed latest Hikvision products including Smart Pole, Easy IP 4.0, Turbo HD 5.0, access control, video door phone, swing barrier, ITMS, EZVIZ and HikCentral (Video Management System). The booth got good response from dealer, distributor and end-users community from central India’s security industry. The visitors and end-users had shown keen interest in Hikvision’s new products and security solutions. This year Hikvision also took part in Fonocom’s Dealers’ Meet where Ashish Gujarathi, AVP, non-CCTV Products, and S. Chandrasekhar, Manager – Technical Support, Prama Hikvision India Pvt. Ltd. gave presentations respectively on ‘Artificial Intelligence (AI) Technology,’ and Hikvision’s company profile and new products.

Securing the Path to 5G With Proven Security Architecture and Solutions Fortinet security fabric delivers cloud-grade scalability, visibility and control with carrier-grade performance and capacity to secure evolving 4G networks, IoT services and 5G mobility platform

F

ortinet has recently announced extensive capabilities for securing the path to 5G with its expansive breadth and depth of solutions for mobile core networks and cloud infrastructures including its virtual SPU technology and advanced security and high-performance systems. With the promise for faster connection speeds, massive connectivity scale, and new revenue opportunities, 5G will have a profound impact on mobility and digital transformation. Fortinet is uniquely positioned to offer its customers advanced security and high-performance systems that deliver carrier class functionality, rapid scala-

bility, deep visibility, and granular control to secure mobile core, edge clouds and IoT infrastructures.

5G brings both opportunity and risk

T

he advent of 5G will extend a digital connection to almost every facet of lives. In many of the somewhat futuristic sounding new use cases such as autonomous vehicles, AR/ VR immersive experiences, smart cities, ultralow latency, bandwidth and speed, delivery has been the missing puzzle piece. For years now, the mobile interconnection of all these things seemed inevitable, yet SecurityLink India ■ March 2019

the massive density of connections, all with adequate speed, latency and related services, had so far remained unachievable in all but limited proof-of-concept testing. With 5G and the impending orders-of-magnitude advances in bandwidth, connection and use case possibilities, there is opportunity for end-to-end innovation as the mobile infrastructure is transformed into a platform and a catalyst for value creation and service innovation. More than ever, mobile network providers will become secure business enablers. For example, service providers will have new revenue generating 21


National Roundup

 With 5G, mobile infrastructure’s end-to-end innovation will continue to transform into a platform and catalyst for value creation and service innovation. Throughout this transformation, Fortinet’s proven security architecture and solutions provide advanced security for multiple LTE, LTE-A, and 5G use cases to help secure mobile infrastructures from radio access network (RAN) to the telco cloud, and offers customers carrier-grade performance and capacity with cloud-grade scalability, visibility and control  – Rajesh Maurya Regional Vice President, India & SAARC, Fortinet opportunities in IoT such as manufacturing automation, industrial telemetry, emergency response systems, robotic surgery, 4K UHD video streaming, and more. However, these innovations will also bring a corresponding increase in the potential havoc wrought by denial of service, advanced threats and other forms of cyberattack on the core network infrastructure itself. Security is an imperative to protect and operate evolving 4G and new 5G mobile networks. These new service use cases need capabilities beyond a stateful firewall, with capacity and reliability to meet service level agreement (SLA) goals for uptime and quality of experience.

Fortinet 5G breadth and depth capabilities

F

ortinet offers strategic security solutions specifically designed to address the unique challenges facing operators as they migrate their core networks to deliver 4.5G and 5G mobile services. It offers the ability to build a security framework that helps optimize cost of launching and operating new services and revenue opportunities, mitigate advanced threats, and achieve service level goals. Service providers can realize this by utilizing Fortinet advanced security and high-performance systems that also give mobile carriers improved visibility through comprehensive and correlated 22

analytics, the ability to thwart complex external and internal security threats impacting network infrastructure and services at massive scale. The Fortinet security platform offers 5G service providers: ●● Advanced protection for mobile core network and telco cloud: Powered by Fortinet’s virtual SPU technology, FortiGate virtual network functions (VNFs) deliver significant increase in application security performance through innovative security processing optimizations and the latest packet processing acceleration technologies. The VNFs also have a small footprint, boot within seconds, and require less storage, enabling service providers to protect their virtual networks and cloud platform cost effectively. Further, the 5G-ready FortiGate 7000 next-generation firewall series with SPU acceleration provides carrier security features and functions with industry-leading SSL inspection and application security performance for total inline protection. Together, these Fortinet solutions deliver industry’s best scale and capacity to protect 5G infrastructures from sophisticated application layer attacks and massive volumes of DoS attacks originating from outside or inside the mobile core or telco network. SecurityLink India ■ March 2019

●● Agility with security: Fortinet offers broad ecosystem integrations with leading NFV and SDN vendors for virtual infrastructure. To ensure end-to-end security with innovative 5G services such as network slicing and multi-access edge computing (MEC), VNFs must be delivered dynamically, instantiated quickly and available wherever needed on the network. For efficient and agile deployment and utilization of these security resources, Fortinet delivers integrations with NFV platform providers like Lenovo, NFV orchestration (MANO) systems from Amdocs, Ericsson, Ciena, UBiqube, NoviFlow, and SDN controllers like VMware NSX, Nokia Nuage, and Cisco ACI, and NoviFlow. ●● Deep visibility and control for IoT services on edge clouds: Massive scale IoT devices are generally based on lightweight operating systems, which offer minimal security features, therefore they are vulnerable to hijacking and botnet attacks. To remove business risks, the data from these endpoints and the devices themselves require complete protection. Further, service providers offering IoT services via a cloud platform need to ensure multi-tenant isolation, VM and/ or container security and web application protection. Fortinet FortiGate NGFW VNF and FortiWeb WAF VNF protect the edge cloud platform. FortiSIEM provides complete visibility through correlated security analytics and complete visibility to track IoT devices while FortiGate has the ability to learn and profile all connected devices, and apply granular control on different classes of IoT.


National Roundup

Introduces

SPEEDO – A 24-Hour Service Resolution Speeding up the performance, bringing smiles for everyone

R

iding high on future-ready technologies and an innovative range of products, Aditya Infotech Limited stands deeply committed to its customers. After decades of experience in providing best-in-class services, they are taking another quantum leap with the launch of SPEEDO – a 24-hour service resolution, especially designed for their valued channel partners. This program aims to augment customer satisfaction to a higher level and enhance the service delivery process pan-India. According to Yogesh Dutta, COO, Aditya Infotech Limited, “Being a technology-driven enterprise, customer satisfaction is paramount for us. Our products and solutions are increasingly customer-centric and therefore, we have launched the SPEEDO service to walk a step further in customer engagement, thereby working to strengthen the bond with our channel partners. As industry leaders, we think that security and surveillance has an immense potential in the Indian market. Our major focus is now on delivering an exceptional product quality and achieving the highest standards of customer satisfaction.” SPEEDO is a 24-hour dedicated service for our channel partners. The product categories covered under this service are HD plastic body camera, IP plastic body camera, SMPS (CP PLUS power supply), and 4/8/16 recorders (1 SATA). The service will be applicable as per the standard warranty norms and will be available in selected locations only. The maximum turnaround time is 24 working hours, whereas, product will be swapped/ repaired/ returned on the same day itself.

Winning hearts and winning awards too

Bags Coveted Realty+ INEX Awards 2019

C

P PLUS, India’s leading provider of advanced security and surveillance solutions has bagged the prestigious Realty+ INEX Awards 2019. The 3rd edition of Realty+ INEX Awards 2019 was recently held at the ITC Maratha Hotel – Mumbai. CP PLUS won the coveted title of ‘Popular Brand of the Year’ solidifying its position as the strongest brand in security and surveillance industry in India. Renowned for producing intelligent security products and solutions for the local and global consumers, CP PLUS accelerates its pace further by winning this award. Aditya Khemka, Founder & CEO, CP PLUS, said, “We have calibrated our energies for the research and development of path-breaking security and surveillance solutions for our customer, and this award comes as a token of appreciation. It inspires us to introduce more cutting-edge surveillance products and solutions for our customers and strengthen our strong-hold in the market. We are deeply humbled by this win and will look forward to more such appreciations in the future for our work so far.” Speaking on the occasion, Yogesh Dutta, COO, CP PLUS quoted, “We believe in providing tailor-made solutions using innovative security and surveillance technologies in favour of our customers, and it gives me immense pleasure in pronouncing that we are consistently doing it for more than a decade. This award is simply exciting, as well as an honour for the CP PLUS team. We feel invigorated to raise the bar further and see ourselves well-prepared to meet new challenges head-on.” SecurityLink India ■ March 2019

23


National Roundup

Biometric Device Secures

Coca-Cola Manufacturing Units at Pirangut and Kudus, Maharashtra C

oca-Cola’s history began in 1886 and since then it has emerged as one of the most valued brands with a net worth of $74 billion. The company owns and markets more than 500 beverage brands across 200+ countries. Over the last 23 years, ever since its re-entry in 1993 in India, the company has gone on to establish an unmatched portfolio of beverages. The Company along with its bottling partners, through a strong network of over 2.6 million retail outlets, touches the lives of millions of consumers. Its brands are some of the most preferred and most sold beverages in the country. Coca-Cola established its manufacturing units in Kudus and Pirangut, Maharashtra, India and was looking for biometric solutions to secure their premises. They required individual servers at both locations. Their prime requirement was to restrict unauthorized user entry into secured area. Moreover, they required user punch i.e., events for both the locations separately. However, shortage of power supply ports at both the locations was a major problem. Providing separate power for door lock, biometric device and exit switch was a concern. Coca-Cola was in search of a solution where the basic requirements of user events as well as power issue for devices are solved easily. In order to overcome the challenge Matrix offered individual software plat24

SecurityLink India â– March 2019


National Roundup

forms that act as a server for both locations – Kudus and Pirangut. In order to resolve the challenge of shortage of power supply, Matrix offered its premium range of biometric device which itself offers power to door lock and exit switch. Thus, Matrix biometric solution helped in solving both the challenges faced by Coca-Cola. COSEC biometric devices have the capability to supply power to door locks and exit switch/ reader from the device itself.

The products Product

Quantity

Description

COSEC DOOR FOP

40

Fingerprint and card based door controller with LCD, keypad and USB

COSEC CENTRA ME

1

Application server platform with 500 users and expandable up to 1,000 users for basic access control and raw event data

COSEC CENTRA LE

1

Application server platform with 1,000 users and expandable up to one million users for basic access control and raw event data

Results

●● Restrict unauthorized users to secure premises.

●● Reduction in cumbersome HR tasks. ●● Accurate maintenance of user data.

Former IBM Security Executive Joins Cyberbit As Regional Chief to strengthen operations and continue expansion in India/ South Asia and ASEAN Also establishes new APAC headquarters in Delhi NCR as part of its commitment to improve

C

yberbit Ltd., the market leading provider of cyber-range  Cyberbit has proven training and simulation platforms, and of integrated detechnology that perfectly tection and response products across IT and OT Networks has addresses several leadappointed Rakesh Kharwal as the Managing Director, India/ ing cybersecurity issues South Asia and ASEAN. Mr. Kharwal, the former Country like bridging the cyber skill Manager for IBM Security Software, India/ South Asia, will gap through the industry take the helm of Cyberbit’s rapidly expanding operations in the leading simulated learnregion. ing platforms, monitoring Rakesh has a track record spanning over 25 years in the threats across both IT & OT IT industry with over 15 years in the cybersecurity space with networks, or helping organizations improve their stints at Microsoft, McAfee, and most recently at IBM Security detection and response with better security orSoftware where he was instrumental in helping governments chestration and automation. This product/ market and corporates improve their cyber security posture with betfit and the stellar reputation of Cyberbit represent ter orchestration and automation of their security detection and great potential for fast growth  response capabilities. Mr. Kharwal will take the reigns of al– Rakesh Kharwal ready established sales, marketing and support teams serving Managing Director, India/ South Asia and customers across India and Southeast Asia. ASEAN at Cyberbit “We extend a warm welcome to Rakesh and are excited to have such an excellent leader to drive strategic engagements to improve the cyber security posture of all sectors in this important region,” said Adi Dar, CEO, Cyberbit, “India is a key focus market for Cyberbit and our commitment to the Indian market motivated the decision to establish APAC headquarters in Delhi-NCR.” India is deeply affected by the huge global cyber skill shortage and predicted to have a shortfall of 1M skilled cybersecurity professionals by 2025, according to a DSCI report. As the global leader in simulated cyber learning platforms, Cyberbit will contribute to the ‘Skill India’ campaign by aiding enterprises in training thousands of cybersecurity professionals. SecurityLink India ■ March 2019

25


National Roundup

Ozone Makes Strategic Investment in TrulySafe Aims to Provide Security & Surveillance, and IoT Solutions

O

zone Enterprise Group, an Everstone Capital funded company forayed into the fast growing security and surveillance industry in India last year by acquiring Wallcam, a company engaged in the manufacturing and sale of security and surveillance equipment including CCTV solutions. Continuing with its plans to provide high-tech security and surveillance and IoT solutions to its customers, the group

data going to other countries that we keep hearing about. ●● Provide new, innovative, predictive, preventive and user friendly interface backed with state-of-the-art video analytics engine to our users making safety and security a walk of life. ●● Integrate security and IoT (Internet of Things) on a single platform and offer one-stop-shop solution to

 The security, surveillance and IoT industry are very dynamic, and are going through a rapid technology transformation. Both the industries are inter-connected in many ways, CCTV solution is just another connected device in the overall IoT mesh. The differentiating factor for any player in the industry will be the solution or the software. Taking this thought process forward, we have been actively exploring options for either acquiring or investing in an IT development company, and we finally narrowed down on TrulySafe. Going by the credentials of TrulySafe, and the work they have done in the domain, we are excited about this investment, and we are all geared up to make the most of the market opportunity. We will soon be seen as one of the prominent players in the market  – Alok Aggarwal Founder & Managing Director, Ozone Enterprise Group made a strategic investment in ‘TrulySafe,’ a company engaged in providing security solutions including software and hardware to leading OEMs in Europe and USA. Owing to its expertise in the field of security and surveillance, R&D and IT team, TrulySafe has successfully pioneered many industry first solutions. Leveraging on this strategic investment in TrulySafe, Ozone intents to : ●● Build a robust CCTV platform which will be 100% based in India and curb the security threat of our 26

the users including smart homes, smart offices, smart buildings, smart schools, smart cities etc. Sumanyu Vashistha, CEO & Founder, TrulySafe commented, “Electronic security industry is majorly driven by one or two technology providers globally and we saw this as a potential opportunity to build end-to-end platforms ourselves four years back. Based on the genesis of IoT we have developed a robust product ecosystem of software, video analytics, cloud services and hardware which not only provide advance SecurityLink India ■ March 2019

security solutions and integration capability to our systems installers partners but gives air tight security to the user who today is compromising with an ordinary CCTV camera recording. We are extremely thrilled with the investment we have got from Ozone, it will help us grow our R&D and sales operations. We see this as a strategic partnership as Ozone brings expertise to setup global operations efficiently and achieve potential growth.” Ozone is a young dynamic organisation having a diversified presence in architectural hardware, safes and vaults, locks, fire & safety doors and urban furniture. The brand’s solution centric approach has enabled them to grow from a start-up to becoming India’s most popular architectural hardware solution provider, which has been able to prove its worth in international markets. The company has a global presence across 15 countries, 4 R&D centres in Israel, Korea, China & India and 4 state-of-theart factories in India & China. Ozone offers internationally certified products and solutions through its product portfolio of more than 3000 SKUs across various product categories. Ozone today ranks amongst the top 3 players in India in architectural hardware, and amongst the leading players in safes and vaults and fire and safety doors. Ozone has strong presence internationally with offices in India, Canada, Australia, Dubai and distributor’s network in Poland & Saudi Arabia.


National Roundup

SecurityLink India â– March 2019

27


National Roundup

Helps Customers Tap into the Right Security Solutions Compatible to Existing Infrastructure

G

ajShield Infotech, a leading provider of network, cloud and data security solutions, are the preferred choice of Indian enterprises when it comes to implementing UTM and firewall solutions. Enterprises are opting for GajShield’s next generation fire-

data centers located in India. GajShield has been successful in creating a niche in India with their 24x7 customer service including better and faster support and upgrades. Enterprises are relying heavily on GajShield to breach the gap between the security

 Our aim is to use our core strength in data se-

curity to penetrate the Indian market and help enterprises flourish. The growing need for data security has enabled us to come up with custom-made security solutions optimized for Indian enterprises. Customers recognize the added edge we provide through our compatible products and solutions which can easily be merged with client’s existing infrastructure and software. Continuous research and expansion have helped us serve a varied portfolio of clients and we aim to strive tirelessly to create a secure ecosystem for Indian enterprises  – Sonit Jain CEO, GajShield Infotech India Pvt. Ltd. wall security solutions over popular international security vendors. With the new proposed personal data protection bills requiring confidential customer data to stay inside the country boundaries, GajShield is among the leading security solution providers equipped to handle the current compliance issues. Enterprises prefer GajShield as they provide data compliance and optimized support with 28

vulnerabilities and provide holistic data security services. The frequently evolv-

SecurityLink India ■ March 2019

ing data breaches are also playing a vital role in compelling enterprises to move out of application security and focus on installing complete data protection solutions hand-picked by GajShield. GajShield cater to more than 15000 clientele across the globe and have heavily invested in government, education and service sectors. GajShield have been a salient player in driving data security in India for the past 17 years assuring long term security with its wide range of products having extensive features like DLP, CASB, Enterprise Cloud, BYOD etc., to name a few. GajShield is the only Indian vendor to be named in the Gartner’s 2018 Asia/ Pacific Context: Magic Quadrant for Enterprise Network Firewalls. GajShield is a leader in innovating security technologies like context based data leak prevention, cloud security, zero-day anti-ransomware, OOPs based management and more. GajShield is one of the few companies worldwide and the 1st Indian firewall product company to have earned ICSA labs firewall certification criteria 4.1. GajShield Infotech (I) Pvt. Ltd. since its inception in 2002 has been focusing on providing network security solutions to corporates. Their Mission is to make the Internet a safe place to do business.


National Roundup

2018-19 Quarter 03 Financial Results

Security Division Contributes the most in Business Beyond Mobility Registers a Growth of 19.3 Percent in Profit After Tax (PAT) ●● Total revenue from operations witnessed a muted growth of 0.8 percent in Q3 of FY2018-19 over the same period of the previous year. ●● Profit after tax (PAT) stood at 10.8 percent of revenue, an increase of 19.3 percent over the same period of previous year quarter. ●● PAT for the period Apr-Dec 2018 increased by 26.6 percent over the same period of previous year.

B

osch Limited, a leading supplier of technology and services, posted total revenue from operations of INR 3,096 crores in Quarter 3 of FY 2018-19, registering 0.8 percent increase over the same period of the previous year on a comparable basis. The Profit before Tax (PBT) stood at INR 490 crores, registering a growth of 15.8 percent over the same period of previous year on account of improved operational efficiency, favorable product mix and higher investment income which was partially offset by negative exchange rate on material cost. The Net Profit after Tax (PAT) stood at INR 335 crores, an increase of 19.3 percent over the same period of previous year. For the period from April to December, 2018, Bosch Limited posted a total revenue from operations of INR 9,509 crores, an increase of 11.4 percent over the same period of previous year. PBT stood at INR 1,780 crores and PAT stood at INR 1,186 crores, an increase of 26.6 percent over same period previous year. “The result of this quarter has to be viewed in the context of particularly weak market conditions in the overall automotive sector. Bosch Limited

has always been committed to deliver best-in-class automotive solutions. We are helping our customers to meet the challenge of manufacturing only vehicles compliant with BS VI emission standards from April 2020 as per the ruling of the Supreme Court. Bosch has recently also showcased its business beyond mobility offerings that are fast embracing digital platforms and IoT Services. Having said that, the focus on strategic topics and operational efficiencies will continue,” said Soumitra Bhattacharya, Managing Director, Bosch Limited.

Snapshot of business divisions’ performance in Quarter 3

B

osch Limited’s Mobility Solutions turnover marginally decreased by 0.6 percent in Quarter 3 of FY 201819. Mobility division exports have increased by 6.5 percent and it is offset by lower domestic mobility sales of 1.1 percent. Within the mobility solutions business, the Powertrain solutions division declined by 2.7 percent mainly due to weak automotive market and Automotive Aftermarket division grew by 5.8 percent. SecurityLink India ■ March 2019

Bosch’s business beyond Mobility divisions registered a growth of 6.9 percent. The growth in this segment is mainly driven by security systems which grew by 16.9 percent and solar energy division which also showed a double digit growth, partly offset by reduction in thermal technology division. For the period from April to December, 2018, total turnover showed a growth of 11.9 percent. Sales of the mobility solutions sector increased by 10.5 percent on the buoyant automotive market during first half of 2018-19 whereas business beyond mobility solutions witnessed a strong double-digit growth of 20.5 percent. Pursuant to the approval of the Shareholders for buyback of equity shares of the Company, the letter of offer for buyback of up to 10,27,100 equity shares of the face value of Rs. 10 each of the Company on a proportionate basis by way of a tender offer through the Stock Exchange mechanism for cash at a price of Rs. 21,000 per equity share for an aggregate amount of up to Rs. 2,156 crores was sent to the eligible shareholders. The buyback period opened on February 06, 2019 and shall close on February 20, 2019. 29


National Roundup

Threadkit, Formbook Exploit Old Microsoft Vulnerability Shows an Uptick E

-mail messages are frequently sent over untrusted networks that are outside the organization’s security boundary. When these messages lack any appropriate security safeguards, they can be read, copied, and modified at any point. In India alone email marketing has been extensively utilized in the media, IT and telecom, retail/ e-commerce, travel and leisure, and the BFSI industries as the primary source of marketing for business expansion purposes and customer retention and satisfaction. As per the study, in 2016, the worldwide market for email marketing stood at US$4.51 billion. Expanding at a healthy CAGR of 19.60% between 2017 and 2025, this market is likely to touch US$22.16 billion by the end of 2025. E-mail security relies on principles of good planning and management that provide for the security of both the e-mail system and the IT infrastructure. If there is no proper security system the attackers can exploit the email to gain control over organization and access confidential information. According to a research, a file-hosting service registered within the last week is being used to spread information and stealing malware in another FormBook campaign, currently attacking retail and hospitality businesses both within and outside of the US. Recently, in a blog researchers wrote, “As with many information stealing and credential harvesting malware, FormBook’s infection chain starts with a phishing E-mail containing a malicious 30

attachment, which is generally an office document or a PDF file.” The vulnerability was first discovered and patched by Microsoft in July 2017 now is being exploited again by ThreadKit (an exploit kit popular among low-skilled attackers) via the Formbook malware (a data stealer and form grabber). This serves as a timely reminder about how important it is to install update patches when they’re released. The origins of the vulnerability can be found all the way back in July 2017 when Microsoft published CVE-20178570, a high-severity code execution vulnerability in Office. Although Microsoft released a patch the same month, the vulnerability was still exploited in the wild. The first reported exploit came one month later, with a subsequent instance from ThreadKit following in March 2018. And now a third exploit has been spotted, one and a half years after the vulnerability was first published.

How does the exploit by formbook work?

T

he exploit works by emailing a Word document to the user. The email address and the subject appear to be authentic – they contain details that look real and often mimic the addresses and the verbiage of genuine companies. This social engineering method helps establish trust with the user, leaving them with few reservations about opening the attached file. If the user is fooled by the email and then clicks the attachment, the RTF file SecurityLink India ■ March 2019

opens and closes almost immediately. While this looks like Word has simply collapsed, what’s actually happening is that it’s downloading and extracting a ZIP file. Another fake Word document, containing the source code for a phishing HTML page and the malware payload, is stashed within this ZIP file. The user is unaware that this is happening. All they see is the original Word document appearing on their screen. For all intents and purposes, they believe that Word crashed and then rebooted. They have little idea that they’re now harbouring a malicious stowaway that’s ingesting their confidential data.

How to protect yourself against the formbook malware?

T

hankfully, the effects of this exploit, and others like it, can be avoided by installing patches when they’re released. But for many operations teams, a patch from summer 2017 – for a non-critical vulnerability – doesn’t just jump to the front of the to-do list. In organizations where threat intelligence isn’t regularly incorporated in patch prioritization, this vulnerability will likely remain unpatched. Skybox first alerted customers to the exploitability of the vulnerability in August 2017, raising the remediation priority to ‘urgent,’ and further, how threat-centric vulnerability management approach prioritizes vulnerabilities by exploitability and exposure in the e-book.


National Roundup

Unveils

AI & Deep Learning Powered No Seat Belt Detection Technology V

ideonetics has recently introduced artificial intelligence and deep learning powered ‘No Seat Belt Detection’ technology, which aims at detecting the drivers with no seat belt worn in real-time while driving four-wheeler, and consequently violating traffic laws and putting their lives at risk. According to the World Health Organization (WHO), globally about 1.3 million people and 20 to 50 million are injured die in road crashes every year. The risk of dying in road accidents is more than three times higher in low income countries than in high income ones. Wearing seat-belt reduces the risk of drivers and the front seat occupants by 45-50%, and the risk of death and serious injuries of rear seat occupants by 25%. Powered by patented AI & DL framework, No Seat Belt Detection technology is trained with the real-time video data of over five years, thereby ensuring highest level of precision in identifying the most dangerous driving risks even in tough environmental conditions including at night. The indigenous technology is well-competent to analyze gesture movement of the driver who is driving any type of four-wheelers including private car, taxi, jeep, lorry, truck and so on. After capturing the license plate of the violating vehicle with ANPR, the system generates alerts with the evidence video. Additional-

 At Videonetics, we are constantly innovating state-of-the-art technologies for evolving markets. This is indeed a proud moment to launch Industry’s First AI & DL based No Seat Belt Detection technology globally. The new addition to ITMS suite will further inculcate traffic discipline amongst citizens as well as reduce road crashes  – Dr. Tinku Acharya Fellow IEEE, Founder & MD of Videonetics ly, events are stored for later analysis. No Seat Belt Detection technology can seamlessly assimilate with integrated e-challan/ e-ticket management software to generate challans/ e-tickets with details such as violation image, time stamp, date and vehicle number etc. The enormous potential of the solution empowers Videonetics intelligent traffic management system (ITMS) suite to enhance real-time traffic monitoring, identify and process traffic offences, eventually mod-

SecurityLink India ■ March 2019

ernizing the traffic management solution and establishing traffic regulation and enforcement across the city. With this latest addition, Videonetics augments ITMS portfolio encompassing automated number plate recognition (ANPR) system, red light violation detection (RLVD) system, detection of use of cellphone while driving, no helmet detection, triple riding detection, free left turn block detection, over speed detection, traffic congestion detection, wrong parking detection, no parking detection, smart dashboard, data visualization to name a few. ITMS is successfully deployed at many cities such as Kolkata, Ranchi, Indore, Bhopal, Bangalore and many more. It has achieved benchmark in replacing tedious manual processes to track, regulate and analyze vehicle movement on roads, and to enforce traffic rules for safety of citizens towards success of national smart city mission. 31


National Roundup

Unveils

M4300-96X Modular Switch to Simplify AV-Over-IP Deployments New SDVoE-ready switch streamlines audiovisual display solutions to scale with your business needs

N

ETGEAR®, the leading provider of networking devices that power today’s smart home and small to medium-sized businesses (SMBs), has introduced the NETGEAR ‘M4300-96X’ Stackable 10G and 40G modular managed switch. The NETGEAR M4300-96X is the 2U rack height modular switch that comes either empty or pre-populated, and scales up to 96 ports of 10G Ethernet or up to 24 ports of 40G Ethernet, or a combination. With 12 open slots and two redundant power supplies, the M4300-96X supports maximum granularity between copper, PoE+, and fiber and unrivalled headroom for organizations buying infrastructure for the long term. IP convergence has already happened with telephony, surveillance and audio industry, but it has been limited in audio video industry so far. Now, with the new line of products from NETGEAR, the convergence in the profes-

32

sional AV industry is simplified, and this industry is also moving to the network. The software defined video over ethernet (SDVoE™) alliance provides a standard programming interface so that even if components are sourced from different suppliers, products and solutions such as the M4300-96X Switch merge easily and cost-effectively into a modern and open platform without complex coding. To truly converge, IT and AV networks, pre-configured 10 Gbps infrastructure is ready with NETGEAR SDVoE-ready M4300 switches. Instant installation with pre-enabled IGMP/ multicast, scalability and affordability

SecurityLink India ■ March 2019

gets your ProAV deployment running in no time, with optimal 4K no-compromise quality. To take unnecessary complexity out of AV-over-IP deployments, NETGEAR created M4300 switches that are preconfigured for easy, true AV and multicast Zero Touch network configuration. IGMP Snooping, IGMP Fast Leave and IGMP Querier are already enabled for the default VLAN 1 that devices will automatically use – no need to log onto the switch. Simply select the M430096X port expansion cards that fit your requirements, insert the cards, connect your SDVoE encoders and decoders, and power on the switch. “The commitment of NETGEAR to the SDVoE standard means that SMBs & Enterprises can leverage NETGEAR switching products that are easy to set up and are used to provide the backbone network for their audio-video products. Our M4300-96X Managed Switch is far superior to a fixed port solution, as you can start small and add capacity in non-blocking mode, merely by adding port expansion cards,” commented Marthesh Nagendra, Country Manager – India & SAARC, NETGEAR.


National Roundup

SecurityLink India â– March 2019

33


National Roundup

The Amanora Gateway Towers Select Meet The first worldwide residential project marveled by Swarovski chose MEET by FERMAX IP Door Entry System

T

he Amanora Gateway Towers are an outstanding piece of art and technological innovation, located in Hadapsar, Pune (India), which includes Fermax new IP door entry system as the intercom and access control technology. The project is a part of the Amanora Park Town. The Gateway Towers are the world’s first towers embellished by the luxury brand Swarovski. This project is composed by 5 buildings in total. These are the tallest towers in Pune, consisting of 45 storeys (150 metres high), offering luxury apartments with top views to the city. Fermax was chosen as the door entry system supplier on this residential construction, with the flagship 100% IP technology, The architectural project was designed by the world renowned P&T Consultants (Singapore). City Group led the project’s development, one of the top real estate developers in Pune. The Gateway Towers offer exclusive features to the residents with its futuristic design and green spaces. The interior spaces, marveled by Swarovski, were conceptualized by Total Design Solutions (Bangkok), adding an exquisite new residential project in Pune’s skyline.

MEET by FERMAX: A versatile door entry solution for the Gateway Towers

F

ermax intercom system installed in the Amanora Gateway Towers is based on MEET 100% IP system. MEET provides the users a great HD video quality and crystal clear audio communication. The installation was easy because

MEET allows the installer to define the IP range according to the project’s needs and makes the network management easier. The equipment included in the installation is composed by: 3 MILO video digital touch panels, 472 MILO 1 way panels for each apartment entrance and 472 MIO 10” Monitors installed in the interior of each apartment. The installation was completed with a MEET Guard Station, which serves a central security and access control device managed by the property administrator or concierge staff. Outdoor, Amanora Gateway Towers incorporate the Fermax MILO touchscreen panels with digital keypad and proximity access control, the perfect combination of metal and toughened glass. Thanks to its icons, it is easy to understand the status of the communication. MILO digital panel is combined on the installation with single push button panels to call the apartment or to perform a direct call to guard unit as

Amanora Gateway Towers, located in Pune (India)

34

SecurityLink India ■ March 2019


National Roundup

an emergency point. In the apartments, thanks to the elegant and distinguished MIO monitors style, end-user have an advanced intercom system in the home, with hands-free communication. Its TFT incorporates a capacitive touch screen that offers a user-friendly experience including graphic icons and notification LEDs (missed calls, messages, do not disturb). Additionally, now thanks to MEET ME call divert application, users can receive the calls in their smartphones, as MEET by FERMAX includes this functionality. This App is available for both Android and iOs mobile devices.

MEET projects around the world

M

EET has become a competitive solution for those looking for a versatile, cost-effective and reliable IP door entry system. It can be integrated with CCTV solutions, alarm systems, access control and home automation applications. The new IP system by Fermax is established in the door entry and security market, being installed in several projects around the world – Argentina, Australia, China, Colombia, Ecuador, Guatemala India, Middle East, Spain, United States, Peru and so on.

Western Digital Rewards

Isha Enterprises for Excellent Performance in Purple Achievers Programme

W

estern Digital has rewarded one of its alliance partners, Isha Enterprises for achieving the highest position in the WD Purple achievers promotion program for the period from 1 October to 30 December 2018. Isha Enterprises is a supplier and system integration company based at Pune dealing in various security and fire products. Rahul Mudha, the owner of Isha Enterprises, was handed over a Hyundai Santro car as the reward under this program by Anand Pandit, Country Manager – IT Channel, Western Digital India. The Purple Achievers promo was an incentive based program in which the partners were assigned targets and there were rewards applicable on achievement. “Western Digital has always been one of our key partners for CCTV storage drive. WD Purple is one of our top selling products. We always look forward to these kind of promotions from the company. We are happy that we won this quarterly promotion,” said Rahul Mudha. “We always believe in motivating and encouraging our channel partners through these kind of promos and reward them for the loyalty they extend to our company. Isha Enterprises has always been one of our prestigious partners and we look forward to a great association with them. We congratulate them for winning this promo,” said Jaganathan Chelliah, Director – Marketing, Western Digital India. SecurityLink India ■ March 2019

35


National Roundup

ClickShare Receives ISO 27001 Certification for its Security Processes Illustrating Barco’s commitment to provide effective and secure collaboration tools for enterprises, ClickShare has received ISO 27001 certification for its overall security management

S

ecurity is a very hot topic in business these days. The consequences of security breaches can be enormous, harming both the company that is affected, and its customers and suppliers. Since the ClickShare product range is providing an experience that integrates within a company’s workplace, processes and systems, its security is a key concern for development and management.

As a company that develops high-quality wireless collaboration solutions, ClickShare was designed with security in mind. This is why it took the time to undergo thorough procedure of getting ISO certification for its processes as a whole. Thus becoming the safest choice ànd one of the only products with this certification in the market of wireless collaboration technology.

Secure against what?

S

ecurity threats can take different forms, but the most frequent are either the extraction of sensitive information, or attacks on a company’s core IT system. ●● In the first, confidential market information could be targeted. Another frequent tactic is to extract and share the details of users and customers. 36

●● In the second, viruses or bots could be introduced into the company’s system causing damage to their day-today operations.

What does Barco secure?

A

s part of the ISO 27001 certification, Barco undertook a root-and-branch audit of everything related to development, sales, deployment and support of ClickShare. The goal was to ensure that all processes are in place and followed to provide a waterproof solution, and that if an issue arises in the future, they are dealt with rapidly and completely. “You can never claim you are 100% secure,” pointed out David Martens, Product Security Architect, “What we have to ensure, therefore, is that we are proactive and that our response is ready to swing into action at short notice. For that, these risks must be acknowledged and the right mitigations and processes have to be in place.” The audit went deep in all the ClickShare development centers – Kortrijk, Taipei and Noida. From examining information security management in the development processes to checking physical security aspects like badging and door procedures. The security controls have been implemented based on an extensive risk assessment, which have been reviewed during the audit and also the effectiveness of the security controls has been verified.

Continuous development

T

he whole process started in 2017 involving many teams. “The ISO certification is valid for three years,” explained Patrick Depuydt, ISMS Coordinator, “But audits are run every year, which will enable us to work on continuous improvement. This keeps us up to speed with the changing nature of the threats.” The ISO certification is also useful to companies considering Barco as a supplier. “Many have their own security questionnaires,” noted Patrick Depuydt, “The certification will answer many of their concerns.”

SecurityLink India ■ March 2019


National Roundup

SecurityLink India â– March 2019

37


Interview

Face-to-Face with

Priyadarshan Lakhawat Deputy Director - Academics & Training

National Council for Hotel Management & Catering Technology Ministry of Tourism, Govt. of India The rising instances of fire in high-rises and hotels, and very frequent news of defunct security systems at places including in the cities like New Delhi put forth reasons to be concerned about the state of compliance of pertinent rules and regulations, and installation and maintenance of the needed equipment. The recent fire in a hotel in Karol Bagh, New Delhi must be taken as an wake-up call to address the issue on urgent basis. The lapses are prominently found at both ends – the system and service providers as well as the service takers. Besides, while at one end there are lapses in the hands of government authorities including the licensing ones, consumers are also not aware and alert towards their duties and entitlements. They appear to take security as granted and consider it of the least value in affairs of life. India necessarily needs to evolve a culture of security and safety. To understand the subject in detail and spot the points of lapses and improvements, SecurityLink India has recently spoken to Priyadarshan Lakhawat, Deputy Director - Academics & Training, National Council for Hotel Management & Catering Technology, Ministry of Tourism, Govt. of India. Mr. Lakhawat is the winner of two national awards for excellence in hospitality education – Best Teacher for the Years 2012-13 & 2013-14, and Indian Hospitality Congress – Educator’s Award 2015.

SecurityLink India (SLI): How do you see Security & Safety in terms of necessity vs. business? Priyadarshan Lakhawat: Derek Bok, President of Harvard University, once remarked, “If you think education is expensive, try ignorance.” Same principle is applicable for the hotel security systems as well. Of course, security comes with a cost for the business but in comparison the price to be paid for its absence is humongous – particularly, in today’s environment when security risks in hospitality industry are varied and manifold. A guest is concerned about the securi38

ty aspects in his immediate environment and it’s one of the important concerns for him in making a purchase decision. Investment in security is no more a choice but forms the core aspect of hotel operations, and can be overlooked only at the cost of paying a great price in the long run. SLI: Kindly mention some major threats of hospitality industry in the world’s perspective? Priyadarshan Lakhawat: Hospitality industry is highly vulnerable to security threats. Hotels are public places with

SecurityLink India ■ March 2019


Interview

lots of porosity. There is this constant conflict between maintaining the privacy and pleasant experience of guest while at the same time implementing the laid-out security procedures. If we look at the major security threats they come in the form of fire, cyber-threats, natural calamities, theft, assault, bomb threats, terrorism and physical brawls. However, this list is just indicative. As a matter of fact, any threat which we may perceive at any place is very well applicable inside a hotel as well. SLI: And what are the threats in India? Priyadarshan Lakhawat: Threats in hospitality industry in India are similar to any other part of the world. Infact, hospitality industry is more global in its character than most other sectors. So, issues and concerns are almost similar everywhere. However, in India an additional problem is with regard to implementation of regulation. Laws and regulations governing hotel industry in India are as potent as in any other part of the world. Unfortunately, the same cannot be said about the implementation of law. Particularly in semi-organised and unorganized sector many a times we find a blatant disregard for procedures. Responsibility lies with both, the business as well as the law enforcement agencies. Look at the recent fire tragedy in a Karol Bagh hotel in the heart of national capital. Do we need a wake-up call in the form of a loss of 17 precious lives? According to newspaper reports, all rules related to fire safety have been overlooked in this hotel and still they were able to operate. It’s a dangerous situation and does not augment well for the brand Incredible India. Effective deterrence mechanism is required for this kind of criminal negligence and connivance. SLI: Which of these do you rank as the top threats both for India and the world? Priyadarshan Lakhawat: I will put cyber crime and identity thefts at the top of the pyramid. Guest data is highly vulnerable as there are several points in a hotel where data is taken and recorded such as reservation, check-in, restaurant, any point-of-sale etc. There are also some external intermediaries who are involved in the process and chances of leakage are always there. Look at the case of Marriott International. In last 5 years, since Marriott took over Starwood, data of 500 million users is feared to have been compromised which includes not only the financial details but also the passport information. Marriott share has come down by 5.6% as per reports.

 Investment in security

is no more a choice but forms the core aspect of hotel operations, and can be overlooked only at the cost of paying a great price in the long run

While it is a case in public domain, I do not single out Marriott. This is happening everywhere and this may happen anywhere. There is an immediate need for hotels to get help of specialized agencies to counter this menace. Effective checks are required at all levels. I always say that the abuse of technology can only be countered through the use of technology. We cannot develop an ostrich mentality and bury our heads in the sand while the predators are lurking all around us and are impacting our business. Ransomware has attacked several central servers and has blocked not only hotel software but also in some cases the lock and key systems of hotel rooms resulting in not only huge inconvenience for guests but also great financial losses to hotels. All this points out to a pre-emptive approach and checks in place. SLI: What is your take on the legal provisions in relation to the security and safety of hospitality industry in India and how competent do you find them? Priyadarshan Lakhawat: As I said the law related to setting-up and running a hotel in India is potent and well thought of. It starts from having a building permit. Ideally, the layout should be approved before hand with provisions for fire safety, water supply, drainage, sewerage, electrification, parking etc. Additionally, there are norms related to fire safety permit, police license, health license, ESI, PF, FSSAI, VAT etc. While, these licenses are well meaning and should serve as a good check and balance system in the running of business, many a times they are windows for corrupt practices thereby not fulfilling the purpose for which they exist and also creating an uneven playing field for those operators who want to work lawfully and ethically.

SecurityLink India ■ March 2019

39


Interview

 World over, we have created a very fine example of our commitment towards our concept of Atithi Devo Bhava. During the unfortunate incidence of 26/11 terror attack, many Taj and Oberoi employees stayed back to help and rescue guests, while they had an option of moving out to safety. They were neither duty-bound nor even morally expected to do what they did

SLI: Security being the basic requisite for the hotel business, should be the responsibility of all. How far the members of staff other than security staff are made to aid and complement it? Priyadarshan Lakhawat: In a hotel, all employees are a part of the security team – only this kind of approach can create a near fool-proof security environment. While security staff is specialized to handle technology and also to carry out safety and security procedures, they cannot be fairly expected to be omnipresent – particularly in an hour of crisis. As an example, at a time of evacuation or while reporting any suspicious activity, each and every employee of the hotel has a very important role to play. SLI: How do you look at Indian hotel employees in this context? Priyadarshan Lakhawat: Hospitality is a part of our ethos and culture. It comes naturally to us. Therefore, I rate hotel employees in India on a very high scale when it comes to delivering safety and security for their guests. In fact, we have a very proud example of Taj and Oberoi employees during the unfortunate incidence of 26/11 terror attack. Many hotel employees stayed back and were put to help and rescue guests, while they had an option of moving out to safety, as 40

well as they were neither duty bound nor even morally expected to do what they did. World over, we have created a very fine example of our commitment towards our concept of Atithi Devo Bhava. While this is a very good example of the right mindset of hotel employees in India, the competencies are definitely required to be developed through constant training. SLI: What is the significance of training in this context? Priyadarshan Lakhawat: There is an age old adage in army – more you sweat in training, less you bleed in battle. This is an apt statement for most walks of life. In hotels, two areas – in particular fire safety and first aid – are the responsibility of each and every employee and specialized training on a regular basis should be mandatory part of the training calendar of all hotels. Training should start at the level of hospitality training institutes and then should be a part of career long reinforcement sessions. SLI: You are looking after academics and training at NCHMCT. Kindly explain the role the training institutes can play towards accomplishing a threat free hotel business in India? Priyadarshan Lakhawat: I work for National Council for Hotel Management and Catering Technology which is an apex body under Ministry of Tourism in the field of hospitality education and training. We have about 80 affiliate institutes in the country where a standard curriculum is being followed. These institutes are the major feeder source of manpower in the organized hospitality sector in country. The NCHMCT curriculum puts a lot of focus on safety and security with fire safety, first aid, bomb threats, theft, situation handling being a part of our training programs. However, a major part of work force in India, particularly in hotels other than 3 star to 5 star is without any formal qualification in this trade. That puts a lot of onus on hotel managements and also on regulatory mechanism to mandate regular trainings and drills. Similarly, reinforcement training programs and fire safety/ evacuation drills should be conducted atleast twice a year for all employees at all levels. SLI: There are usual security lapse at the end of people/ consumers in India who generally take security as granted and keep it at the back seat. What is your take on the safety and security culture in India?

SecurityLink India ■ March 2019


Interview

Priyadarshan Lakhawat: Safety and security can’t be just a part of procedure. I mean it should not be just a mechanized affair. It has to be a part of the organizational culture where each and every employee considers it to be his or her responsibility. The Bali night club bombings, Las Vegas Shooting, Paris café attack – each of them has indicated that danger lurks far closer than what we thought it to be. The watershed moment in India’s hospitality sector remains 26/11. Terrorism in India’s hospitality sector is not the number one threat. It may not be among top five threats as well. However, in terms of mindset paradigm, it had the same effect for India’s hotels as probably 9/11 had for airport security in USA. Before 26/11, hotel employees in India looked at security systems as an unavoidable occupational hazard. Security and hospitality were considered antithesis of each other rather than having a symbiotic relationship. Those few hours of mayhem came as a black swan moment and changed the way hotel security will be perceived forever.

of a brawl in a Janakpuri hotel in which guests resorted to mob violence against staff as they did not like the buffet food is one such case in recent past. However, the problem is far more prevalent than what is seen on the surface. In hinterland India it is a part of everyday existence of a hotel employee. The condition of female employees is far worse with them being viewed as commodities rather than as professionals providing a service. Unfortunately, in some cases, even some of the most reputed hotel chains have not stood up and taken a stand for a female employee in case of misbehaviour by a guest. Only in a safe environment, an employee will be able to deliver at his best. Operational workplace hazards such as lifting of heavy weights (particularly in kitchen and housekeeping), long shift hours, lack of work-life balance etc. take a heavy toll on efficiency and morale of staff. This certainly is also an issue to be taken up with equal amount of seriousness and to be addressed along with other safety and security issues to attain a holistic safe environment.

SLI: What lapses in terms of security and safety do you find in India? Priyadarshan Lakhawat: Today, safety and security apparatus and system is part of star classification norms in India. Security is not limited to just guarding entrances but it includes a wide gambit of tools and techniques. At the risk of sounding a naysayer, my concerns to security environment in Indian hotels are still there and most of them are not misplaced. First of all, security systems can’t be for regulatory compliance only. They must be well meaning in spirit. For instance, CCTVs work as eyes and ears of a security system. They cover not only peripheries but also public areas and corridors. However, you will often find that many CCTV are just ornamental in their utility. They are defunct. The quality of camera is also suspect in terms of resolution and night vision. Chinese products at a low cost and lower efficiency are preferred gadgets instead of the better ones with operational efficiency. Fire extinguishers, if fortunate to be there, are expired lots. Problem as I said earlier is more acute in smaller category of hotels. This is on account of lack of awareness, lack of intent and lack of training. We just wait for a mishap to happen.

SLI: What are your recommendations towards safety and security of hospitality industry? Priyadarshan Lakhawat: Let me put my recommendations in the listed format: ●● Well laid-out crisis management plan for different emergency situations. ●● Proper training of security staff. ●● Training of all hotel employees for fire safety, first aid and evacuation drills. ●● Regular operational check on fire alarms, smoke detectors, CCTV/ security cameras, emergency power etc. ●● Police verification of each and every hotel employee. ●● Extra security measures for women guests like mirrored walls of guest corridors, separate eva floors, assigning rooms closer to elevators, presence of security on each floor. ●● Well lit public areas – especially parking and other vulnerable places. ●● Creating awareness among guests without actually scaring them off. Inform them about not leaving their rooms open, fire exit plans, not to announce their room numbers loudly in public places, do’s and don’t for their own safety, and so on. ●● Use of anti-virus, anti-ransomware, anti-data theft programs as part of cyber security. ●● Comprehensive security audits through external specialized agencies.

SLI: How do you view the state of employee safety in the hotel industry in India? Priyadarshan Lakhawat: Safe employees are as much a part of hotel safety systems as safe guests. Recent incidence

SecurityLink India ■ March 2019

41


Application/ case study

Caesars Entertainment Upgrades to Hyperconverged Infrastructure To improve the customer experience

C

aesars Entertainment is one of the most established and innovative names in the global gaming industry, having served as a market leader for more than 40 years. Caesars Entertainment EMEA has a diverse portfolio of gaming, entertainment, restaurants and bars at locations throughout the United Kingdom, South Africa and Egypt, and has plans to continue to expand its operations in target markets.

The challenge

M

odern gaming providers, like Caesars, heavily rely on video to reduce fraudulent activity, control financial losses, increase customer satisfaction and improve employee productivity. As part of their comprehensive physical security solution, these organizations need to ensure that video data is stored, protected and accessible at all times even during system failure events to mitigate

42

risk, liability and potential operational interruption. Caesars’ uncompromising focus on compliance, operational excellence and fraud reduction requires a video surveillance solution that mitigates risk, system vulnerabilities, and enhances the customer experience. The company previously leveraged a legacy CCTV system consisting of analog cameras and DVRs, but sought to transition to a more reliable, capable and flexible solution. Caesars began transitioning two sites to a modern Milestone video management system (VMS) as part of a pilot project and was immediately impressed with the robust capabilities including rapid, intelligent search functions, a rich reporting structure, and the high level of support provided by the Milestone team. The success of the pilot project prompted Caesars to standardize on the Milestone platform across its 14 sites in the

SecurityLink India ■ March 2019

EMEA region. Pivot3, a long-term Milestone partner, integrates seamlessly with its VMS. Pivot3’s interoperability and ease of integration with Milestone stems from its ability to consolidate VMS hosting, security applications and associated data, and all client workstations onto one centralized platform. Pivot3 is certified with the Milestone solution, guaranteeing high performance and system resiliency. As the organization embarked on its video security upgrade, Caesars’ IT and surveillance leaders quickly realized they would need a robust, flexible and scalable storage solution that would protect video, allow the organization to stay in compliance with gaming regulations, provide the utmost resiliency and ensure high levels of performance to meet evolving corporate standards. They quickly found that Pivot3’s functionality far exceeded the capabilities of stand-


application/ case study

ard servers or DVRs, which were never designed to handle the demands of today’s advanced security and surveillance technologies. The Caesars team also had strict requirements when it came to software for video storage solutions. “We wanted the hardware to be as industry standard as possible. Historically, we’ve had various NVR and DVR solutions that sit on custom pieces of equipment made by their particular manufacturers,” said Charles Rayer, IT Director, Caesars Entertainment EMEA, “The magic isn’t in the hardware, the magic is in the software. The Pivot3 hyperconverged platform provides intelligent, software capabilities on standard hardware, and that is a real advantage to the Pivot3 approach.” As the Caesars business continues to grow across its targeted regions, it has plans to modernize its datacenter operations. With Pivot3, Caesars can use high-performance, scalable and cost-effective hyperconverged infrastructure to support multiple mission-critical workloads on a single platform and future-proof its IT environment.

The solution

P

ivot3 is optimized for demanding, data-intensive surveillance workloads. Using standard off-the-shelf server hardware, Pivot3 aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximizes performance and storage capacity utilization. “Caesars required an enterprise-class storage platform that could protect its video investment. Video data needs to be as strongly protected as any other sensitive corporate and IT data,” noted Rayer, “Pivot3 is well-suited for this task because the technologies are proven within the rigorous confines of the IT world.”

 The Pivot3 solution can be extended into other datacenter

workloads depending on our organizational needs. We’ve already experienced this benefit when we had to make a configuration change. We added a node on a temporary basis and then removed it once the setup was complete. The entire cluster can expand at any time  – Charles Rayer IT Director, Caesars Entertainment EMEA Pivot3 HCI surveillance solutions also provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible. “At first, we were wary of the promise of resiliency, but after we had the opportunity to test-drive the system and talk to other customers, we quickly realized that this was not just marketing promises,” Rayer said, “We even tried to break the system during our testing process and we simply couldn’t. That solidified our decision to move forward with the deployment of Pivot3 across our infrastructure.” “The fact that Pivot3 HCI expands quickly and easily was also a critical factor for Caesars. The Pivot3 solution can be extended into other datacenter workloads depending on our organizational needs,” he said, “We’ve already experienced this benefit when we had to make a configuration change. We added a node on a temporary basis and then removed it once the setup was complete. The entire cluster can expand at any time.”

The results

C

aesars updated six venues with Milestone and Pivot3 in 2017, with plans to complete additional upgrades SecurityLink India ■ March 2019

this year. The sites vary in size but incorporate anywhere from 75 to more than 200 video surveillance cameras. Per gaming regulations, Caesars maintains 31 days of video retention and on average has four nodes and 70 TB of storage per site. As IT becomes a greater force in the world of security, Caesars continues to evaluate how HCI streamlines business processes. The software-defined environment removes the need for dedicated, complex and proprietary hardware that once required dedicated teams to manage. Incorporating this approach has lowered costs and decreased complexity, while increasing the ability to scale. Additionally, the Caesars team now has the capacity to better adapt to new technology and find new ways to use video data to boost productivity, reduce loss and enhance safety. “Overall, the Pivot3 solution is a vast improvement over what we had previously,” Rayer stated, “Our surveillance team trusts in the fact that it will protect our video data, and gives us the opportunity to expand into other datacenter workloads in the future. That level of peace-of-mind is highly valuable and impressive in today’s sophisticated gaming environment. Also, the opportunity to expand the use of Pivot3 into our datacenter gives us cost savings benefits going forward.” 43


Application/ case study

Safeguarding HTM Hybrid Tower A

s part of a project to revitalise a semi-abandoned Venetian suburb, and transform the district of Mestre from industrial precinct to recreational hotspot, HTM Hybrid Tower has undergone an extensive redevelopment. The project was supported by Hochiki Italia, the Italian arm of leading life safety systems manufacturer, Hochiki, who were selected to provide solutions that would protect this now iconic building and its occupants. HTM Hybrid Tower is the tallest building in the Venice metropolitan area, standing at 84 metres tall. The redevelopment of the tower, which was previously occupied by one of Italy’s most prevalent transport providers, cost €18 million in total. The 19 floors of the HTM Hybrid Tower comprise commercial offices, a beauty centre and residential and retail environments, as well as dining and garage spaces. Comin Impianti srl, a local civil and industrial systems installer, was selected to specify solutions which would meet the needs of such a versatile building. The installers chose to specify Ho-

44

chiki fire detection systems which would suit each of the different environments within the tower. Working closely with Comin Impianti srl, Hochiki Italia identified a need to use solutions that could be networked with one another via multiple control panels, programmed in a way so that each device is interconnected. It was also essential that the system was capable of identifying issues and reasons for alarm quickly, to give building occupants as much warning as possible. Hochiki Italia specified a range of solutions from the enhanced systems protocol (ESP) range to meet these challenges. The collection of intelligent, addressable fire detection and alarm equipment offers HTM Tower high performance and reliability, combined with an enhanced open protocol giving building owners the added control of their systems. Over 180 ALN-EN smoke detectors and ten ACC-EN multi-sensors were installed throughout HTM Hybrid Tower. The devices can all be controlled from eight panels networked so that in instances where there is cause for alarm and/ or evacuation, only affected zones will be notified. In addition, Hochiki’s devices offer both visual and audio alerts, which can be individually managed so only one operates in a given zone when needed, reducing the need for a full building evacuation for minor incidents. Ezio Danese, Project Manager at Hochiki Italia noted, “Mixed use sites like the HTM Hybrid Tower require a range of complex devices. As well as solutions that offer unrivalled reliability, SecurityLink India ■ March 2019

it is essential to use products that can be networked to suit specific environmental considerations. “A restaurant kitchen will require very different levels of monitoring compared to a garage space, and these variables need to be monitored and controlled. The Hochiki ESP range allows building owners to do just that, giving them a control system that can be tailored to ensure optimum performance.” Angelo Comin, Owner of Comin Impianti srl said, “The HTM Hybrid Tower is a contemporary, hybrid project, where multiple functional levels co-exist. Protecting such a complex structure from the risk of fire was a challenge. However, the fact that Hochiki systems are able to communicate on the network was a key element in the specification process.” “It is also an added benefit that the solution’s audio and visual capabilities can be managed separately which helps avoid unnecessary panic in case of a false alarm.” Hochiki systems are now installed and fully operational throughout the occupied floors.


application/ case study

SecurityLink India â– March 2019

45


Application/ case study

Witty Group of Institutions Ensures Safety and Security in Schools with Hikvision Video Surveillance Solutions H

ikvision has recently deployed the latest security and surveillance solutions at the Witty Group of Institutions. Witty Group of Institutions is the eponymous chain of 10 schools promoted in three cities (Mumbai, Udaipur and Bhilwara) with an aggregate headcount of 5000 students. It is founded and promoted by the noted educationist couple and medical graduates Dr. Vinay and Dr. Raina Jain under the aegis of VJTF Group of Companies. The Group of Institutions is the result of intensive research and dialogue with parents, students and institutional heads from various parts of the country. The organisation aims to provide a holistic education to enable all-round development of the students.

46

Security challenges

T

he management of the Group was well aware of the security challenges being faced in their schools daily. Dr. Vinay D. Jain, Head of the Witty Group of Institutions said, “Earlier our schools were equipped with approximately 125 cameras, but they had certain issues of quality, reliability and tracking. Hence, we have been in need of the latest surveillance cameras, which would help us resolve those security issues. We want to provide our students a safe and secure campus to study.”

Securing the schools

H

ikvision along with its system integration partners underwent a site survey of all the schools of the Group, and proposed and finally deployed an integrated security solution as per the requirements of the management. Today, the schools of Witty Group of Institutions in Mumbai, Udaipur and Bhilwara are equipped with a p p r ox i m a t e ly 1036 cameras which have made it extremely easy to work as they SecurityLink India ■ March 2019

 Our schools have always aimed to create a safe and structured environment where the students along with their parents and guardians, and staff come together as a community of lifelong learners. Safety and security are our paramount goals and the same was only possible with Hikvision surveillance systems which have enabled us to provide students a safe and secure campus to study, and also helped us keep a close monitoring in terms of security and any other student related issues  Dr. Vinay D. Jain Head of Witty Group of Institutions can be placed anywhere as long as there is a power source close by. The video surveillance cameras have enabled the management to monitor the activities of visitors and students in and around the school premises, detect suspicious people and keep tab on their activities. Whether it is a crime or a minor tiff, video surveillance cameras capture all, thereby making it easy for the school management to investigate the actual happenings in case of any grievance reported by a student or a teacher in the school.


application/ case study

Qatari Bank Standardizes on March Networks Video Surveillance and Business Intelligence Solution M

arch Networks®, a leading global video security and video-based business intelligence player, has announced that one of Qatar’s top banks is deploying the company’s business intelligence software and integrated analytics to improve customer service and operations. The customer is one of six Qatari financial institutions currently using March Networks systems for advanced video surveillance and fraud prevention. The bank is already using an endto-end March Networks video recording and management solution in all of its Qatari retail banking branches, hundreds of ATMs, and multiple corporate facilities. It is expanding that solution with Searchlight for Banking software to deliver an enhanced customer experience and strengthen its fraud investigation capabilities. March Networks Searchlight™ for Banking combines surveillance video with ATM/ teller transaction data and analytics to deliver powerful fraud-fighting tools such as the ability to rapidly detect suspicious transactions and potential cases of ATM skimming. The software also helps banks evaluate and improve customer service using dwell time, queue length and people counting analytics. The bank started using March Networks several years ago to ensure compliance with CCTV legislation first introduced by the Qatari Ministry of Interior (MOI) in 2011. The law mandates that all banks equip their locations with IP video surveillance, record at a mini-

mum 3 megapixel resolution and 20 frames per second, and ensure 120 days of video storage. The bank, which was using an analog video surveillance system at the time, needed an enterprise-class video solution that could meet the MOI regulation. It was also looking for a solution that offered remote video management, system health monitoring, and the ability to scale easily to accommodate future growth. “When the project went to tender, only the March Networks solution performed to all of the bank’s criteria,” said its Group Safety and Security Manager, “With the March Networks system, we are able to fully comply with the law. The usability and health monitoring features of the Command Enterprise video management software are also excellent, enabling us to investigate and resolve potential system issues before they become critical.” According to ISC Group Gulf, a leading systems integrator in Qatar with a specialized focus and expertise in the banking sector, the March Networks solution is the best choice for banks in the region. “March Networks products have proven highly reliable and are able to meet – and often exceed – the parameSecurityLink India ■ March 2019

ters set by the Qatar Ministry of Interior regulations, as our organization has seen in our work with most of the country’s major financial brands,” said Cristian Ivan Nicolae, Project Manager, ISC Group Gulf, “In addition, March Networks offers the sole CCTV products in Qatar purpose-built for banking environments, which means you are getting a secure, highly-professional solution that is easy to scale in complexity.” “We are proud of our long-standing partnership with this Qatari bank. It is a leader in the use of innovative video technologies, and clearly understands the value intelligent video offers to its organization,” said Trevor Sinden, Director, Middle East and Africa Sales, March Networks, “We are also fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks.” 47


Application/ case study

Online Biometric Authentication Service for TEPCO Systems F

ujitsu Limited announced that TEPCO Systems Corporation has adopted Fujitsu’s Online Biometric Authentication Service, compliant with the Fast IDentity Online (FIDO) next-generation online authentication standard, for their newly developed system to improve the efficiency of utility pole maintenance operations within TEPCO’s service area. This new system conducts operations by cooperating with local residents, in order to improve the efficiency of the operations of TEPCO Power Grid, Inc., the company that handles utility pole maintenance operations, as well as to ensure safety for the local region. When residents in an area notice something unusual about a utility pole, they can submit pictures through TEPCO’s website. This way, employees of TEPCO Power Grid can get a handle on the situation from the pictures before heading to the site, enabling a faster response.

Now, by adopting Fujitsu’s online biometric authentication service for authentication when maintenance workers login to the system from work PCs and smartphones, the convenience of personal identification has increased, strengthening security and improving operational efficiency.

Background

I

n recent years, there has been a demand for stronger security in a variety of systems such as setting complicated passwords for each system in order to handle information including company secrets or personal information. At the same time, however, there have been concerns that this is not only compromising the convenience of operations, but actually inviting further risks. For example, there are risks of using the same password on multiple services or of information leaks due to los-

ing notes with passwords written on. In these circumstances, biometric authentication has attracted attention as a method for strengthening security in place of existing ID and password systems. In addition to the costs required for updating authentication system platforms, there is also the issue of the significant manhours required for system deployment such as clarifying security requirements and finding time for system building. When considering the deployment of its new system, TEPCO Power Grid, Inc. faced the same sort of issues, but it was able to set up its new system in a short time by using Fujitsu’s online biometric authentication service, which provides the necessary servers and software to implement a FIDO-compliant biometric authentication system, as well as existing biometric authentication-capable smartphones.

System incorporating the online biometric authentication service

F

or the new system developed by TEPCO Systems, in addition to providing the servers and software on the cloud necessary for FIDO authentication, Fujitsu also offers a service supporting the development of the client app. When personal authentication is needed to login to the system from a work PC, the work PC and the user’s smartphone can be linked by reading a QR code displayed on the PC’s screen with an app on the smartphone. Conse48

SecurityLink India ■ March 2019


application/ case study

quently, the user can securely access the system with FIDO authentication using the biometric information stored in the smartphone. Maintenance workers on site can also check the situation by using their smartphones to access the system with FIDO authentication. Because a company-provided smartphone can be used, there is no need to deploy new

biometric authentication devices, and user convenience is enhanced through password-less online authentication.

Future plans

F

ujitsu plans to extend the online biometric authentication service to other use cases going forward. By expanding the deployment of FIDO in

services related to social infrastructure, the company will contribute to the resolution of issues such as security and convenience for a variety of customers. Fujitsu is the leading Japanese information and communication technology (ICT) company, offering a full range of technology products, solutions, and services.

NEC Provides Facial Recognition for E. SUN Commercial Bank in Taiwan Contributing to safe, secure, and convenient financial services

N

EC Corporation has announced its provision of a facial recognition system via NEC Taiwan Ltd. to E. SUN Commercial Bank Ltd. (E. SUN Bank), a major Taiwanese bank. This system will contribute to the creation of safe, secure, and convenient Automated Teller Machines (ATMs) using facial recognition. These are the world’s first facial recognition automation ATMs with one-time password technology. E. SUN Bank has installed and begun operation of the ATMs at five locations in Taiwan. The system being provided by NEC utilizes its flagship facial recognition artificial intelligence (AI) engine, ‘NeoFace,’ featuring the world’s highest recognition precision and belonging to NEC’s portfolio of advanced biometric authentication technologies, ‘Bio-IDiom.’ When using these facial recognition equipped ATMs for the first time, users insert their cash cards and have a photo of their face taken with a camera installed within the ATM. To enhance the safety level of service, users have to correctly enter a one-time password which is sent to their mobile phones within 60 seconds before their images are registered. Once registration is completed, users can only withdraw cash by facial recognition and PIN authentication. In addition, NEC’s anti-spoofing technology prevents fraudulent activities at these ATMs by using AI to detect whether a subject is a real person or just an inanimate photo, image or mask. “NEC focuses on the social solutions business, and we will make use of this achievement to realize a safe and secure society,” said Takashi Yoshida, General Manager, Safer City Solutions Division, NEC Corporation, “NEC will continue proposing innovative new solutions using biometric technologies, both in Taiwan and around the world.” NEC Corporation is a leader in the integration of IT and network technologies that benefit businesses and people around the world. The NEC Group globally provides ‘solutions for society’ that promote the safety, security efficiency and fairness of society. Under the company’s corporate message of ‘orchestrating a brighter world,’ NEC aims to help solve a wide range of challenging issues and to create new social value for the changing world of tomorrow. SecurityLink India ■ March 2019

49


Application/ case study

Flint Boys and Girls Club to Improve Safety and Security New IP camera system, soon to be supplemented with facial recognition technology, represents significant improvement over dated analog video surveillance

3

xLOGIC, Inc., a leading provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500™ winner, has recently announced that the Flint (MI) Boys and Girls Club now enjoys significantly improved safety and security with its newly-installed 16-camera video surveillance system. Tauzzari Robinson, Chief Executive Officer of Flint Boys and Girls Club, who spent his early career working at clubs in Chicago said, “Oftentimes, these were rough neighborhoods, so the importance of safety is strongly ingrained in me.” The previous video surveillance system at the Club was adequate, but it was getting old and staff wondered if they were missing out on newer, and better technology. “We had grown our old system up to 16 cameras, and we had expanded the number of areas under surveillance,” explained Robinson, “However, the image quality was not great, and we didn’t have much zoom capability.” Robinson asked a staff member, who was in charge of monitoring the cameras on a day-today basis, to speak to the Boys and Girls Club Board of Directors, “This staff member told the Board plainly that we needed better technology.” Fortunately, Board Member Mike Buckel, VP Sales and Marketing for Sonitrol Great Lakes, knew exactly what was needed. Sonitrol Great Lakes and 3xLOGIC, worked with the Club to design and install a brand-new full IP system of 16 4MP cameras, backed by a 3xLOGIC 50

V5000 server. 3xLOGIC discounted the hardware and Sonitrol Great Lakes donated all the installation and on-going support and labor. “We could tell a huge difference immediately between our old cameras and the new 3xLOGIC IP cameras,” recounted Robinson, “And the ease of use was very clear as well.” The new video surveillance system monitors key areas inside the club and outside, with views of the approach to the entrance, as well as the parking lot, where buses and cars pick-up and drop-off. The Flint Club has a large population – 160-180 children daily during the school year and in the summer, upwards to 250 a day. As children move about the building, staff can monitor them, key in on any shenanigans, or worse, zoom into a situation with excellent clarity and solve any problems. “We are the safe place for the children in our community; we have to provide the safest environment possible,” said Robinson, “With this new system, we are accomplishing that. Our kids know those cameras are there and it’s not only a deterrent, but parents and staff know we have our children’s safety and security as a top priority.” Robinson is also impressed with his 24/7 mobile access to camera views. “If I’m at home at 8:30 at night, I can access video on my iPad and make sure we’re closed properly. That provides real peace of mind. The system provides something else too. “It used to be if I responded to calls SecurityLink India ■ March 2019

at the Club after hours, my wife wasn’t too thrilled, she’s a lot happier with this new system,” said Robinson. The Club’s front desk staff monitor camera views during regular business operations, 9:00-5:00 and from 3:008:00 when children are present. Front desk staff and Robinson’s administrative assistant monitor all views and the front door, which is on a buzzer system to grant entry. Staff do a combination of live monitoring and after-incident review. Robinson continued, “Our new system is 100% better. Before, it could take us up to an hour to review an incident, now it’s immediate. We must be able to solve issues quickly, and get back to work, back to our priorities for the children. And I’ll tell you what, these kids know about the system, they see it in action, and they’re on their best behavior.” In addition to video being monitored onsite, some of the new cameras are trained on the Club van in the parking lot with feeds to the Flint Police CattEye surveillance program. Now that the new system is up and running and functioning well, 3xLOGIC and Sonitrol staff have introduced the idea of installing one of 3xLOGIC’s new VISIX facial recognition cameras. Such FR technology would enable the Club to create a watch list of faces, so they are notified if a person of interest approaches or enters the building. This way, unauthorized people are not picking up children from the Club.


application/ case study

SecurityLink India â– March 2019

51


Application/ case study

Getting The Complete Picture of Helps Keep Hospitals & Staff Safe from School Security W

hile securing an educational facility, the first images that pop up in the mind might include classrooms, hallways and entrances, when it comes to creating a safe and secure environment for students and staff, it’s also just as critical to think about all the other areas that make up the entire campus. Campuses include numerous buildings, offices, dormitories, sports facilities, retailers, green spaces and much more. Safeguarding all of these sites typically falls under the responsibility of one security team, which can undoubtedly present challenges, especially during after hours or the many different kinds of events that can take place on campus.

To achieve comprehensive protection of a school at all times, every corner of the campus must be included in the security plan. Today’s technological advancements are making this task easier, as developments in video technology facilitate unprecedented levels of coverage for threat detection and mitigation. 180- and 360-degree wide-angle surveillance cameras provide a cost-effective solution for monitoring large campus areas. It isn’t enough for schools to simply use PTZ cameras, because at any point in time they can only look at a small part of the scene; educational institutions must aim to obtain fully inclusive coverage for the deterrence, identification and investigation of incidents. By enabling school security officials to view activity in all parts of the facility as it occurs in both live and recorded video, panoramic surveillance provides operators with an elevated level of situational awareness for immediate response. And this security strategy can be further strengthened by the incorporation of additional solutions. The key to correlating data from multiple sources is leveraging open platform products. The integration of video management systems, access control, data storage and various other elements of security technology is instrumental in achieving safety and security goals, and they must all feed into one common interface to maximize effectiveness. 52

SecurityLink India ■ March 2019

Workplace Violence With New IoT-Based Duress Badge

H

ID Global’s new BEEKs™ Duress Badge Beacon addresses the growing need to protect doctors, nurses and other caregivers from threatening situations that arise in the hospital environment. The bluetooth low energy (BLE) duress functionality provides a fast and easy way for hospital personnel to send security staff real-time distress alerts from anywhere in or around the hospital campus if they are in duress and in case of other emergencies. Enabled by Bluvision™ (part of HID Global), the duress beacon is the latest addition to the HID location services IoT platform, which makes it possible to streamline and enable multiple location services applications in a unified healthcare IoT ecosystem. The BLE beacon can be used by itself or integrated into popular access control cards already in use. Staff members or clinicians just press the back of their badge to instantaneously trigger a duress alert that identifies them and their location – inside the hospital, the parking garage or other configured areas – for immediate action by security teams. “It’s well known that an effective response system is critical to keep high-risk situations from escalating into workplace violence, but acquiring, deploying and managing yet another disparate hospital system is costly – often creating a barrier to adopting a duress


application/ case study

solution,” said John Sailer, Chief Operating Officer of Bluvision, “HID’s new beacon and our end-to-end IoT platform enable hospitals to easily plug real-time duress detection and alerts into their healthcare IoT infrastructure. This powerful combination simplifies the process of increasing healthcare personnel safety with a solution that also requires minimal effort by the user.” Together with HID location services, the new beacon can be centrally managed through the cloud to transfer new messages, send firmware updates and conduct battery status checks remotely. Its unique design allows it to broadcast reliably and with precision, even in densely populated Wi-Fi environments. The beacon simultaneously supports iBeacon (Apple), Eddystone (Google) and sBeacon (Bluvision) protocols and pinpoints the location of the user down to 6ft (2m). HID’s duress badge solution with real-time location services is highly sought after beyond healthcare. The hospitality market including restaurants and hotels is another broad area where staff is vulnerable to workplace violence risks due of the social nature of the sector. The hotel industry has been an early adopter of duress solutions to help their room attendants feel safe on the job. HID Global powers the trusted identities of the world’s people, places and things. They make it possible for people to transact safely, work productively and travel freely. The trusted identity solutions give people convenient access to physical and digital places and connect things that can be identified, verified and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and over 2 billion things are connected through HID technology.

IPSecurityCenter™ Helps Keep Spectators Safe at Super Bowl LIII in Atlanta, Georgia C

NL Software’s award winning PSIM technology was used to support a multiagency security program for Super Bowl LIII. The company’s IPSecurityCenter PSIM solution is installed in the Atlanta police department’s video integration center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl. Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The city has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them. IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene. “Estimates are that nearly one million people traveled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software, “IPSecurityCenter was installed in the VIC by the Atlanta police department to provide the real-time situational awareness, and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities. The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defense system and sensor technologies including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/ nuclear and explosives detection, geospatial mapping, and asset tracking. SecurityLink India ■ March 2019

53


Application/ case study

Vanderbilt’s SPC A Multi-Pronged Solution to Retail Security We all know that crime reduces the profitability of retail businesses, from small individual shops to large scale, multi-story shopping centers. But the loss to companies is much more economically significant than most people probably realize. For instance, global retail crime is now estimated to be in the upwards of $123 billion each year

O

ne weapon in Vanderbilt’s arsenal for retail solutions is SPC, the award-winning intrusion detection system. SPC protects businesses, properties, and assets for users who want an intrusion detection system that offers versatile operation and comprehensive alarm management functionality. Using cloud services, end-user apps, and a dedicated software suite, SPC is at the forefront of modern intrusion detection. SPC software uses an always-on IP communication system to provide continuous monitoring of key status information such as panel set, panel unset or panel partially set.

Retail security: SPC in action

A

lex Holmström, Director of Sales for Northern Europe and the rest of the World, at Vanderbilt said, “When established at a retail outlet for example, SPC can help control every entrance and exit including staff entrances. Important-

ly, it can log activities, provide authorized personnel with consolidated reports of intrusion or access attempts and door activities, and also allow codes to be changed and problems pinpointed.” Additionally, the SPC Connect app can also be implemented to better aid the retail sector in dealing with security issues. For instance, through the SPC Connect app, retail staff can receive real-time security alerts, which can then be immediately investigated and acted upon if necessary. When an alarm is triggered, a push notification is sent to the SPC Connect app, and then, with the IP-cameras connected to SPC, the live video feed can be examined further through the app. All the user’s interactions through SPC Connect are secured with financial grade SSL security, giving peace of mind alongside powerful control.

Milestone integration

F

urther deepening SPC’s appeal to the retail sector are the system’s strong integration capabilities. This greatly increases its functionality as a key retail solution. For instance, the SPC-Milestone plugin allows users to trigger off events and control SPC systems from within the Milestone system. The plugin is aimed at improving the system user’s experience by providing a bi-directional communication strategy with the enhancement of a powerful surveillance solution. The instant and remote access to any potential alarm help save a huge amount of time for those involved in maintaining the system. Ross Wilks, Head of Marketing Communications at Vanderbilt outlined this particular aspect of the collaboration, “For example, through the plugin, when an alarm has generated the icon on the system’s monitoring screen will go red, cameras can be triggered, and 54

SecurityLink India ■ March 2019


application/ case study

having to wire an entire building with cable. Therefore, this cuts down on install time and ultimately cuts down on expenses for the retail owners.”

Protecting staff

O

the Milestone client can display the relevant information. By right-clicking the icon, the status of the alarm can be checked, and a further right-click action will restore the alarm and switch the icon back to green.”

f course, in retail, it is key to protect staff at all times and SPC has several features to execute this requirement, one such example being the ‘all okay’ function. Simply put, this is a step that the user performs to signal everything is okay when they unset the system. SPC provides multiple options for what this okay signal can be, and there are also multiple elements that can trigger the signal.

Interfacing internally

A

s well as third-party integrations, Vanderbilt’s SPC intrusion system also interfaces into Vanderbilt’s ACT access control system. Through this collaboration of products, Vanderbilt’s FlexC communications’ protocol provides a highly secure multipath communications system that enables easy configuration of event transmission strategies to independent alarm organizations. Here, SPC integration provides a single interface security solution with a real-time view of SPC zone status in ACT Enterprise. System users can also view SPC events in ACT Enterprise, send commands to SPC such as set or unset, isolate or desolate, inhibit or disinhibit, and restore graphical maps.

Retail security and wireless devices

O

n top of the significant depth offered by SPC’s remote monitoring and integration capabilities, another feature of the SPC portfolio that offers specific strength to retail security is the wide range of SPC wireless devices. Holmström picks up this point and details why SPC wireless is ideal for the retail sector in particular. “These are aesthetically appealing in design and ideal to fit in with retail environments, complimenting the surrounding environments of a modern retail store. These devices are also quick and easy to install, meaning less disruption to the store. “Moreover, the SPC wireless detector range can extend to 500 meters meaning one single detector can generally cover a single retail outlet. This proves more cost effective than

The SPC system can be configured to have this functionality for certain areas and the time and action can be defined for what will happen if the signal is not given. The core element of this added functionality is that it is easier for staff to remember to perform the necessary action when in a situation of extreme duress and pressure.

Responsive to user needs

All in all, Vanderbilt understands the multi-layered issues faced by the retail industry, and we firmly believe that the SPC intrusion detection system is agile, adaptable, and flexible to respond to these specific retail requirements and pressures. SPC is continuously evolving to meet the ever-changing needs of the modern market and is truly a dependable solution that retail owners can rely on,” summarized Wilks.

SecurityLink India ■ March 2019

55


Application/ case study

100+ Invictus Cameras Deployed Across Seven Greater London Towns F

ollowing the recent successful installation of 360 Vision Technology’s new Invictus ruggedised PTZ camera by a north London borough, the same borough has now rolled-out over 100 Invictus cameras across seven Greater London towns. With an early success in prosecuting serious crime following the deployment of Invictus, its highly effective night

time HD quality colour video footage proved to be just one of the useful attributes of the UK manufactured camera, when a recent significant impact by a vehicle to a camera column tested its suitability for roadside deployment. The Invictus camera took the high-speed impact in its stride and showcased its ‘Attack Detect’ feature, automatically resetting to the last viewing position prior to being forcibly moved from its previous viewing direction, and with no damage to the camera or its direct drive PTZ mechanism. Commenting on the broader rollout of Invictus cameras, DSSL Group’s 56

Works Director, Aaron Stephens, who specified the 360 Vision Technology cameras confirmed, “The importance of selecting a product that is ‘fit for purpose’ when being deployed roadside in a town centre is often overlooked by some companies, who deploy non-ruggedised cameras purely on the basis of cost. If a PTZ camera were to fall from height following an impact, which is a real risk, there would be a substantial public health and safety incident. At DSSL, we take a holistic view to consider the surveillance needs at each individual location to ensure that all aspects of camera deployment are taken into consideration. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important local authority customer.” The expanded installation took total number of Invictus cameras to over 100, which allied to wireless links forming a major part of the system’s infrastructure. In a market often dominated by imported Far East products, the integration of Genetec Security Center and high-performance Invictus PTZ cameras has proven the effectiveness of two commonwealth technology providers. Commenting on the camera/ control technology collaboration, Genetec Country Manager, Paul Dodds said, “Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of SecurityLink India ■ March 2019

the Invictus cameras. Genetec Security Center unified platform and Omnicast video surveillance has been used to seamlessly blend full Invictus camera menu control, within a single intuitive interface. 360 Vision cameras are a Genetec certified product on our supported device list. This successful deep integration has simplified the London borough’s surveillance operation and effective management. “We value all of our technology partnerships, and especially with manufacturers such as 360 Vision Technology, who offer reliability with their Invictus PTZ cameras, as illustrated here across seven north London towns.” Adrian Kirk, Strategic Account Director at 360 Vision commented on the green credentials of Invictus, which was a factor in the overall decision by DSSL to specify the camera, “With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption. On larger projects like this, the savings on energy and reduction in associated pollution offers significant advantages over Far East camera alternatives, helping local authority end-user system operators to meet their carbon footprint reduction goals. “With a host of performance and user centric operational benefits, Invictus is well placed to feature extensively in future local authority upgrades, as customers look at total cost of ownership and the need to ensure CCTV equipment deployed by the road side is fit for this purpose.”


application/ case study

Securing Nation from

Internal | External | Eternal

Risk & Threats

5

th PolEx

DRONE

TM

INTERNATIONAL EXPO www.droneinternationalexpo.com

www.internationalpoliceexpo.com

&

&

INDIA HOMELAND SECURITY EXPO

cctvExpo www.cctvexpo.com

4

th

www.homelandsecurityexpo.in

Two Indispensable Exhibitions On Police, Central Armed Police Forces, Army, Navy, Air Force, Defence & Internal Security

Two Exhibitions On Drones & Unmanned Systems, CCTV, Access Control & Surveillance

19 20 JULY 2019 Pragati Maidan, New Delhi

For Space Booking & Other Details Please Contact:For International Police Expo & India Homeland Security Expo:

For CCTV Expo:

For Drone International Expo

Mr. Ashish Gupta

Mr. Subhash Bhatt

Mr. Mukesh Kharia

(+91) 7533018555 ashish@nexgenexhibitions.com info@internationalpolicexpo.com /in/policeexpo

(+91) 7533018444 subhash@nexgenexhibitions.com info@fsdexpo.in in/fsd-expo/

(+91) 8285009906 mukesh@nexgenexhibitions.com info@droneinternationalexpo.com company/drone-international-expo/

SecurityLink India â– March 2019

57


Application/ case study

Providing Integrated Security & Life-Safety Solutions For New Las Vegas Stadium

J

ohnson Controls will contribute to a safer, more efficient, connected new home for the Raiders through integrated fire and life-safety solutions. The Raiders sports and entertainment venue will provide a safe and secure experience for fans and staff. As the building partner of Las Vegas Stadium, Johnson Controls will integrate innovative and complex security and life-safety solutions into the new Las Vegas Stadium in Paradise, Nevada – the future home of the National Football League (NFL) Raiders. The solutions will help ensure a safer, more secure experience for both fans and staff at the stateof-the-art stadium. Johnson Controls will team with Mortenson Construction and McCarthy Building Companies on the project, which is expected to be complete in time for the Raider’s relocation ahead of the 2020 NFL season.

58

Through early engagement with stadium ownership and partners, Johnson Controls helps stadiums achieve their desired outcomes. To help create an environment that is safe, comfortable, connected and efficient, Johnson Controls will provide the Las Vegas Stadium with equipment and technologies including access control, video management, and fire alarm detection and suppression. The stadium has also signed a professional service agreement with Johnson Controls to provide lifecycle services including the maintenance and service of security, fire alarm and fire suppression. The new facility will feature 65,000 seats (expandable to 72,000), a retractable natural turf field, large operable walls that open to spectacular views of the neighboring Las Vegas Strip, and a variety of premium spaces throughout all levels. In addition to the stadium, the

SecurityLink India ■ March 2019

site will accommodate tailgating amenities, parking and a mixed-use commercial development. The Las Vegas Stadium Authority project is expected to be completed in just 31 months. “We understand the critical importance of safeguarding today’s stadiums and venues, and recognize that it requires a proactive security mindset,” said Lisa Roy, Vice President of Commercial Sales, Building Solutions, North America, Johnson Controls. “The expertise Johnson Controls has in stadiums and venues made them an ideal partner for this project,” said Tom Blanda, Senior Vice President, Stadium Development and Operations, “This is a complex project that integrates a variety of technologies to create a one-of-a-kind stadium experience. It’s important for us to work with partners who understand all aspects of building a stadium as we work toward creating a new home for the Raiders that captures the spirit and excitement of Las Vegas.” “We understand the critical importance of safeguarding today’s stadiums and venues, and recognize that it requires a proactive security mindset,” added Lisa Roy, “Integrating the best security and life-safety solutions into a stadium allows fans to enjoy the game in a connected, comfortable and safe environment. We look forward to an ongoing partnership with Las Vegas Stadium and are excited to see the Raider’s new world-class home.”


application/ case study

UK Consumers Excited by the New Biometric Payment Cards Data protection and reliability will be crucial factors for mass adoption

M

ore than half of UK consumers (54 percent) would be ready to use biometric payment cards if they were available at their bank today, according to new research revealed by digital security leader Gemalto and conducted by GfK. For 82 percent of them, it would even become their preferred payment card – generating a clear ‘top of the wallet’ effect. These innovative cards with integrated fingerprint readers let users authorise payments with a simple touch of their finger on the sensor, as an alternative to the PIN code. If British consumers are to replace their current payment cards, they need them to be more secure than what they currently have (88 percent), to be offered by a trusted bank (79 percent), to be easy to use (69 percent), and to be one that simplifies their life (60 percent). For a large majority, biometric cards clearly tick all the boxes. Eight out of 10 consumers believe that this new card will be better in terms of convenience and security. Key advantages include – no need to remember different PIN codes, a more secure experience (no more risk of someone stealing my PIN code when I pay), and more opportunities to pay contactless thanks to higher spending limits. Additionally, the card doesn’t rely on a battery and only uses power from the payment terminal to work – this means there is no limit on the number of transactions. Some consumers also expressed concerns about using biometric tech-

nology. 41 percent feel afraid that their fingerprint won’t work all the time and more than a third (37%) about it being compromised. However, these concerns should be alleviated as consumers learn more about the technology. For example, biometric

payment method. The majority of them, mainly young active contactless users or multi-banking product owners in the 4050 age range are already convinced, but there is also one third of the population that will need more time and proof to feel confident using biometric payments.

cards will be able to fall back to a PIN code authorisation if for any reason the fingerprint reader malfunctions. The fingerprint data is also securely stored in the card’s chip. It never leaves the card. It’s not kept on the bank’s servers nor sent to a personalization bureau, so to avoid the risk of it being stolen or compromised. The findings show that Britons are enthusiastic about the potential of biometric cards, but also proves the need to build confidence in order to convince all UK cardholders to take up this new

Responding to the findings, Howard Berg, SVP Banking and Payment at Gemalto commented, “We are delighted to see that the British public is ready to embrace this new generation of biometric payment cards. Our payment experts have worked hard to design a card that’s not only safe and secure but also easy to use and which provides a more convenient payment experience than ever before. Banks are showing great enthusiasm with ongoing trials and we look forward to launching biometric cards in the UK in the near future.”

SecurityLink India ■ March 2019

59


Application/ case study

Securing HÄCKERS Grand Hotel History Meets Technology

T

he Häckers Grand Hotel in Bad Ems, Germany, was originally built in 1715. Restored and extended during the 19th and 20th centuries, the hotel is a listed building located on a bend of the Lahn river and forms the centre of the city’s spa district. The hotel, which has its own thermal spring, gained European historical significance through the spa stays of the Russian Imperial court, such as Alexander II Tsar of Russia and the Prussian King Wilhelm I. For over 10 years it has been privately owned and operated by the Häcker family. The stylish ambience of the traditional building provides a perfect and unique setting for family reunions, weddings, seminars, meetings and banquets for up to 200 people in six individually furnished rooms and also offers state-of-the-art conference technology.

The challenge

Hospitality and cordiality in a family atmosphere are the values under which we have successfully run all our

60

medium-sized hotels for more than 20 years,” said Managing Director, Sascha Häcker, “Young or old, private or business, we aim to offer all our guests an unforgettable stay. “Of course, this also means offering our customers the maximum level of security. In doing so, we decided to work together with only one single manufacturer, who could not only provide us with the latest available technologies, but could also objectively advise us on the right camera model for each location.”

The solution

T

he result according to Sascha Häcker, is an extremely reliable security system which is not only easy to use, but also delivers high-resolution images in every situation. “Thanks to the integrated analysis of the cameras, it is even possible to recognise situations early and to act preventively. Furthermore, it was important to us that the cameras inconspicuously integrated into the environment of the historic building, which is not easy to solve under the conditions of a monument-protected building. We commissioned Schwalmtal based CIB-IT who are a Hanwha Techwin certified business partner and they have done an excellent job installing more than 60 Wisenet cameras.” Cameras have been installed at all strategic points within the hotel, such as elevators, corridors, stairwell and the hotel lobby in order to ensure guests can enjoy their visit in a safe and secure environment. A variety of Wisenet X camera models were used, including the 2MP XNV-6010 and 5MP XNV-8080R vandal-resistant dome cameras. Both of these

SecurityLink India ■ March 2019


application/ case study

can deliver crystal-clear images even in difficult or dark light conditions and are equipped with intelligent video analytics. They also have the ‘Hallway View’ feature which provides a highly effective way to monitor narrow vertical areas such as hotel corridors. A number of Wisenet PNF-9010RV 360° cameras have also been installed. These fisheye cameras, which provide cost-effective monitoring of large areas, are able to cap-

ture superior 4K image quality images allowing users to observe the fine detail of any object.

Success

The cooperation between Hanwha Techwin and CIB has inspired us so much that we have already started to install a similar system at the sister Fürstenhof Bad Bertrich hotel,” said Sascha Häcker.

The MVP of Security for Stadiums W

hen it comes to video surveillance and security for stadiums, there are a few factors that just can’t be compromised on – high quality imaging, powerful search and efficient bandwidth management. Here are Avigilon top three solutions to help stadiums meet these common security requirements.

1. 7K (30 MP) HD Pro cameras

T

horoughly covering all of the space within a stadium is no small feat, especially considering the fact that stadium security involves the reduction of blind spots to provide as much area coverage as possible. On top of that, it is paramount to be able to access detailed images such as a face out of a crowd of thousands. To meet this need, Avigilon developed single-sensor 7K camera, which captures detailed images over vast areas and provides wide area coverage options. With this smart solution, users will get more coverage with fewer cameras.

2. Avigilon Appearance Search technology

F

inding an individual within an expansive, crowded venue can be both extremely challenging and extremely critical. To help overcome this challenge, Avigilon Appearance Search™ technology supports investigations by allowing users build robust video evidence and create a powerful narrative of events in near real-time. Combined with Avigilon Control Center (ACC) video management software, Avigilon Appearance Search technology can quickly locate a specific person or vehicle of interest across an entire site, providing with the actionable results users need to respond faster.

3. HDSM technology

G

one are the days where thorough coverage required maximum bandwidth. Avigilon High Definition Stream Management (HDSM)™ technology sends only the high-resolution portion of the image of need, offering incredible image quality and resolution with only a fraction of bandwidth and storage. SecurityLink India ■ March 2019

61


Application/ case study

Raymax and Raylux Travel to New Heights R

aytec white-light and infra-red LED illuminators have been used to help monitor blade erosion and identify maintenance requirements at a windfarm in the Austrian Alps. The Alps are a major mountain range in Europe and Austria which accounts for a large portion of the area, covering spectacular geographical features such as lakes and glaciers. The sheer height of these mountains and the speed of the winds which blow across them, make this portion of the Alps particularly suitable for wind turbines. However, blade erosion is a common problem with wind turbines. The coatings of the turbine’s blades degrade over time due to the severe weather conditions with one big contributing factor is rain-drop bombardment, which has the same effect as tiny bullets hitting the blades. In addition, ice build-up causes cracking and the effects of solar radiation cause the coatings to expand and contract and eventually peel off.

The challenge

T

he client was in search of a solution that would allow them to monitor the condition of the turbines’ blades remotely, without having to physically send someone up to inspect. In addition, the client also wanted to monitor bird strikes (collision of a bird with the turbine) and an-

ything not operating properly. The nature of the application meant costs associated with access or maintenance are significant and presented health and safety concerns. Remote monitoring would allow the client to assess the damage, make a judgement on its severity and decide how to correct the issue before sending someone to site to repair it. Good quality lighting was essential to gain an accurate image of the blades and to ensure no damage was missed. The vast altitude of these mountain regions causes colder temperatures during the winter and warm summers. Altitude determines the precipitation pattern, and the higher-level areas will most likely experience a high average rainfall, heavy thunderstorms including heavy hail and snowfall, even in the summer. With this been said it was critical that any equipment the client used was suitable for these harsh and extreme conditions.

The solution and why was Raytec chosen?

R

aytec’s RAYLUX (white-light) and RAYMAX (infra-red) Panoramic illuminators were installed at the top of the turbine to provide general night-time images of the blades. Providing powerful 180° illumination, the illuminators provided excellent coverage of the entire blade, delivering outstanding images which the 62

SecurityLink India ■ March 2019

client could use to closely monitor their condition and identify any required maintenance; before sending anyone on the long journey to the top of the mountain, and then to the top of the turbine itself. Installing the RAYLUX technology allows true colour images of the blades to be produced, showing the extent of damage caused through the bird collisions or general erosion. The long-life and zero-maintenance of Raytec’s illuminators was a major factor in the client’s decision. Regular maintenance would be costly given the remote location and difficulties associated with gaining access.

Suitable for temperatures down to -50°C (-58°F), IP66 rated and supported by Raytec’s proven track record (with products installed across the world, in a wide-range of challenging conditions) would ensure the illuminators were also capable of withstanding the harsh conditions at the top of the turbine.

Summary

T

he ability of Raytec technology to deliver the required performance such as power output, reliability, suitability for harsh conditions, and zero maintenance were all huge factors in the client choosing Raytec for this installation. Furthermore, this solution has helped showcase the sort of diverse applications that Raytec’s illuminators can be put to.


application/ case study

SecurityLink India â– March 2019

63


report

India Risk Review 2019 S

ecurity needs collaboration at individual, organizational, industrial, national and global levels. Networking and knowledge sharing are the key drivers for mitigating challenges in today’s security environment. India faces varied business risks – from public protests to floods, causing damage to life, property and businesses. In 2018, protests and civil unrests saw a wave of new-age student protests, populist issues protests, unrest against private organizations and even identity-based violence. Vigilante violence aimed at religious minorities and marginalized communities allegedly carried out by right-wing groups became an increasing threat in India in 2018. In addition to civil unrests, natural disasters led to severe destruction of infrastructure and life in 2018. Reportedly, close to 600 people were killed in Kerala and Assam after the floods in 2018. The country also witnessed instances of high air pollution, cloudbursts, and landslides in several states. Weather phenomena like map 2019 due to dense fog have led to concerns over the infrastructural ability of dust storms,India floods and risk multiple flight cancellations Security & Safety Perspective India risk map 2019 the country to handle natural disasters. & Safety Perspective India Security risk map 2019

Risk Rating

Security & Safety Perspective

VERY HIGH

HIGH

MEDIUM

Risk Rating

LOW

VERY HIGH

VERY LOW

MEDIUM

HIGH

Risk Rating

VERY HIGH

MEDIUM

HIGH

LOW

LOW

VERY LOW

VERY LOW

Risk Evaluation Factors § Extremism

§ Natural Disasters

§ Crime

Risk Evaluation Factors § Extremism

Risk Evaluation Factors § Natural Disasters

§ Civil Disturbance

§ Crime § Environment, Health & Diseases § Extremism § Civil Disturbance § Infrastructure § Natural Disasters § Environment, Health & Diseases § Emergency§Services Crime

§ Civil Disturbance§ Infrastructure § Emergency Services § Environment, Health & Diseases Disclaimer: MitKat's risk ratings are a quantitative and qualitative product of the likelihood of risks and their impact on the conduct of business. This rating may differ § Infrastructure significantly from the national average, for specific regions within India, and from one business to the other. § Emergency Services Disclaimer: MitKat's risk ratings are a quantitative and qualitative product of the likelihood of risks and their impact on the conduct of business. This rating may differ significantly from the national average, for specific regions within India, and from one business to the other.

India Risk Review 2019

2

2

www.mitkatadvisory.com

Disclaimer: MitKat's risk ratings are a quantitative and qualitative product of the likelihood of risks and their impact on the conduct of business. This rating may differ significantly from the national for specific regions within India, and from one business to the other. Indiaaverage, Risk Review 2019 www.mitkatadvisory.com

2019 will be critical for security professionals due to the Lok Sabha elections scheduled to be held in the months of April2 India Risk Reviewsecurity 2019 www.mitkatadvisory.com May. As we move into 2019, professionals are likely to face dynamic and more evolving security threats worldwide. Terrorism and geopolitical stress, along with other traditional security threats, will remain an area of concern along with non-traditional threats in both the physical and cyber realms.

64

SecurityLink India ■ March 2019


report

Overall business climate for 2019

I

ndia’s economic growth has progressed in the last two years. This can be attributed to numerous reforms adopted by the government making India the world’s fastest growing economy, accounting for about 15% of the global growth in 2018. With the implementation of the Goods and Services Tax (GST), and with an increasing amount of investments by the Foreign Direct Investment (FDI), the International Monetary Fund (IMF) has predicted a growth rate of over 7.5% post-March 2019. Along with this rise, India was also ranked higher in the Ease of Doing Business (EoDB) ranking, and the third largest start-up base in the world with over 4,750 technology start-ups. With respect to banking operations in the country, the central government along with the Reserve Bank of India (RBI), has taken major steps to improve the banks’ recog-

nition of bad assets and to recapitalize public sector banks. The Government of India has also decided to invest INR 2.11 trillion (USD 32.9 billion) to recapitalise public sector banks over the next two years. In 2019, two initiatives driven by the Centre namely the ‘Make in India’ and ‘Digital India’ would be playing a pivotal role in India’s economic growth. Under the Make in India initiative, the Indian government is aiming to accelerate the growth rate to 25% of the gross domestic product (GDP) from the current 17%. Under the regulatory framework, all Indian states are on reform and fast growth trajectory, creating favourable conditions for investments and a benign supportive regulatory framework. For achieving these goals, businesses in India are likely to face major hurdles from all the sectors, and India will also have to work strategically to meet the fiscal deficit target for the year.

Executive Summary Geopolitical Risks

Socio-economic Risks

Technology Risks

Economic Risks

INFRASTRUCTURE Risks

Environmental Risks

Security in J&K

Women Safety

Digital Curency

Ease of doing business

Air Pollution

Cross Border Terrorism

Judicial Activism

Bank Frauds

Assam NRC

Maoism

Government Data Vulnerability

Critical Infrastructure Safety

India Bangladesh Relationship General Elections India Nepal Relationship India China Relationship India Pakistan Relationship Interstate Conflict Insurgency in North East India

Identity Politics Farmer Protests

Government Cyber Surveillance State-Sponsored Commercial Cyber Espionage Ransomware and Malware Attacks

Depreciation of Rupee Trade Wars Fiscal Deficit Oil Price Shock

Threat to Business Assets Employee Safety & Security

Skill Development

Fire & Industrial Safety

Crony Capitalism

Travel Safety

Threats to Data Privacy Cyber Insurance Internet of Things & Artificial Intelligence

Epidemics in India Water Scarcity Urban Flooding Coastal Inundation Extreme Weather Phenomena

Road Safety Water Safety Urban Stress

Critical Infrastructure

SecurityLink India ■ March 2019

65


report

The year gone by was characterized by the electoral churn and acrimonious political discourse. The strong BJP led government lost control of the three key states and was embroiled in a drawn out arms purchase controversy. In the neighborhood Imran Kahan’s election as PM of Pakistan further exacerbated the tenuous Indo-Pak relations; while on the other hand the re-election of more benign governments in Bangladesh and Maldives brought geostrategic relief to the nation. The macro-economic indicators continue to be satisfactory and are unlikely to be affected in the medium term; though fiscal reforms may slow down due to political compulsions. The regional security structure would continue to remain reasonably stable. However, societal stress due to internal fault lines relating to lack of jobs, reservations and communal factors may cause internal fragility. Overall 2019 will be a defining year of political upheaval, some internal stresses, yet steady economic growth Lt Gen Sudhir Sharma (Retd.)

economic economic RiskS

PVSM, AVSM, YSM, VSM, Chairman, MitKat

Top business risks

Economic Risks

RiskS

S

trong economic growth in a few countries has created an imbalance for the emerging markets and has put pressure on their currencies. India has been no exception to this trend with the rupee coming under economic stress and the

Comparative Risk Rating Comparative Risk Rating

Ease of doing business Ease of doing business

2019 2019 2018 2018

2017

2017

Top Economic Enablers Top Economic Enablersinin2019 2019

2019 2019 2018 2018 2017 2017

Bank Frauds

Bank Frauds

2019

2019

2018

2018

2017

2017

Depreciation of Rupee

Depreciation of Rupee Trade Wars

Trade Wars Fiscal Deficit

Fiscal Deficit

Oil Price Shock

Oil Development Price Shock Skill Capitalism SkillCrony Development

Crony Capitalism

2019

2018 2019 2017

2018

2017 2019 2018

2019 2017 2018

2019

2017

2018 2017

2019

2019 2018 2018

2017

2017

2019

2019

2018 2018 2017 2017 2019

2019

2018

2018

2017

2017 2019 2018 2017

5

VERY LOW

LOW

MEDIUM

HIGH

VERY HIGH

f the likelihood of risks and their impact on the conduct of business. This rating may differ 5 m one business to the other. SecurityLink 66 VERY LOW

LOW

MEDIUM

HIGH

VERY HIGH

crude oil bill on the rise. The country’s current account deficit is widening and it is expected to continue growing larger over the next few months. Meanwhile, India has made progress in the Ease of Doing Business (EoDB) index and the skill development sector. India’s world-beating economic growth is running up against some big risks like high oil prices, emerging market stress as the era of easy money draws to a close, and policy paralysis in the run-up to the 2019 general election. However, the economist intelligence unit forecasts India’s growth to be at 7.4%, throughout 2019. The next government will take charge in a less than ideal economic environment and will have significant challenges to take the economy back into the stable zone, let alone a double-digit growth rate. The Indian economy is at an interesting stage. In the last few years, structural reforms like GST implementation, demonetisation, insolvency laws, auctioning of public resources, digitisation, expansion of the tax base have created short-term pains in terms of disruptions and high compliance cost. The long-term benefits of these reforms are likely to accrue in 2019 and beyond. The Indian economy looks well-poised for 2019 with low inflation, fairly-valued rupee, under-control fiscal and current account deficits, and transparency in the banking system. Oil price movement will continue to play a crucial role in performance of the Indian economy. The forex reserves of the country at nearly USD400 billion also provides adequate buffer to external sector vulnerabilities.

India ■ March 2019


T

report

Geopolitcal Risks

Environment Risks

I

n 2018, India witnessed a series of extreme weather phenomena like floods, dust storms, air pollution, cloudbursts and landslides in several states. The Global Climate Risk Index of 2018 ranks India as the 12th most vulnerable country in the world to climate change impacts. In 2018, Mumbai, Chennai, Kerala and Delhi-NCR witnessed heavy rainfall and waterlogging, which disrupted business operations. Floods also led to over a thousand fatalities in several states including Uttar Pradesh, Rajasthan, Assam, West Bengal, Kerala and Karnataka. Kerala witnessed one of the worst floods in South Asia in 2018, where over 1.4 million people took shelter in relief camps and there were Risks close to 500 casualties. Deaths by Natural Disasters in India

were Wayanad, hi, Malappuram, a. Heavy rains in slides which left

ehru University's nd the National ed several points the floods. Along all that the state gement and late d warnings from D) about abovesaster.

government held eaders in Idukki ernment officials 5 demands for

IMPACT

oller and Auditor audit on flood ically stated that 862 dams, have 4 ointed out to the 5 states. Various anagement, such mendations, with as, have not yet aredness has not 3 n nature.

2641

Lightning

1908

Heat/Sunstroke

1149

Exposure to cold

846

Floods

232

Landslides

218

Epidemics

195

Torrential rain

J

ammu & Kashmir, the north-eastern states and the Maoist belt remain one of the highly volatile regions in the country with frequent reports of unpredictable violence, including bombings, shootings and kidnapping. There have been a number of terrorist attacks against army bases and other targets in Jammu and Kashmir. Even though there has been a considerable decrease in the number of Maoist incidence in the country, a change in Maoist leadership within the organisation could spur the cadres to prove their mettle. The Northeast, in addition to facing its own insurgency issues, is in the process of updating the National Registry of Citizenship in Assam and has caused a ripple in other north eastern states as well. The years-old citizenship issue has riled up smaller communities, political parties and several local organisations, bringing the region to the brink of a possible social conflict. This issue also has a potential to spill over to the year 2019 until a consensus is arrived by the government and all stakeholders. Apart from India’s internal security challenges, the country is also facing a regional hegemonic shift in South Asia with China being increasingly interested in investing in diverse industries and sectors in Nepal, Pakistan, Sri Lanka, Maldives and Bangladesh. Even though these south asian countries are more culturally similar to India, soft power has

Geopolitical Risks Comparative Risk Rating Security analysis of J&k

Insurgency in North East India

2018 2017

Cross Border Terrorism

The Illegal Migrant Issue in Assam

Security in J&K 3321

2019

Others

Insurgency in North East

Assam NRC

2019 2018 2017 2019 2018 2017

Source: Ministry of Water Resources, NCRB

Due to the rise in temperature, dustwww.mitkatadvisory.com storms were reported 63 India Bangladesh Relationship

in multiple north Indian states. In 2019, the weather situation is likely to worsen due to global warming and drastically General Elections Interstate Conflict 2 changing climatic conditions. Indiabacked Nepal fund has approved Although, the United Nations Relationship USD43.4 million for enhancing climate resilience for citizens in coastal states of Andhra Pradesh, Maharashtra and Odisha, 1 India lacks the adequate implementation infrastructure. India China India Pakistan Rainfall, floods Relationship and dust storms are likely to continue Relationship into 2019 with changing weather conditions and fast-paced 1 2 3 unchecked urban development, causing severe impacts4 to the business. LIKELIHOOD

Cross-border Terrorism Interstate conflicts General Election 2019 India-Pakistan Relations India-China Relations India-Nepal Relations

2019 2018 2017 2019 2018 2017 2019 2018 2017 2019 2018 2017 2019 2018 2017 2019 2018 2017

India-Bangladesh Relations

2019 2018 2017

5

VERY LOW

LOW

MEDIUM

HIGH

VERY HIGH

Disclaimer: MitKat's risk ratings are a quantitative and qualitative product of the likelihood of risks and their impact on the conduct of business. This rating may differ significantly from the national average, for specific regions within India, and from one business the other. SecurityLink India â– toMarch 2019 67


report

not been favourable enough to prove India’s interest in these countries. The US-China trade wars may present favourable opportunities to the Indian economy in the south asian region by way of diverted foreign investments, yet regional tariffs may hamper India’s manufacturing industries in the coming months.

upcoming elections, there has been a certain slowdown in ordering activities. However, the outlook is promising with potential approval of large projects like the Delhi-Mumbai Industrial Corridor (DMIC), river interlinking and expansion of regional airport infrastructure.

Infrastructure Risks

T

I

nfrastructure is a core service upon which other services and business functions operate. As a result, the risks of infrastructure failures are often judged to have a significant potential impact. Insufficient or underdeveloped infrastructure presents one of the biggest obstacles to economic growth and social development worldwide. In India, critical infrastructure safety, employee safety, and travel safety have been the top categories of risk due to poor amenities, ignorance and high costs. Doing business in India has always been hampered by poor infrastructure and potential failure of critical infrastructure. Lack of dedicated freight corridors, poor warehousing facilities (including cold storage), overburdened railway network, uneven distribution of electricity and lack of implementation of industry safety standards have always affected investor sentiment and business operations in India. Over the past few years, hasrisks been a massive thrust other services and business functions operate. As a there result, the of infrastructure 5 nt potential impact. Insufficient or underdeveloped infrastructure presents one of by the Government to increase spending on infrastructure, and social development worldwide. In India, critical infrastructure safety, employee not onamenities, roads, but otherand verticals like railways, metros, ategories of risk dueonly to poor ignorance high costs. housing, airports, water etc. The budget expenditure on these have up from USD13 billion inin 2016 USD26 4 Farmer Protests The moved Core Infrastructure Elements a to afety billionSmart in 2018-19 indicating a quantum jump. Given the City

●●

hroughout 2018, various public protests disrupted business continuity in India including the following: Several strikes and protests were initiated by minority groups, farmers, labour unions, student union etc. Farmers regularly protested over several demands including loan waiver in multiple states of India. Multiple protests over the draft of the National Register of Citizens (NRC) were reported in Assam, New Delhi and in parts of West Bengal. In the month of April, 10 people were killed in a nationwide shutdown organised by minority groups. In an environmental protest in Thoothukudi, Tamil Nadu, 13 people were killed and over 100 were injured. In Delhi, traders under the umbrella of Confederation of All India Traders (CAIT) protested the sealing of shops. App-based taxi drivers and truckers’ association calledfor strikes in several parts of the country. The pan-India eight-day strike in the month of July resulted in a revenue loss of about USD556 million per day.

Socio-economic Socio-economic Risks Risks

ure Risks

●●

●●

Comparative Risk Rating

Comparative Risk Rating Women Safety

2019 2018 2017

Women Safety

Farmer Protests

ysical and sociohysical Critical such as electricity nt, transport and 3 nologies. Sociosuch as hospitals .

2019 2018 2017

Judicial Activism

Identity Politics

2019 2018 2017

Identity Politics

IMPACT

Adequate Water Supply

Assured Electricity Supply

Women Safety

Judicial Activism

Sanitation, including Waste WomenSolid Safety Civil Unrest Management

Maoism

Efficient Urban Mobility and Public Transport

Affordable Housing, especially for the Poor

Maoism Identity Politics

Health and Education

Identity Politics Farmer Protests

Maoism Judicial Good Activism Governance,

Robust IT

Sustainable e rainfall in 2018, Maoismespecially Connectivity and E-governance and Environment Digitalization irs contributed to Citizen Participation he entire state. In Judicial Activism o the breaches in quire immediate 1 2 3 4 ematic drainage Safety and Security of Citizens, particularly Women, Children and the Elderly ural vulnerability LIKELIHOOD

2019 2018 2017 2019 2018 2017

Civil Unrest

e are three major ilure 2– security terror attacks to structural failure ependence on a o multiply failure 1

●●

Socio-Economic Risks

Farmer Protests Civil Unrest

Civil Unrest

5

VERY LOW

LOW

2019 2018 2019

2017

2018 2017

2019 2018 2019 2017 2018 2017

2019 2019

2018

2018

2017

2017

2019 2018 2017

MEDIUM

HIGH

VERY HIGH

Source: Ministry of Housing and Urban Affairs, Government of India

Disclaimer: MitKat's risk ratings2are a quantitative3and qualitative product of the likelihood of risks and their impact on the conduct of business. This rating may differ 1 4 5 SecurityLink India March 68the national average, ignificantly from for specific regions within India, and from one business to■the other. 2019

40

LIKELIHOOD

www.mitkatadvisory.com

VERY LOW

LOW

MEDIUM

HIGH

VERY HIGH


report

●● As general elections are planned in May 2019, public protests and political rallies are likely to increase across India. Protest by farmers and minority groups over reservations policies in several states are also likely to escalate. Further, political rallies before elections are likely to impact business operations.

Technological Risks

I

n 2015, the GOI introduced the Digital India program, bringing to focus an approach that resulted in over 500 million internet users in the country. This has led to major cybersecurity issues in the country. In 2018, India was the 4th most cyber attacked country in the world. According to the Ministry of Electronics and Information Technology, the maximum number of cyber-attacks were carried out by China (35%), US (17%), Russia (15%) and Pakistan (09%) in just three months (April-June 2018). In 2018, 15,779 Indian websites were hacked. India’s Cosmos Bank lost nearly INR944 million through simultaneous withdrawals across 28 countries after the bank’s systems were hacked. In 2019, the situation is further likely to deteriorate with the increase in internet accessibility and with the rise in vulnerable cyber blind-spots in businesses. With general elections planned in India in 2019, data breach and other cyber-attacks might be used to influence election results.

Technology Risks Comparative Risk Rating Digital Currency

2019 2018 2017

Government data Vulnerability

2019 2018 2017

Government Cyber-Surveillance

2019 2018 2017

Mega Data Breach

e

2019 2018 2017

State-sponsored commercial cyber espionage Ransomware & Malware Threats to Data Privacy

o cy

2019 2018 2017 2019 2018 2017 2019 2018 2017

Cyber Insurance

2019 2018 2017

Internet of Things (IoT) and Artificial Intelligence (AI) Critical Infrastructure

2019 2018 2017 2019 2018 2017

5

VERY LOW

LOW

MEDIUM

HIGH

VERY HIGH

What to expect in 2019

2

018 for India has been a tumultuous year with a declining rupee value, political campaigns for state elections, acute pressure on resources due to the occurrence of natural hazards, rising tension in the border, and protests by several traders, political parties and farmers’ unions. The economy grew by 8.2% year-on-year in the first quarter of fiscal year 2018/19 (April-March), driven by an upswing in household demand. In the coming quarters, rising interest rates, currency volatility and higher inflation adversely affecting consumer purchasing power will weigh on growth. The pace of the real GDP is likely to decelerate slightly in the remainder of 2018-19. Meanwhile, campaigning by political parties will intensify ahead of the general elections. ●● Civil disturbances and protests are likely to continue unabated in 2019 due to political rallies, campaigns, security threats, protests and poll violence. Political violence over the issues of Ram temple, reservations for minority groups, and farmers loan waiver promises. ●● Separatist violence in Jammu & Kashmir is also likely to increase due to high militant recruitments and rising border tension. The security forces are likely to retain control over the insurgency in northeast India and Maoist affected areas in central and western India. ●● The gross domestic product (GDP) growth rate is forecast to remain over 7.5%, however, the improvement in the currency value is likely to slow down due to the strengthening of the US dollar (USD). The ease of doing business in India is likely to improve in 2019 due to several business friendly policies that have been implemented in 2017 and 2018. ●● Climate change in 2019 is a major concern for the country with very heavy rainfall in the monsoon and extremely high temperatures during summers causing loss of workdays and hampering business continuity. Due to the climate change in the Indian Ocean and Bay of Bengal, severe cyclones, floods and landslides are likely along India’s coastline. Dust storms and air pollution also would be of major concern for the citizens of northern India. Overall, the outlook for businesses in India for 2019 with respect to civil risks would depend on the outcome of the upcoming general elections. Businesses are likely to face day-to-day challenges of civil disturbances and the manifestations of climate change which are expected to escalate in 2019.

he likelihood of risks and their impact on the conduct of business. This rating may differ SecurityLink India ■ March 2019 one business to the other.

69


International Updates

AI May Be Better for Detecting Radar Signals, Facilitating Spectrum Sharing W

hen vacationers buy a stake in a beachfront timeshare, they decide in advance who gets to use the property, and when. The National Institute of Standards and Technology (NIST) is helping the Federal Communications Commission (FCC) institute a similar plan for when commercial wireless providers and the U.S. Navy attempt to share a desirable 150-megahertz (MHz)wide section of the radio frequency (RF) spectrum for communications. In a new paper, NIST researchers demonstrate that deep learning algorithms – a form of artificial intelligence – are significantly better than a commonly used, less sophisticated method for detecting when offshore radars are operating. Improved radar detection would enable commercial users to know when they must yield the so-called 3.5 Gigahertz (3.5 GHz) band. In 2015, the FCC adopted rules for the Citizens broadband radio service (CBRS) to permit commercial LTE (long-term evolution) wireless equipment vendors and service providers to use the 3.5 GHz band when not needed for radar operations. Companies such as AT&T, Google, Nokia, Qualcomm, Sony and Verizon have been eager to access this band (between 3550 and 3700 MHz) because it will expand product markets and give end users better coverage and higher data rate speeds in a variety of environments where service is traditionally weak. NIST helped develop 10 standard specifications that enable service providers and other potential users to operate 70

in the 3.5 GHz band under FCC regulations while assuring the Navy that the band can be successfully shared without RF interference. These standard specifications, including the algorithm for protecting military incumbent users, were approved in February 2018 by the Wireless Innovation Forum Spectrum Sharing Committee (WINNF SSC), the public-private standards body for the CBRS. However, there are presently no official standards for determining when the military is using the band. The new study, reported in the journal IEEE Transactions on Cognitive Communications and Networking, represents the latest NIST research effort toward achieving that goal. In current practice, radar signals from ships at sea are identified using automated detectors that look for energy rises in the electromagnetic spectrum. “However,” said Michael Souryal, Lead for the NIST spectrum sharing support project, “These energy detectors are not discriminating enough to consistently get it right, sometimes confusing other RF signals as radar or missing the radar signatures altogether.” Souryal and his colleagues turned to artificial intelligence (AI) for a potential solution. Eight deep learning algorithms – software systems that learn from pre-existing data – were trained to recognize offshore radar signals from a collection of nearly 15,000 60 second long spectrograms (visual representations of the radar signals over time). These spectrograms were recorded in 2016 near naval bases in San Diego, California, and SecurityLink India ■ March 2019

Virginia Beach, Virginia, for the National Advanced Spectrum and Communications Test Network (NASCTN). After training, the deep learning algorithms were pitted against energy detectors to see which performed best at identifying and classifying a set of spectrograms different from the ones used to educate the AI detectors. “We found that three of the deep learning algorithms appreciably outperformed the energy detectors,” Souryal said. The best deep learning algorithm and the spectrogram collection were used to develop 3.5 GHz Band ‘occupancy statistics,’ datasets that describe when the band is available and for how long. Now that the NIST researchers have validated the use of the deep learning algorithms, they plan to continue refining the AI detectors by training them with higher-resolution, more-detailed radar data, which they believe should lead to even better performance.


International Updates

Top-Tier IP Surveillance Products

Recognized by 2019 Taiwan Excellence Awards

V

IVOTEK’s six intelligent IP surveillance products have received 2019 Taiwan Excellence Awards. The products recognized include H.265 cyber-security models IB9365-EHT, FD9365-EHTV, IP9191-HP, FE9391EV; multiple sensor model MS9390HV; and the compact 180-degree panoramic model CC8371-HV. In total, 1,127 products were submitted into the Taiwan Excellence Awards competition. VIVOTEK is honored to have received an impressive six awards from such a crowded field. Owen Chen, Chairman of VIVOTEK Inc., stated, “VIVOTEK, as the leading IP surveillance solutions provider in Taiwan, is extremely grateful to receive these Taiwan Excellence Awards. We would like to express our gratitude to the Bureau of Foreign Trade, MOEA and Taiwan External Trade Development Council (TAITRA), the organizers

of Taiwan Excellence Awards and the honorable judges for their affirmation. We will keep our commitment to delivering advanced surveillance products and solutions to the world.” VIVOTEK’s six award-winning network cameras: ●● Security within security H.265 network cameras – IB9365-EHT, FD9365-EHTV and IP9191-HP: These three cameras are embedded with Trend Micro’s anti-intrusion software, empowering them to automatically detect and prevent credential-based attacks as well as block suspicious events, enabling users to enjoy higher levels of network security. The ultra-HD IP9191-HP delivers images of four times the resolution of standard cameras. The video quality has been significantly improved, allowing it to accurately render fine details.

SecurityLink India ■ March 2019

●● See more in smarter ways, 180° & 360° network cameras – FE9391EV, MS9390-HV and CC8371-HV: These three cameras were launched under the ‘See More in Smarter Ways’ campaign. All are equipped with IR illuminators to ensure around the clock security. Moreover, the 12-megapixel FE9391-EV, featuring VIVOTEK’s deep learning technology for crowd detection, is able to count the number of people and indicate any selected zone that exceeds an ideal threshold, thus enabling users to analyze areas for future improvement. Both the CC8371-HV, with a single lens compact design, and MS9390-HV, with a dual lens design, cover a 180° panoramic range. These three network cameras provide efficient panoramic surveillance solutions for all applications.

71


International Updates

Supports the Safety of Automated Driving With Demonstration of Adaptive Network Control Technology Changing the priority of radio resource allocation according to the vehicle and surrounding conditions

N

EC Corporation has recently demonstrated adaptive network control technology in its MEC servers and base stations that helps improve the safety of automated driving. These trials successfully allocated radio resources (frequency bandwidth and time slots) to vehicles with high urgency as part of providing services that require real-time communication control for mobile networks. In the experiment, NEC confirmed that base stations can support safe driving by steadily suppressing communications delay time to within 100 milliseconds by preferentially assigning radio resources to vehicles with high urgency based on the analysis results of vehicle location information, camera images of the area around the road and other data. Along with the popularization of the Internet of Things (IoT), automated driving technologies that cooperate with real-time communication control over mobile networks are being developed for various devices such as automated driving cars, automated guided vehicles in factories and warehouses, security robots, and drones for inspection and delivery. In automated driving, where safety is of the utmost

Larger view Test Scenarios

72

Demonstration in an anechoic chamber

importance, a vehicle needs to be controlled more safely by sharing information such as positions and images between surrounding vehicles and street cameras in real time in order to avoid collisions with people or objects that its autonomous sensing cannot detect. However, in existing mobile networks, as the number of connected devices or the amount of communication data increases, a base station may run short of radio resources, which delays vehicle control, making smooth and safe automated driving difficult. Based on these conditions, NEC conducted trials using its adaptive network control technology in which an LTE base station preferentially allocated radio resources to devices with high urgency in response to the requirements of a context-aware service controller (CSC). The CSC is running on an MEC server and enables information to be transmitted within a communication delay time that protects safety. In the experiment, an automated driving environment was simulated in an anechoic chamber. The MEC server detected pedestrians by analyzing images of street cameras at an intersection, collected information on the location of surrounding vehicles, and shared such information with individual vehicles in real time. The commercial LTE

SecurityLink India â– March 2019


International Updates

base station was placed near the intersection, and multiple devices such as vehicle models, cameras and smartphones were connected to create a situation where there was a shortage of wireless resources. Through cooperation between the CSC and LTE base station, radio resources were preferentially allocated to vehicles that were approaching pedestrians who were crossing intersections and subsequent vehicles to deliver warning information within the target delay of 100 milliseconds. As a result of the experiment, it was confirmed that the probability that the round-trip communication delay between the vehicle and the MEC server would be within 100 milliseconds just 27% of the time with conventional technologies,

but this was improved to 99% by the application of NEC’s adaptive network control technology. This enables a stable delay within 100 milliseconds required for safe driving support, even in congested communication environments, and contributes to improving the reliability of automated driving by providing information on the surrounding traffic environment to vehicles in real time. Based on the results of this demonstration test, NEC will apply this technology to various IoT services that require real-time communication control including automated driving. Going forward, NEC will continue to develop this technology for 5G, and aim to apply it to services that require more connected devices and even lower delays.

Ranked as a Leader in Gartner’s Magic Quadrant for Workforce Engagement Management

V

erint has recently been named a Leader by Gartner, Inc. in the research and advisory firm’s Magic Quadrant for Workforce Engagement Management (WEM) report. Gartner indicates that WEM Magic Quadrant Leaders provide functionally broad and deep WEM solutions that can be deployed and supported globally. Their software is suitable for enterprises of all sizes and complexity, and they have broad industry coverage. Their revenue is strong and new references are readily available. Report Co-authors and Senior Research Directors, Jim Davies and Simon Harrison wrote, “The requirement to have a robust underpinning WFO platform that can drive operational performance does not go away. Gartner therefore assessed each solution’s ability to optimally forecast, schedule, evaluate and train agents within an omnichannel customer engagement center.” “We are pleased to have our commitment to WEM leadership acknowledged for 11 consecutive versions of this report,” said Verint’s President, Elan Moriah, “We believe Gartner’s recognition of our market strengths validates what we hear from customers and the market at-large. In fact, our unified and automated approach to employee engagement continues to gain traction with our customers.” As the customer engagement company, Verint helps organizations simplify, modernize and automate the way they engage customers through their contact center, branch, back-office and marketing departments, as well as how they empower and engage employees to serve them effectively across assisted and self-service channels. Backed by the latest artificial intelligence and advanced analytics technologies, its broad portfolio of cloud and hybrid solutions delivers greater automation and shared intelligence to drive workforce engagement, customer loyalty and business impact. “Gartner recommends that WEM solutions be considered strategically within customer engagement centers (CECs), as they not only help improve operational performance but also elevate employee engagement,” added report Co-authors and Senior Research Directors Harrison and Davies, “Key market and societal shifts require a repositioning of how organizations manage employee engagement within their contact centers.” SecurityLink India ■ March 2019

73


International Updates

Participates in ISC West 2019

Showcasing Open, Adaptable, STMicroelectronics Scalable and Secure PSIM Breaks Major

C

NL Software, the world leading global provider of open, adaptable, scalable, and secure physical security information management (PSIM), will be showcasing its latest IPSecurityCenter™ PSIM software at the connected security expo at ISC West in Las Vegas during 10-12 April 2019. CNL Software will demonstrate how its PSIM platform helps law enforcement and government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses integrate, automate and manage systems, allowing increased security intelligence and improved operational efficiency.

The expo addresses the convergence of the physical and digital security domains and is designed to help physical security system integrators and end users keep pace as the IoT evolves and security needs to process and interpret more data and respond to more security events each day. The connected security expo is a unique opportunity for physical security system integrators and end users to gain access to cutting-edge security technology designed to increase security intelligence and help mitigate emerging threats in our hyper-connected world. “IPSecurityCenter helps organizations efficiently identify and manage the threats that pose the greatest risk to them and that require immediate attention,” says Mike Mostow, General Manager – Americas, CNL Software, “IPSecurityCenter is purpose-built for physical security and includes out-of-the-box correlation rules, analytics, dashboards, workflows and reporting to help organizations quickly and efficiently address their most pressing security use cases.” 74

SecurityLink India ■ March 2019

Milestone for ST33 Secure Chips with Over One Billion Sold to Secure the Connected World S

TMicroelectronics has recorded cumulative sales of over one billion units for its ST33 embedded-security ICs. The popularity of the ST33 family reflects the growing imperative to protect data and systems in secure mobile-consumer, smart-driving, smart-industry and smart-cities applications. Based on a common certified secure platform featuring state-of-theart cyber protection, the ST33 family’s flexible architecture has enabled ST to lead the development of new classes of security chips including embedded SIMs (eSIMs), embedded secure elements (eSEs), and trusted platform modules (TPMs). They provide hardened security in design-in and user-friendly form factors, combining convenience with strong resistance to cyber attacks. “ST33 chips have driven the evolution of embedded security for the ubiquitous connected smart objects


International Updates

such as smartphones, wearables, and IoT devices that make today’s world work,” said Laurent Degauque, Marketing Director, Secure Microcontroller Division, STMicroelectronics, “As the first such devices to adopt the advanced Arm®SecurCore® SC300 secure processor, and with the advantage of our flexible architecture and advanced flash technology, the family has consistently provided protection that meets the highest industry standards while enabling the integration of new features such as interfaces and accelerators to support emerging use cases.” The ST33 is the embedded security platform chosen by SIM vendors, operating system developers, and major tier-1 manufacturers producing equipment such as smartphones, wearables, security readers, desktop PCs and servers. ST33 secure chips have been selected by major smartphone OEMs to deploy new eSIM based devices, taking advantage of a smaller and thinner WLCSP (Wafer Level Chip Scale Package) package and GSMA-compliant personalization-on-wafer industrial flow. In 2018, ST was the first chip manufacturer to earn the GSMA SASUP (security accreditation scheme for UICC production) certification to personalize ST33 eSIMs for mobiles and connected IoT devices with no further programming required by the OEMs. ST33 secure microcontrollers are available in a wide range of variants offering a choice of features including connectivity to an NFC controller, hardware accelerators for advanced cryptographic functions, as well as industry-grade and automotive-grade qualifications.

IndigoVision Releases a New Access Control Integration with Nedap T

he new IndigoVision Nedap AEOS Integration allows events from Nedap AEOS systems to be seamlessly combined with IndigoVision’s security management solution, Control Center, giving complete video and alarm management in a single user interface. All of IndigoVision’s integrations are designed with security in mind and the Nedap AEOS Integration is no different. Since 1980, Nedap has been a leader in the design and manufacture of electronic access control systems. The new IndigoVision Nedap AEOS Integration can trigger live video, move PTZ cameras, start recordings and send notification emails automatically, helping to dramatically decrease operator response time.

Events from Nedap AEOS can be forwarded to Control Center allowing operators to respond to incidents from a single interface. Examples of supported Nedap AEOS events are direct door alarm, door manual unlock, door open too long and badge no access events. Commenting on the Nedap AEOS Integration, IndigoVision’s Software Product Manager Giles Raine said, “Nedap’s AEOS access control is clearly growing rapidly in the marketplace. There’s a lot of positive buzz about it – so it’s great to be adding this integration to our portfolio. Nedap themselves have been outstanding in their support during our development of the integration, making them a pleasure to do business with.” IndigoVision’s Nedap AEOS Integration is not only designed towards enhancing security but also to give you the flexibility and choice to create a custom security management solution that works for the user. While using any one of IndigoVision’s Integrations users can be sure that they won’t be let down. SecurityLink India ■ March 2019

75


International Updates

Participates in ISC WEST’19 Unveiling New-Age Security Solutions for Enterprises Intelligent IP video surveillance, access control and time-attendance solutions for modern enterprise

M

atrix Comsec is participating in ISC WEST 2019, Las Vegas, USA on 10 April 2019 to showcase its comprehensive range of IP video surveillance, and people mobility management – an innovative range of access control and time-attendance solutions. Both these solutions are specifically designed for large and multi-location enterprises, SME and SMB organizations. Matrix is offering technology driven, innovative, and futuristic solutions catering to diverse and complex deployments especially for the SMB, SME and large enterprises. They will unveil COSEC ARGO – The next generation door controller with a blend of

76

performance and aesthetics. The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistant (IK08) etc. In people mobility management – access control and time-attendance domain, they will display COSEC VYOM – a scalable, cloud based time-attendance and access control solution. In addition, few more controllers and devices with new generation identification technologies are in the pipeline, including COSEC ARC – a unique IP based access control panel having multiple benefits over conventional ac-

SecurityLink India ■ March 2019

cess control panel. Being PoE based, it eliminates complex wiring and local power requirements. Matrix SATATYA is an IP video surveillance solutions portfolio which includes network video recorders (NVRs), IP cameras and centralized video management system. Matrix SATATYA is positioned as an enterprise grade solution. Matrix Comsec will also showcase professional series IP cameras powered with SONY STARVIS series sensors and EXMOR technology. This technology provides the camera an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimization and various other features. It is most suitable for enterprises demanding much more than just video capturing, viewing and recording. Matrix SATATYA offers centralized video surveillance with add-on applications such as command & control, parking management, weighbridge integration and cognitive response engine. SATATYA’s flexible architecture and vast range of functions-features are designed to cater diverse industries including BFSI, retail, services, hospitality, manufacturing, transport, ports and logistics, research laboratories, data centers, defense and government.


International Updates

NICE Transformational Global Policing Summit Showcasing the Power of Digital Evidence Management & Robotic Automation Co-sponsored by CoPaCC, Deloitte and Microsoft, NICE’s London-based Summit focuses on transforming the investigative process through automation and robotics

N

ICE is to host a Transformational Global Policing Summit, taking place on March 19, 2019 at Chelsea Football Club in London. Co-sponsored by Deloitte, Microsoft and CoPaCC, the Summit features free registration for police executives who are focused on transforming how their agency manages digital evidence, as reflected in the National Police Chief ’s Council (NPCC) Policing Vision 2025. Summit participants will benefit from sessions on digital evidence management (DEM) and robotic automation led by forward-thinking experts and colleagues in the force.

ation of Scottish Police Superintendents, the survey provides feedback from over 4,000 police officers and staff on their DEM challenges, how they’re coping, and plans for the future. The Summit agenda will also feature a high-level digital policing panel, ‘The Now, the Future and the Possible’ which will be led by former Deputy Chief Constable of North Yorkshire Police, Paul Kennedy. Kennedy commented, “At this Summit, we’ll be looking at how forces can forge a cohesive plan to replace the current siloed approach to digital evidence, as well as looking at how the disclosure process can be improved to ensure successful proseDigital evidence survey results cutions.” unveiled The Summit will provide hands-on demonstrations of he priorities and timelines for digital transformation transformative technologies being used by forces around the will be outlined in a presentation by Bernard Rix, world for digital evidence management including NICE InChief Executive of CoPaCC (an independent organization vestigate. These demonstrations will be complemented by a that takes an active interest in policing governance for Engpresentation of a police force success story illustrating how land and Wales) and publisher of Policing Insight, an inthe force was able to go from a situation where 90% of digformational resource for the ital evidence was not readily police and criminal justice accessible for investigations community. In a session tito its position today, where  Mounting digital evidence is on a tled, “Know Your ICT Landit has deployed new DEM collision course with outdated technology, scape – Make a Plan,” Rix technology that has already decades-old investigative processes, will unveil the results of the ingested over 121,000 cases, and resources that are being stretched ground-breaking Nationand matched 345,000 items to the limit, all creating the perfect storm. al Police ICT 2018 survey, to those cases. The success It’s a now or never moment for the “Digital Evidence Managestory will show how today’s transformation of policing and as such ment: User Perspectives.” force investigators can obthis is a must-attend event for every force, Conducted with the tain and assemble the eviwhatever the stage of their digital evidence support of the Police Federdence they need for cases management planning  ation of England & Wales, in minutes or hours, instead Chris Wooten the Police Superintendents’ of the days or weeks it took Executive Vice President, NICE Association and the Associpreviously.

T

SecurityLink India ■ March 2019

77


International Updates

Participates in Showcases Iot-Enabled Intelligent Surveillance Solutions

C

P PLUS pulled up a great show at the recently held INTERSEC 2019 at Dubai where they showcased their IoT-enabled intelligent surveillance solutions such as standalone AI cameras, face recognition (deep learning algorithm), gender, age and emotions detection, and smart search for analytics, 3D people counting, object tracking, and LPR solution. Speaking about the event, Aditya Khemka, MD, CP PLUS said, “CP PLUS team actively participates in the In-

Yogesh Dutta, COO, CP PLUS quoted, “This was the 5th year in a row that we are participating in Intersec, Dubai event. We showcased industry-specific security and surveillance solutions, largely based and focused on AI. The turn-out at the event was phenomenal, atmosphere was filled with enthusiasm, and our pavilion attracted large number of footfalls.”

Vertical solutions showcased

IoT enabled smart surveillance solutions tersec Dubai exhibition every year. It provides us an opportunity to showcase our most innovative offerings amid an international audience. This year, we wanted to go big on IoT-enabled intelligent surveillance solutions and showcased our latest surveillance range of products for sectors like banking, hospitality, retail, real estate, industry and manufacturing among others. In an evolving digital world, we are pushing for AI-based intelligent solutions for each vertical market.”

S

tandalone AI cameras with face recognition (deep learning algorithm) and gender, age, and emotion detection were on display, equipped with features like smart search for analytics, 3D people counting, object tracking and LPR solution.

Banking and hospitality solutions

F

or the banking sector, they displayed ATM solution with motorized zoom for outside ATM, WDR with audio alert, and face capturing camera pin hole hidden camera with smart analytics. For the hospitality industry, they showcased solutions for perimeter security with motorized zoom and smart analytics, parking area surveillance with LPR, fish-eye camera for 360 view, and corridor area surveillance with corridor mode. Time and attendance solution was also presented there.

Industry and storage solution

F

or the industrial sector, industry-grade explosion-proof, anti-corrosion, IP68 cameras with surge protection were displayed, along with vandalism detection solution with in-

78

SecurityLink India ■ March 2019


International Updates

telligent video analysis, ANPR solution, and access control system. Other solutions shown were intrusion alarm integrated with beam sensor for temperature measurement, fire detection, equipment failure, leakage in chemical containers, oil & gas leakage, energy audits, electrical drops, panel, breakers, switches, and wire connection. In storage, Seagate SKYHAWK surveillance solution also showcased for the audience.

Retail & real estate surveillance solutions

F

or the retail sector, people counting, face detection, and heat map to detect crowd and POS solution with text overlay on video were in the offering. While for the real estate sector, parking area surveillance solution with 4K H.265 network camera and 2MP@60fps LPR camera were displayed; with multi-apartment TCP/ IP VDP solution.

Home surveillance solutions

E

zykam solution having home on phone with Insta Cloud was displayed.

Transport solution

I

n this, solutions on 3G/ 4G remote monitoring, GPS tracking and GEO fencing, wireless auto backup, alarm integration, video archiving, shock, vibration & tamper proof solution, analytics with AI were displayed.

On-Campus solution

S

olutions showcased for this vertical were entry/ exit for vehicle monitoring, perimeter protection with WDR motorized zoom with intelligent analytics, classroom monitoring with edge recording, open area monitoring with PTZ auto tracking, and fish eye camera for library, cafeteria, hallways, corridors.

City surveillance solutions

C

ity surveillance solutions for market area with PTZ cameras, body-worn hand-held surveillance, camera with SFP Port for long distance transmission, face recognition for identity detection, Starlight PTZ with high quality imagery in low light environment were displayed.

SECON 2019 6 to 8 March 2019, KINTEX, Korea

S

ECON is set to be held from 6 to 8 March 2019 at KINTEX, Korea, with a show size of 22,0002, to boost global trade for all kinds of security products and solutions. SECON 2019 is to present various types of solutions reflecting the changes in recent security environment including IT security/ information security solution, IoT security/ home security solution, smart city solution, video surveillance, access control, social security system, intelligent transport system, and homeland security/ industry security. Simultaneous interpretation will be provided at ‘Security World Conference,’ for day 2 overseas attendees. This year’s in-depth conference programme will be held under the theme of ‘AI Based Security Technology Trends based in the 4th Industrial Revolution.’ Other topics of discussion at the conference will include ‘Pros and Cons of Intelligent Physical Security Technology’, ‘Examples of Smart Island in Jeju’, ‘Security Strategy for 2022 FIFA World Cup Qatar™’, ‘Intelligent Video Analytics Beyond Security’, ‘Introducing DMS, the core of The Fourth Industrial Revolution, empowered by AI and Big Data’, ‘Airport Security and Convenience’, ‘All things about CCTV Surveillance Security.’ SecurityLink India ■ March 2019

79


International Updates

IDIS Receives National Productivity Award Presidential Citation G

lobal video surveillance manufacturer IDIS has received National Productivity Award presidential citation at the 42nd National Productivity Competition held by the Ministry of Trade, Industry and Energy and run by the Korea Productivity Center at COEX, Seoul. The National Productivity Award is a government reward for corporations, organizations and individuals that have shown representative productive activities resulting in successful business outcomes. IDIS won the award because of its custom-designed IDIS smart factory that perfectly matches its business characteristics. IDIS has been able to build a manufacturing facility with a flexible production system utilizing big data that can modularize and refine its production processes. As a result, IDIS was able to increase its productivity, strengthen innovation, and offer its valuable experience to customers. All of the processes in the IDIS smart factory are computerized, from material warehousing to management, production, function tests and even packaging, resulting in increased productivity. In addition, real-time production planning, cause-of-defect analysis, and tracking were able to be achieved by breaking down process histories. With the computerization of the automatic processes in the IDIS smart factory, if a certain product is missing materials or doesn’t pass a functionality test, it does not proceed to the next stage. This blocks any possible defects, enhancing customer satisfaction by improving quality and creating products that can be massively customized. This National Productivity Award recognizes IDIS’ innovative technology worldwide, raising the company’s value on the global stage. “It is rewarding to see the IDIS Smart Factory, which has taken years of effort to build, receive this prize,” said Y. D. Kim, CEO, IDIS, “Awarded as the leading 4th Industrial Revolution company, IDIS will continue to strive to be the best global video surveillance manufacturer and make an impact in the AI industry by utilizing its technology. 80

SecurityLink India ■ March 2019

Paxton Named One of the Best Places to Work – Again

P

axton is one of the best companies to work for in the UK – it’s official. The Brighton-based technology company ranks 91 in The Sunday Times 100 Best Companies to Work For 2019 list, announced at an awards ceremony last night. It’s the second year running it has made it onto the high-profile list. Paxton, which designs and manufactures security systems, was the only East Sussex company and the only security manufacturer in the UK to appear. The ranking was based on glowing feedback from staff, who rated Paxton highly in areas including leadership, team culture and giving something back. Adam Stroud, Paxton’s Chief Executive said, “We’re so happy to be in the Sunday Times Best Companies to Work For list for the second year running. This is a huge achievement and we’re incredibly proud. It’s the people that make Paxton such a fantastic place to work and they are the reason for our continued success. “With teams in 12 locations across the world, it’s important to foster a sense of community – but key to that is staff wellbeing and engagement.


International Updates

“We always listen to our staff, and thanks to their feedback, have been able to introduce a whole host of initiatives to help them thrive. This not only allows our teams to reach their full potential, it also means we can attract the best and brightest talent. “But while we’re delighted to again be recognised as one of the best companies to work for, we’ll always ask our staff if we can do better and will be introducing more initiatives in the year ahead. We’re excited about the future and becoming an even better place to work.” The Sunday Times Best Companies to Work For list is compiled using feedback from staff surveys, conducted independently by Best Companies. Paxton’s survey highlights included: ●● 94% agree the company encourages charitable events. ●● 92% of staff believe they can make a valuable contribution to the success of the company. ●● 87% feel proud to work for Paxton. Paxton was founded in Lewes in 1985 and has seen a rapid expansion in recent years. Employing over 300 people globally, it develops all products at its state-of-the-art technology centre, in Home Farm Road, just off the Lewes Road, Brighton, manufactures all products at its factory in Eastbourne and exports to more than 60 countries globally. It strives to be an employer of choice and offers benefits such as free breakfasts, healthy snacks and drinks, private healthcare, a modern working environment with the latest technology, fully supported career progression and training, flexible working and family-friendly policies.

The Cyber Threat C

yber threat is rated as one of the top risks for businesses worldwide, and the security system is an important part of protecting business from cyber attack. A cyber breach in the security system could open doors, control building systems, expose data, or provide a way to leapfrog into other business systems. The resulting disruption to operational continuity, data loss and damage to reputation has the potential to impact the whole business, at every level. It’s a risk that simply can’t be ignored.

The Gallagher security solution

G

allagher’s unparalleled cyber security protection is an integral part of security solutions. The baked-in cyber security product development philosophy ensures robust cyber security is built in at every stage. Gallagher’s dedicated cyber security research team regularly carries out internal and external vulnerability testing, providing ongoing protection in an ever evolving cyber threat landscape. Their intelligent data management uses industry-leading standards for data protection. End-to-end encryption with secure, encrypted SQL databases and end-toend authentication are all part of the Gallagher solution. They provide system hardening and configuration advice, and fully trained and certified installers to ensure a system is as cyber-secure as possible on installation.

Manufacturing to the highest security standards

G

allagher security solutions are engineered to meet the requirements of critical sites with some of today’s highest security requirements, from utilities and civil infrastructure to corrections and defense facilities. Their fully authenticated and encrypted system meets global best practise in high security. Even if it is not required to meet these standards, the system benefits from the expertise and in-depth knowledge of the Gallagher team behind your security solution.

Why it’s important to stay up to date

I

n a world where cyber threats evolve daily, defenses also must evolve accordingly. Gallagher security solutions are continually tested to the highest possible standard to proactively address the evolving threat of cyber at a software and physical level. SecurityLink India ■ March 2019

81


white paper

Maximizing the Value of Data Privacy Investments The EU’s General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand

M

ost organizations have invested, and continue to invest in people, processes, technology and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and therefore organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and generally do business with. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchmark Study, a double blind survey completed by more than 3200 security professionals in 18 countries and across all major industries and geographic regions. Many of the privacy specific questions were addressed to more than 2900 respondents who were familiar with the privacy processes at their organizations. Participants were asked about their readiness for GDPR, any delays in the sales cycle due to customer data privacy concerns, losses from data breaches, and their current practices related to maximizing the value of their data. The findings from this study provide strong evidence that organizations are benefitting from their privacy investments beyond compliance. Organizations that are ready for GDPR are experiencing shorter delays in their sales cycle related to customers’ data privacy concerns than those that are not ready for GDPR. GDPR ready organizations have also experienced fewer data breaches, and when breaches have occurred, fewer records were impacted and system downtime was shorter. As a result, the total cost of data breaches was less than what organizations not ready for GDPR experienced. Even though companies have focused their efforts on meeting privacy regulations and requirements, nearly all companies say they are receiving other business benefits from these investments beyond compliance. These privacy-related benefits are providing competitive advantages to organizations, and this study can help guide investment decisions as organizations work to mature their privacy processes. 82

SecurityLink India ■ March 2019


white paper

The Results

 This research provides evidence for

GDPR readiness

A

mong all respondents in the Data Privacy Benchmark Study, 59% indicated that they are meeting all or most of GDPR’s requirements today. Another 29% said they expect to be GDPR ready within a year, leaving 9% who said it would take more than a year to get ready. While GDPR applies to businesses located in the EU or to the processing of personal data collected about individuals located in the EU, it is interesting that only 3% of the respondents in our global survey indicated that they did not believe GDPR applied to their organization.

something privacy professionals have long understood – that organizations are benefitting from their privacy investments beyond compliance. The Cisco study demonstrates that strong privacy compliance shortens the sales cycle and increases customer trust  Peter Lefkowitz

Chief Digital Risk Officer, Citrix Systems 2018 Board Chairman, International Association of Privacy Professionals (IAPP)

Figure 1: GDPR readiness Percent of respondents

By country, the level of GDPR readiness ranged from 42% to 76%. Not surprisingly, the European countries in the survey (Spain, Italy, UK, France, Germany) were generally on the higher end of the range. Respondents were asked to identify the most significant challenges their organizations faced in getting ready for GDPR. The top responses were data security, internal training, evolving regulations, and privacy by design requirements.

Figure 2: GDPR readiness by country Percent of respondents

Figure 3: Most significant challenges in getting ready for GDPR Percent of respondents

Sales delays due to privacy

R

espondents were asked whether they are experiencing delays in their sales cycles due to customers’ data privacy concerns. 87% of respondents said they do have sales delays, whether from existing customers or prospects. This is significantly higher than the 66% of respondents who reported sales delays in last year’s survey and is likely due to the increased awareness of the importance of data privacy, GDPR becoming enforceable, and the emergence of other privacy laws and requirements. Data privacy has become a board-level issue for many organizations, and customers are making sure their vendors and business partners have adequate answers to their privacy concerns before doing business together. When asked about the length of the de-

SecurityLink India ■ March 2019

83


white paper

Figure 4: Respondents experiencing delays in their sales cycles due to customers’ data privacy concerns, Percent of respondents

lay, the estimates varied widely. The average delay for sales to existing customers was 3.9 weeks, and over 94% of organizations reported delays between 0 and 10 weeks. Nonetheless, there were some organizations reporting delays up to 25 to 50 weeks or more. Note that the average delay for sales to prospects was 4.7 weeks, perhaps reflecting the longer timeframes needed to adequately address privacy concerns in a new potential customer relationship. These average delays for both existing customers and prospects are significantly shorter than the average of 7.8 weeks reported in last year’s survey, perhaps reflecting the fact that firms have become better equipped over the last year to answer customer’s privacy concerns.

Figure 6: Country break-down of distribution of sales delays Percent of respondents

Sales delays, at a minimum, cause revenue to be deferred for some period of time. This can lead to missed revenue targets, impacting compensation, funding decisions, and investor relations. In addition, delayed sales can often turn into lost sales, for instance, when delays cause a potential customer to buy a competitor’s product or not buy the product or service at all. Respondents were also asked to identify the reasons for any privacy-related sales delays at their organizations. The top responses included the need to investigate specific cus-

Figure 5: Delays in answering customers’ data privacy concerns Percent of respondents

By country, the distribution of sales delays for existing customers ranged from 2.2 weeks to 5.5 weeks. Longer delays can usually be found where privacy requirements are high or in a state of transition, as organizations work to adapt to the concerns raised by their customers. 84

Figure 7: Reasons for sales delays, Percent of respondents

SecurityLink India ■ March 2019


white paper

tomer requests, translating privacy information into the customer’s language, educating the customer about the company’s privacy practices or processes, or having to redesign the product to meet the customer’s privacy requirements.

Business benefits of privacy investments

O

rganizations that have invested in getting ready for GDPR have done so primarily to avoid the significant fines and other penalties associated with not meeting the regulation. However, as the research indicates, there are other significant business benefits associated with these privacy investments. In looking at the sales delays due to privacy issues, the average delay for selling to existing customers was 3.9 weeks. However, those organizations which reported they are meeting all or most of GDPR’s requirements had an average sales delay of 3.4 weeks, compared to 4.5 weeks for organizations which aren’t yet ready but expect to be within a year, and 5.4 weeks for those organizations that are over a year away from being GDPR ready. Thus, the least prepared organizations have average delays that are nearly 60% longer

associated with their data, and to establish or strengthen protections for that data. While most companies reported having a data breach in the last year, a lower percentage (74%) of the GDPR ready companies were impacted, compared to 80% of the organizations less than a year from GDPR readiness and 89% of those that are farthest from being GDPR ready.

Figure 9: Business benefits of privacy investments

Furthermore, once a breach occurred, the GDPR ready companies experienced a smaller impact. The average number of records impacted was 79,000 for these companies versus 212,000 for those that are least ready for GDPR. GDPR ready companies also experienced shorter system downtimes associated with the breach, perhaps connected again to better management of their data assets. GDPR ready companies had an average system downtime of 6.4 hours versus 9.4 hours for organizations least ready for GDPR. With fewer records impacted and shorter downtimes, it is not surprising that the GDPR-ready companies experienced

Figure 8: Average weeks delay (existing) Percent of respondents

than those who are most prepared. Another tangible benefit from GDPR readiness is that it appears to lower the frequency and impact of data breaches. GDPR requires organizations to know where there personally identifiable information (PII) is located and provide appropriate protections for this data. These efforts may have helped organizations better understand their data, the risks

Figure 10: Probability of data breach loss of $500k Percent of respondents

SecurityLink India ■ March 2019

85


white paper

lower overall costs associated with data breaches. Only 37% of these companies had losses from data breaches totaling at least $500,000, compared to 64% of those companies least prepared for GDPR.

for further research to better understand how organizations are maximizing the value of their data assets.

Organizations recognizing the benefits of privacy investment

T

he previous two sections of this study highlighted the correlations between privacy investments and business benefits such as shorter sales delays and fewer and less costly data breaches. It is interesting to note that most respondents are now recognizing many of these benefits. When asked whether privacy investment was yielding benefits (such as greater agility and innovation, gaining a competitive advantage, achieving operational efficiency, etc.), 75% of all respondents identified two or more of these benefits and nearly all companies (97%) identified at least one benefit. Figure 12: Behaviors typically found in mature data environments. Percent of respondents

Implications

T

Figure 11: Benefits of privacy investments, Percent of respondents

Maximizing the value of data

D

ata privacy is one critical aspect of an organization’s overall effort to maximize the value of its data assets over the data’s lifecycle. Like any other asset, data should be efficiently acquired, stored, protected, utilized, and archived/ deleted. Organizations that maximize the value of their data in appropriate ways can benefit greatly by building trust with customers and using well-protected and curated data to enhance the customer experience and drive greater value for all stakeholders. Respondents in this survey were asked about a range of behaviors typically found in mature data environments such as having a complete data catalog, connecting data to other assets, hiring a chief data officer, and monetizing the data externally. Fewer than one-half of the survey respondents exhibited each of these characteristics, and this will be an area 86

hese results highlight that privacy investment has created business value far beyond compliance and has become an important competitive advantage for many companies. Organizations should therefore work to understand the implications of their privacy investments including reducing delays in their sales cycle and lowering the risk and costs associated with data breaches as well as other potential benefits like agility/ innovation, competitive advantage and operational efficiency. The analysis and insights from this survey can serve as a framework and starting point for each organization to maximize the value from its privacy investments.

Conclusion

T

his research has quantified a number of business benefits connected to privacy maturity. Many of the benefits initially identified in last year’s report have been confirmed and explored more fully, including reducing privacy-related sales delays and reducing the frequency and impact of data breaches. In future research, we’ll explore how these benefits are changing over time, especially as privacy regulations and customer expectations continue to evolve in different industries and different geographies. Cisco will continue to work with our customers and other leaders in the privacy field to provide informbation for better investment decision-making and improved trust with our customers.

SecurityLink India ■ March 2019


white paper

(India’s Leading Monthly Magazine & e-News Portal on Security, Safety & Fire)

PRINT & DIGITAL India’s Leading & Awarded Media Platform for Security (Physical, Homeland and Cyber) & Fire Safety

The Best Reach to the Indian Market SecurityLink India (Print)

e-Newsportal: www.securitylinkindia.com

 Total Print – 12000 plus

 Average Monthly Traffic: 250000+

 Total Readership: 50000 plus

 Average Unique Visits: 30000+  E-mail Blasts – 35000+

Exciting opportunity for the promotion of your products and services through advertisements and advertorials Recognized by

Find us at:-

https://www.facebook.com/SecurLinkIndia/

Online distribution through

https://twitter.com/SecurityLinkIND https://www.linkedin.com/in/securitylink-india-424a75145/

Reach us at:

info@securitylinkindia.com; editor@securitylinkindia.com SecurityLink India ■ March 2019

87


product showcase

●●

Hikvision Launches Smart Poles for Smart Infrastructure Solutions

●● ●● ●●

HIK-SIP, RTSP, and ONVIF compliance. Video collection and all-day monitoring with 2MP HD camera. EHome and Hik-Connect service. Two-way audio function with up to 5m communication distance; built-in high sensitive microphone. Audio extension with 3.5mm standard audio interface.

H

ikvision launched its Smart Poles for smart infrastructure solution. The solution uses cutting-edge Hikvision technology to secure people by keeping them connected while they are on move. In this challenging world, Hikvision Smart Poles offer better safety and security solution to keep public areas more secured in day as well during night. Hikvision Smart Pole has following special inbuilt features: ●● Integrated PTZ camera to capture live view and zoom areas which are critical. ●● Emergency call box with HD camera, to raise panic alarm/ emergency alarm. ●● It helps realize alarms and aids, and provides more efficient services as soon as possible for building social stability. ●● Supports two-way audio for communicating with command control. ●● Supports scheduled turning the alarm lamp on/ off in case of emergency. It is mainly applied to the scenarios of school, square, tourist attraction, hospital, supermarket gate, market, station, parking lot, etc. Key features ●● Embedded Linux operation system. ●● High-performance embedded SOC processor. ●● Supports network adaptive and video and audio adaptive to realize low latency. ●● H.264, H.264 SVC and H.265 video compression standard, and G.711U and G.726 audio compression standard. ●● Wide dynamic range (WDR) and high light compensation (HLC). ●● Multiple communication protocols – TCP/ IP, SNMP, 88

Spectra Professional 4K For High-Resolution PTZ Surveillance

P

elco™ by Schneider Electric has recently announced the immediate availability of the new Spectra Professional 4K cameras to their portfolio of high resolution (4K) fixed and pan/ tilt/ zoom cameras. From license plates to faces, the rugged outdoor camera features state-of-the-art surveillance camera resolutions and compression standards to clarify details of interest in crowded or poorly lit areas such as city surveillance, airports, metro stations, waterways, roadways, bridges, and other outdoor commercial applications. Areas such as seaports and waterways are particularly in need for better surveillance technology, with an estimated annual loss of 50 billion U.S. dollars, according to the National Cargo Security Council. The Spectra Professional 4K provides a solution for organizations which are frustrated with the inability to zoom into crowded, outdoor areas with low levels of light. “ T r a d i t i o n a l l y, when operators zoomin on 1080p video the details can become indistinct because there are only so many pixels,” explained Rob Yockey, Pelco’s Senior Product Line Manager,

SecurityLink India ■ March 2019


product showcase

“With 4K resolution, one camera can cover a large area and offer the ability to zoom in with greater details. This technology greatly improves security operations in both live monitoring as well as in forensic analysis.” The Spectra Professional 4K camera technology enhances the ability to recognize and identify objects at greater distances. It also provides infra-red illumination up to 150 meters, streams video in H.265, H.264 or MJPEG formats, and can see 15 degrees above the horizon. “Pelco continues to expand its 4K resolution camera offering with the Spectra Professional 4K line of PTZ cameras by providing detailed images more clearly than ever before at greater distances,” Yockey continued, “Spectra Professional 4K’s innovative features capture outstanding detail in lowlight conditions and is ideal for tracking people and vehicles across wide spaces.”

CP TALK New AI Chatbot A one-of-its-kind technology initiative by CP PLUS to amplify guided-customer-support service

I

n a bid to make customer interactions intuitive, responsive and friendlier, CP PLUS has launched AI-powered chatbot called CP TALK. The chatbot is a friendly chat assistant for the customers on the company website. CP TALK will help customers in exploring precise information about CP PLUS products and solutions.

Benefits

I

n addition to the benefits that the Spectra Professional 4K camera provides with outstanding image quality, smart compression technology and sharp 4K detail, the new camera also includes the following key features: ●● Improved detection: With up to 4K resolution at 30ips, the Spectra Professional 4K can cover a large area with clarity of detail to record information such as license plates numbers or faces of people. ●● Integrated IR: Primarily for outdoor applications with poor lighting conditions, the camera provides IR capabilities like Esprit Enhanced IR models. In response to some cities passing laws to restrict white light pollution near apartments or in empty parking lots, the camera provides IR illumination that enables operation in the absence of visible light. ●● Operational efficiency: The camera offers operators H.265 video encoding and Pelco smart compression that reduce the storage required while preserving image quality. With excellent PTZ responsiveness, and features such as patterns and frame scan, Spectra Professional 4K enables close manual tracking of people or vehicles as well as ability to cover spaces in an automated fashion. ●● Tilt to +15º above the horizon look-up: Allows for extended viewing area above most dome cameras that can only see to the horizon. ●● EIS (electronic image stabilization): Reduces blurring associated with camera motion in environments subject to vibration.

Quoting on the launch, Aditya Khemka, MD, CP PLUS said, “At CP PLUS, customers have always been the focal point. Emerging digital technologies such as the chatbot assisted platforms are going to change the way we have been interacting with customers; they are more likely to be the key drivers of customer satisfaction. Our own AI-based chatbot ‘CP TALK’ has been conceived to increase the ratio of engagement with our channel partners and customers. I am sure it will augment customer satisfaction to the next level.” Chatbot – CP TALK is designed to provide guided customer support to the visitors landing on the company’s corporate website. It will give intuitive answers to all types of customer queries pertaining to CP PLUS’ security and surveillance products & solutions. To apprise on the term guided-customer-support, AI based chatbot, CP TALK will interact with customers and give them relevant information

SecurityLink India ■ March 2019

89


product showcase

regarding a product, ensuring seamless customer support round-the-clock. The chatbot can answer in two-ways; by displaying options or by answering individual customer queries via chat interface. “Artificial intelligence is an intriguing technology, especially when we are thinking about its implications as per the security and surveillance sector. We are proud to have launched our very own chatbot – CP TALK to enhance the experience of our customers. This is an AI-based chatbot developed to provide intuitive customer support. More importantly, the chatbot will provide customized support to each online customer, amplifying the relevance of our brand in this evolving time,” opined Yogesh Dutta on the launch of the chatbot.

IndigoVision’s NVRs are designed to give the user expert storage for bullet-proof evidence. They are essentially the digital bodyguards who never leaves him unprotected. Combined with IndigoVision’s unique distributed network architecture (DNA), users can add more cameras and recorders as DNA removes the need for a central server, resulting in no single point of failure making it truly scalable to grow with them. Trusted in more than 15,000 installations, IndigoVision gives the right solution, experience, technology, and supports to provide them advanced safety.

New Full-Color Ambient Light Sensor

Enterprise NVR-AS 4000

With Flicker Detect Boosts Camera Performance in Smartphones and IoT Devices

Can Now Record up to 800 Cameras

I

ndigoVision’s large Enterprise NVR-AS 4000s have been upgraded, provisioning up to 25% more recorded camera streams, and up to 50% more usable storage. The number of recording streams has been increased to 800 with up to 3PB of usable storage. These NVRs provide guaranteed tamper free evidence, automatic failover and integrated back up as before, but can now cater to much larger sites. Fully integrated with IndigoVision’s security management solution, Control Center, and other security systems for complete alarm management, these devices are ideal for installations with large number of cameras in a single site, or for those with a requirement for long video retention.

90

●● STMicroelectronics’ low-power and miniature multispectral color sensors can be easily integrated and hidden to adjust screen color temperature and brightness in bezel-less smartphones. ●● Sets new standards for smartphone camera assistance for white-balance, artificial/ natural/ outdoor lighting discrimination and flicker frequency measurement to ensure optimal exposure settings.

S

TMicroelectronics a leading global semiconductor provider serving customers across the spectrum of electronics applications, has released an innovative full-color ambient light sensor (ALS) that helps smartphones take better pictures and present more visually accurate data on screen displays. By simultaneously providing scene color temperature, ultra-violet (UVA) radiation level, and lighting frequency information, the VD6281 lets the camera correct white balance and enhance color presentation, and sets appropriate exposure times for the camera to avoid flicker artefacts and eliminate banding in pictures and videos, especially in scenes lit with contemporary LED sources.

SecurityLink India ■ March 2019


product showcase

“Leveraging the company’s extensive camera system know-how, ST’s new VD6281 offers customers a state-ofthe-art multispectral ambient light sensor,” said Eric Aussedat, General Manager of ST’s Imaging Division, “Our roadmap for ALS and flicker sensors is an ideal complement to ST’s market-leading FlightSense™ Time-of-Flight (ToF) product portfolio. With a growing number of high-quality, high-resolution cameras per phone, our goal is to offer an advanced solution to assist white-balance correction and remove flicker artefacts in smartphone camera images. Mobiles equipped with VD6281 were already released in 2018, and many others will be coming soon.” With its small form factor of 1.83x1.0x0.55mm, the VD6281 is the smallest multi-spectral ambient light sensor available, allowing integration in bezel-free smartphones with small notches and inside smart watches, where a high screen ratio is at a premium. The sensor uses high-performance, direct-deposition filter material to create 6 independent color channels – Red, Green, Blue, near-Infrared, UVA and Clear for superior color-sensing capability and cutting-edge CCT (Color-Correlated Temperature) over a wide field-of-view of 120 degrees, enabling accurate assistance for white-balance algorithms, even in difficult conditions including low contrast scenes, low light levels, or exotic artificial lighting.

Oncam Exd Bringing 360-Degree Surveillance to Explosive Environments

O

ncam showcased how it is committed to bringing exceptional 360-degree imaging technology to the toughest and most challenging environments at the recently held 2019 Hazardex International Conference and Exhibition in UK. Making its first appearance at the event, Oncam displayed Evolution ExD camera range, which is certified for explosive environments. Housing a 5MP or 12MP module, the ExD explosive environment camera is the only 360-degree single-sensor camera with an explosion-protected housing and is designed to withstand the harshest elements, temperatures and pressure.

For markets such as oil and gas production and refineries, power and utilities, wastewater treatment, grain handling and storage, and other hazardous materials facilities, this type of resiliency is key, as conditions are typically rough but comprehensive security is paramount. The ExD camera range is designed to prevent flames from leaving the housing in the event of a spark, and its certifications are applicable in various regions. The IECEx voluntary certification scheme facilitates the acceptance of equipment for use in explosive environments in many countries around the world. The system is based on zones that define the probability of ignitable hazardous material being present in the atmosphere such as gas and dust, and the ExD cameras are certified at a ‘high’ protection level. National deviations of the IECEx standard are used worldwide, with the ATEX Directive – a requirement in the European Union. The ATEX certification describes what equipment and work environment are allowed in an area with an explosive atmosphere. The ExD camera range’s ATEX mark certifies the camera for use in non-mining explosion prone environments, with an ambient temperature between -20°C and +55°C. The camera range also features a heavy duty 316L stainless steel housing and is rated IP66, IP67 and IP68 against water and dust ingress. The culmination of the camera’s characteristics highlights its ability to ensure the safety of people and assets in dangerous areas. But the housing of the camera is only one piece of its true value. At the core of the Evolution ExD camera range is Oncam’s patented dewarping technology, which allows smooth manipulation and gives users an immersive and unmatched 360-degree video experience. Panoramic surveillance is critical for obtaining a complete view of a scene with no blind spots.

SecurityLink India ■ March 2019

91


product showcase

Operators can leverage 360-degree and wide-angle technology for remote site monitoring to ensure regulations are being followed, full coverage with enhanced situational awareness, and more informed and immediate response in the event of an incident. With no moving parts or maintenance required, this kind of technology reduces costs and increases ROI. Oncam’s ExD camera is shortlisted for the Hazardex 2019 Awards in the Personnel Protection Technologies (PTT) Equipment category.

known position prior to the impact. The benefits of Invictus’ Attack Detect response to system operators is that post-attack, the camera always returns to its correct field of view, prior to being forcibly moved. This means that vital evidential footage will continue to be captured, and without the need for operator intervention. The feature also ensures that all camera-preset positions remain intact, vital to avoid disruption to the daily running of the system due to inaccurate preset positions.

TNV-7010RC Corner Mount Camera

‘Attack Detect’ Response

for Secure Room Environments

Tested in Traffic Accident

T

he rugged build quality of the new Invictus PTZ camera from UK CCTV manufacturing company, 360 Vision Technology, has been proven in the field during a recent road traffic incident in north London, which provided a real-world test for the camera and its ‘Attack Detect’ response feature.

T

he new Wisenet TNV-7010RC 3 megapixel corner mount camera manufactured by Hanwha Techwin has been designed to meet the requirements of police, prisons and mental health institutions where there is a duty of care to prevent inmates and patients from self-harming The Wisenet TNV-7010RC has a built-in 940nm IR emitter which projects infrared light up to 10 metres at a higher wavelength than traditional red glowing IR lighting. This is invisible to the human eye and avoids the risk of disturbing those sleeping in secure rooms. The true day/ night camera which is able to capture clear, sharp colour images when the light levels are as low as 0.3Lux, also features wide dynamic range (WDR), which performs at up to 120dB, to accurately produce images in scenes that simultaneously contain very bright and very dark areas.

Anti-ligature Built into each Invictus camera, 360 Vision’s ‘Attack Detect’ automatically responds to a detected increase in camera load (such as the camera being hit by an object). On detection, the camera’s direct-drive pan/ tilt mechanism is instantaneously disengaged to prevent damage to the motor drive. A self-check routine then establishes if the camera has altered its direction of view during the attack, and an automatic re-initialisation is triggered – returning the camera to its last 92

Sadly, there are inmates and patients who try to self-harm and with this in mind, the corner mount housing of the Wisenet TNV-7010RC has been built to make it impossible for anyone to tie a ligature around it provided it is properly installed,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, “A lot of thought was also applied to the design of the housing to ensure it is sufficiently robust for secure room environments. It is, for example, IK10+ vandal resistant and has ingress protection rated at

SecurityLink India ■ March 2019


product showcase

IP66 and IP6K9K, as well as a shock detection feature to alert control room operators if anyone is trying to damage it.” To protect an inmate or patient’s privacy, masking zones can be configured precisely over a specific area of the camera’s field of view, whilst a built-in microphone and audio support facilitates two-way communication.

Key features

T

he multi-streaming H.265 Wisenet TNV-7010RC has a long list of additional features which will benefit operators monitoring the open areas of police, prisons and mental health institutions. These include a built-in suite of analytics such as tampering, loitering, directional detection, defocus detection, fog detection, virtual line, enter/ exit, appear/ disappear, audio detection, face detection, motion detection, and sound classification. A ‘hallway view’ provides a highly effective way to monitor narrow vertical areas such as corridors as it enables cameras which can generate images in the 9:16x3:4 aspect ratio, to work effectively in tall and narrow spaces.

management, and dependable storage of all DICOM files. “DICOM files containing patient data are generally largesized, leading to potential storage challenges in hospitals, clinics and other healthcare facilities. With the MediQPACS app for QNAP NAS, these massive DICOM files from connected medical modalities and AET can be securely and centrally stored. QNAP NAS also features various methods for expanding capacity to fit future data storage requirements,” said Anay Badavne, Product Manager of QNAP. Users can easily retrieve and view the DICOM files (including images, tags and patient information) on MediQPACS using the built-in viewer via network connection, providing greater convenience for medical diagnosis workflows. MediQPACS also allows for quickly viewing recently added studies of patients, greatly saving doctors’ time on importing and searching for patients and their studies. By dragging and dropping different DICOM images, doctors can view multiple images at once and can add a layer over the images for further diagnosis using tools such as windowing, leveling, livewire, flood fill contour and more.

MediQPACS Use a QNAP NAS as an Affordable PACS Server

Q

NAP Systems, Inc. released MediQPACS, an application that turns a QNAP NAS into a private PACS (Picture Archiving and Communication System) server to help users securely back up DICOM (Digital Imaging and Communications in Medicine) files from hospital modalities and allows for quick viewing and complete management of medical images. MediQPACS provides healthcare facilities with a budget-friendly alternative for their PACS server in HIS (hospital network systems) with 24/7 availability, central

Push-To-Talk in the Mobile Client

I

n the latest update of Milestone XProtect 2019 R1 video management software, Milestone Systems introduces twoway audio in the Mobile Client, enabling the users to speak to people on camera, directly from their mobile devices. The first XProtect release of 2019 extends the usability of the Smart Client and takes it outside the control room with support for both one and two-way audio in the Mobile Client. This is beneficial for on-the-go security personnel, whose

SecurityLink India ■ March 2019

93


product showcase

Mako GigE Cameras with Sony IMX Sensors tasks require them sometimes to be away from the Smart Client. One-way audio allows users to listen to audio captured by the microphone connected to the camera directly from their mobile phones using the Milestone Mobile application. Users can also increase their situational awareness when a video is not available, like in extreme darkness or when an incident happens outside of the camera’s viewing range. Two-way audio takes the audio capability a step further with Push-toTalk (PTT), a feature that allows users to speak through the camera-connected speaker directly from their mobile phones. This enables security personnel to use their VMS systems preventatively for things like access control, crowd warnings, and intruder alerts – all available on mobile.

Take action faster from anywhere with two-way audio in Web Client

T

he 2019 R1 version of XProtect also includes support for two-way audio in the Web Client. Two-way audio allows users to speak through the camera-connected speaker directly from the Web Client anywhere. This transforms the VMS system into an interactive tool and allows users to respond quickly to things like access control requests and incident prevention without having to be physically present in the control room or on premise.

Mako G cameras with Sony IMX sensors now support easy camera synchronization and triggering over Ethernet

W

ith a firmware update, Allied Vision extends the feature set of the Mako G cameras equipped with Sony Pregius CMOS sensor. The Mako G-040, Mako G-158, Mako G-234, Mako G-319 as well as Mako G-507 now support IEEE 1588 precision time protocol (PTP) support and action commands for triggering the camera via the Ethernet connection (ToE). These cameras now offer a more comprehensive feature set, the latest Sony CMOS sensors, and support for popular C- and CS-Mount lenses in an ultra-compact housing (29mmx29mm). With the new features, the Mako G cameras are particularly suitable for use in multi-camera applications.

Certificate based encryption

T

he 2019 R1 version of XProtect takes the system’s resistance against cybersecurity threats a step forward by encrypting all communication between the recording server and other servers and clients connected to it. This certificate based encryption requires that all components communicating with the recording server including third-party solutions integrated with the VMS system follow a strict certification process, guaranteeing the system’s resistance against cybersecurity threats. This system design provides the user with the best performance encrypted end-to-end. In the latest update of Milestone XProtect 2019 R1 video management software, Milestone Systems introduces twoway audio in the Mobile Client, enabling the users to speak to people on camera, directly from their mobile devices. 94

Synchronization and triggering of cameras in a multi-camera system

I

EEE 1588 PTP enables precise synchronization of multiple cameras and devices within an Ethernet network. The device or camera with the master clock passes the time information to all subordinate clocks, which in turn adjust their time settings so that all devices are set to 2 microseconds exactly at the same time. This feature is often used for recording sports events or objects in motion in order to record them from different angles at the same time. Because all cameras capture an image synchronously at exactly the same moment, a clear 3D image of the situation or object can be displayed as a result.

SecurityLink India ■ March 2019


product showcase

Using Action Commands or the Trigger over Ethernet function, one or more cameras can be triggered simultaneously via the Ethernet connection. Combined with the Power-over-Ethernet function (PoE), a single cable is enough for powering the camera, triggering, camera control and transferring image data. No additional cable is required for triggering, which can reduce system costs and complexity. The ToE function is particularly useful for event-driven applications. If, for example, a ball passes the goal line or an object on the assembly line passes a control threshold, a trigger signal can be sent via Ethernet to the camera, or if necessary, several cameras.

Small size, big performance

I

n addition to the new features for the IMX sensor-based models, all Mako GigE cameras offer features such as: ●● Automatic features including gain, exposure and white balance. ●● Gamma correction and black level (offset). ●● Region of Interest (RoI). ●● Look-up table. ●● User sets. ●● Temperature monitoring. Due to the small dimensions, their industrial design and comprehensive I/O functionality, the integration of the cameras into existing systems is usually very simple. The cameras are particularly suitable for use in compact and cost-sensitive systems where little space is available, for example in automated quality control or in multimedia applications. For the system integration of Mako GigE cameras, users can also use the free Vimba Software Development Kit from Allied Vision, which enables a high-performance software connection to the camera.

fuse reflection (ALDDR), to be used in security graded intrusion detection systems. The technical specification (TS), the latest preliminary stage for a new European standard, is a recognised criterion by PD6662:2017 in the UK, as well as in other national level security requirements of European countries. The Redscan RLS-2020 equipped with the latest firmware (version 2.1 and above) was tested by the VdS Schadenverhütung GmbH, a test house in Germany, and was certified as compliant with the TS as follows: ●● Lasers canner grade 3 on the basis of CLC/ TS 501312-11:2017. ●● The device is suitable for use in intruder alarm systems according to EN 50131-1. ●● The device complies with environmental class II of EN 50130-5. OPTEX’s RLS-2020 LiDAR units are an ideal solution for a number of indoor applications such as protecting ceilings to detect intruders coming down through skylights, virtual fencing, high value assets in warehouses or shops, securing multiple paintings on a wall and loitering detection. Now, by being compliant to TS 50131-2-11:2017, RLS2020 can be added directly onto a grade 3 intrusion detection system, and can increase system performance by adding an extra level of security through functionalities that no other conventional indoor grade 3 detectors (PIRs or dual-tech sensors) can provide.

Evolution 05 & 12 Improved Design and Functionality of Special Stainless Steel Camera

RLS-2020 LiDAR Fully compliant with Grade 3 criteria of European Technical Specification

L

aser scanning sensors, also known as LiDARs, have been a specific subject of the European technical specification, TS 50131-2-11:2017, that defines the functionalities and performance of active laser detector responsive to dif-

O

ncam, the leading provider of 360-degree video capture and business intelligence technology, has recently released its new and improved Evolution 05 and 12 stainless steel camera line with design enhancements that further position the device as the ideal solution for surveillance needs in the most demanding environments.

SecurityLink India ■ March 2019

95


product showcase

that is set apart from standard video security solutions, and the upgrades we’ve made create a robust feature set that is designed specifically for a number of critical applications.”

Compact Wall-Mount Network Surge Protectors Oncam’s Evolution stainless steel cameras provide resilient protection in areas where resistance to the elements and compliance to stringent regulations are paramount. The updated stainless steel camera design includes: ●● Enhanced aesthetics: The camera enclosure is more compact and aesthetically pleasing, making it an elegant solution for applications that feature high-end architecture. ●● High-level certifications: In addition to the camera’s NSF certification and IP69K rating, the new design adds more certifications that demonstrate its effectiveness in harsh atmospheres. ●● NEMA 4X and 6P: For enhanced compliance in the north American market. ●● IP68: Certifies protection against submersion. ●● IK10+: Certifies enhanced protection against impact/ vandalism. ●● Extended accessories range: Comprehensive range of stainless steel accessories and mounting options. ●● Tamper-proof security: The front cover of the camera can only be opened using a bespoke tool, providing increased safety and protection. The stainless steel camera is a core part of Oncam’s specialist camera line, which includes the Evolution ExD cameras certified for explosive environments. This suite of specialist cameras is designed for markets that experience extreme conditions and require durable surveillance equipment to avoid inefficiency or damage. “The enhanced stainless steel camera line incorporates various improvements that when combined, deliver a powerful and dependable safety device for environments that need durability the most,” said Jon Marsh, VP Product, Oncam, “Our customers require surveillance technology 96

D

itek has launched the DTK-WM4 family of wallmount network surge protectors. These 4-channel devices feature state-of-the-art technologies to provide robust surge protection for any desired combination of Ethernet, PoE and PoE Extender circuits, while supporting data speeds up to 10GbE. The compact design offers rapid-replacement surge protection modules with shielded RJ45 connections, and is ideal for smaller installations that do not require large rack-mounted protection systems.

“Smaller installations need just as much network surge protection as large installations – in fact, they may be even more dependent on each circuit,” said Jason Klein, National Sales Manager, DITEK, “Now it is easier than ever to include best-in-breed protection as a part of every project.” Two versions of surge protector available are DTKWM4NETS which is a 4-channel Ethernet and PoE surge protector, while DTK-WM4EXTS is a 4-channel PoE Extender surge protector. Both versions use the same award-winning design as the company’s popular rack-mount models, but in a compact package with simple versatile mounting. The advanced modular design allows for rapid replacement measured in seconds, and the protection modules are the same as the larger rack-mount devices, so one set of spares will

SecurityLink India ■ March 2019


product showcase

support a full range of installations. DITEK’s state-of-the-art network protection circuitry features a hybrid design with both Silicon Avalanche Diode (SAD) and Gas Discharge Tube (GDT) technologies for the best IP network protection available in the market; and the field-replaceable protection modules offer a robust 20kA per pair surge current capacity – the highest available for shielded network devices. All models are compatible with CAT5e, CAT6 and CAT6A cabling infrastructure and support transmission speeds up to 10GbE without signal degradation.

EZVIZ Wi-Fi Cameras Offer Smart Home Solutions

E

ZVIZ Wi-Fi camera provides smart home security systems through its versatile cameras and cloud-based platform. The intelligent and intuitive products from EZVIZ enable customers to see, capture, share and protect what’s valuable to them. EZVIZ is the consumer and residentially focused subsidiary of Hikvision, the world’s largest provider of video surveillance solutions. The EZVIZ range packs the power of a high quality camera offering high definition, crisp videos which can stream live from anywhere from our smart phones. What’s more, the cameras look pretty and classy and give the feel of a high profile electronic gadget kept at home. The footage is clear even at night thanks to night vision capabilities. Features like motion detection and smart motion tracking make these cameras extremely useful and handy covering a large part of the house. A built in microphone and speaker ensure that one can hear and respond to someone on the other end. The recordings are stored in a micro SD card stored in a slot in the camera itself making NVR device redundant. In addition to all the power packed features, EZVIZ cameras are also compatible with Alexa devices from Amazon. These cameras can work seamlessly with Alexa devices like the Echo Spot and Echo Show. A simple process can help integrate the cameras with the Alexa devices. On one command, the devices will start streaming the camera view

live on their screens. Ezviz cameras come in a range of cube camera (MiniO), PT camera (Ez360), outdoor bullet camera (Ezguard), fish eye camera (PanO) and vandal proof dome camera. Each camera can be used as per the requirement, whether the application is indoor or outdoor and the kind of application a user wants for the camera. As the range suggests, not only homes, these cameras can be handy for small offices, shops, showrooms, small warehouses etc., where the owner can keep a tab on his/ her premises on the move. MiniO is a simple indoor camera that can be used to monitor babies, homes and elderly people. It can be installed easily by scanning the barcode on the product through the EZVIZ app on mobile. Within seconds, the end-user can live stream the video on mobile. Ez360 comes with a built in motion detector and smart tracking that will follow any motion or subject in its field of view. The end-user can also change the direction of the camera using the mobile app. Ezguard can be used outdoors as it is dust and waterproof. It also comes with a built in siren (100 dB) which can make sound if there is any suspicious activity in its field of view. PanO is a fish eye camera which gives an unrestricted 360° view of the surroundings. Each camera can be used according to the specific requirement of the customer. So if someone constantly feels the need to monitor his/ her home, keep a tab if children have reached home on time or if the maid is doing her work properly or pet is behaving, the option is EZVIZ Smart Home Cameras & Solutions. In a typical joint family scenario in India EZVIZ can help monitor elderly parents and wife. It gives the peace of mind whether the end-user is in office or outdoors.

SecurityLink India ■ March 2019

97


CCTV OPERATOR

ASSISTANT SECURITY OFFICER

SECURITY OFFICER

Company: Express Infrastructure Pvt. Ltd.

Company: Golkonda Hospitality Services And Resorts Limited

Company: Dr. Balabhai Nanavati Hospital

Exp: 0-1

Exp: 5-7

Exp: 5-7

Location: Chennai

Location: Hyderabad/Secunderabad

Location: Mumbai Suburbs

Job Id: 260418008027

Job Id: 080119007704

Job Id: 070119003622

TECHNICAL OFFICER

SECURITY & VIGILANCE

CHIEF SECURITY OFFICER Company: Larsen & Toubro Limited

Exp: 5-10

Company: Busybees logistics solutions Private limited

Location: Panjim/Panaji

Exp: 3-8

Location: Chennai

Job Id: 261218004332

Location: Lucknow

Job Id: 050119002745

Company: Raxa Security Services

Exp: 20-30

Job Id: 080119001273

SECURITY OFFICER

CSO - EX SERVICE MAN

SECURITY SUPERVISOR

Company: Ablage Technologies Private Limited

Company: Sahiba Limited Exp: 5-10

Company: Maruti Online Private Limited

Exp: 2-7

Location: Surat

Exp: 1-6

Location: Thane, Mumbai

Job Id: 020119002699

Location: Ahmedabad Job Id: 291218005372

Job Id: 030119009354

SECURITY EXECUTIVE

SENIOR EXECUTIVE/EXECUTIVE SAFETY & SECURITY

AREA LOSS PREVENTION MANAGER

Company: The Retreat Hotel And Convention Centre

Company: Virtuous Retail property Services LLP

Company: Reliance Industries Ltd.

Exp: 2-3

Exp: 3-8

Location: Rudrapur

Location: : Mumbai Suburbs

Location: Bengaluru/Bangalore

Job Id: 291218002574

Job Id: 090119003610

Job Id: 070119006717

SENIOR OFFICER GUARD- SECURITY Company: Cement Company:Orient Bram Healthcare Private Exp: 3-7 Limited Location: Exp: 0-5 Jalgaon Job Id: 140716006901 Location: Delhi/NCR

SECURITY EXECUTIVE MANAGER Company: IdeaPhoenix International Company: The Mills Ltd. Exp: 5-10 Exp: 4-7 Location: Location: Bengaluru/Bangalore Lucknow Job Id: 120716006216 Job Id: 070119003787

Job Id: 090119001003

PLAN YOUR

NEXT CAREER MOVE Top Jobs. Top Companies @ Naukri.com

Exp: 5-9

EXECUTIVE - SECURITY & COMPLIANCE Company: Mahindra Logistics Limited Exp: 3-7 Location: Chennai Job Id: 281218006783


TOP TOP NAUKRI NAUKRI JOBS JOBS CHIEFCHIEF SECURITY SECURITY OFFICER OFFICER

AREAAREA FIELDFIELD MANAGER MANAGER

SECURITY CHIEFCHIEF SECURITY SR. MANAGER/MANAGER SR. MANAGER/MANAGER

Company: Company: Growth Growth Opportunity Opportunity Solutions Solutions

Company: Company: The New TheStandard New Standard Security Security ServiceService

Company: Company: OCL Iron OCLSteel IronLtd. Steel Ltd.

Exp: 5-10 Exp: 5-10

Exp: 3-8 Exp: 3-8

Location: Location: Rourkela Rourkela

Location: Location: Delhi/NCR Delhi/NCR

Location: Location: Kanpur, Kanpur, Delhi Delhi

Job Id:Job 221218004924 Id: 221218004924

Job Id:Job 030119009266 Id: 030119009266

Job Id:Job 010119002812 Id: 010119002812

SECURITY OFFICER SECURITY OFFICER Company: Company: Just Textiles Just Textiles Ltd Ltd

Exp: 15-20 Exp: 15-20

SECURITY GUARD SECURITY GUARD

SECURITY SUPERVISOR SECURITY SUPERVISOR

Exp: 5-10 Exp: 5-10

Company: Company: Precision Precision Metal Products Metal Products Company: Company: QualityQuality Solutions Solutions Pvt. Ltd. Pvt. Ltd. Exp: 3-8 Exp: 3-8

Location: Location: Mumbai Mumbai

Exp: 3-8 Exp: 3-8

Location: Location: Kolkata Kolkata

Job Id:Job 030119000291 Id: 030119000291

Location: Location: Surat Surat

Job Id:Job 191218007232 Id: 191218007232

Job Id:Job 210918004813 Id: 210918004813

SECURITY SUPERVISOR SECURITY SUPERVISOR

ASSISTANT MANAGER ASSISTANT MANAGER SECURITY SECURITY

SECURITY OFFICER SECURITY OFFICER

Company: Company: Modern Modern Vidya Niketan Vidya Niketan Company: Company: Holiday Holiday Inn Resort Inn Resort Goa GoaCompany: Company: VelloreVellore Institute Institute of of SocietySociety Technology Technology Exp: 2-7 Exp: 2-7 Exp: 5-10 Exp: 5-10 Exp: 20-22 Exp: 20-22 Location: Location: Panjim/Panaji Panjim/Panaji Location: Location: Faridabad Faridabad

Job Id:Job 010119000874 Id: 010119000874

Job Id:Job 020119003060 Id: 020119003060

CHIEFCHIEF SECURITY OFFICER SECURITY OFFICER

Location: Location: VelloreVellore Job Id:Job 171218007804 Id: 171218007804

SITE SHIFT SITE SHIFT SECURITY SECURITY LEADLEAD

ASSISTANT ASSISTANT INSTRUCTOR INSTRUCTOR

Company: Company: Ramada Ramada Plaza JHV Plaza (Unit JHV (UnitCompany: Company: Pinkerton Pinkerton Corporate Corporate Risk Risk Company: Company: Software Software Data India DataLtd. India Ltd. of MallofHotel Mall Limited) Hotel Limited) Management Management India Private India Private LimitedLimited Exp: 10-20 Exp: 10-20 Exp: 5-10 Exp: 5-10

Exp: 4-6 Exp: 4-6

Location: Location: Varanasi Varanasi

Location: Location: Bengaluru/Bangalore Bengaluru/Bangalore Location: Location: Hyderabad/Secunderabad Hyderabad/Secunderabad Job Id:Job 181218002506 Id: 181218002506

Job Id:Job 020119002691 Id: 020119002691

Job Id:Job 281218901393 Id: 281218901393

MANAGER - ASST. GM GM MANAGER - ASST. (SECURITY) (SECURITY)

PERSONAL PERSONAL SECURITY SECURITY OFFICER OFFICER (FEMALE) (FEMALE)

SECURITY OFFICER SECURITY OFFICER

Company: Company: Shree Shree Cement Cement Limited Limited Company: Company: G. D. Foods G. D. Foods MFG. (I) MFG. Pvt. (I) Pvt.Company: Company: LodhaLodha developers developers Ltd. Ltd. Ltd. Ltd. Exp: 15-25 Exp: 15-25 Exp: 4-8 Exp: 4-8 Location: Location: Gulbarga Gulbarga

Exp: 25-30 Exp: 25-30

Location: Location: Mumbai Mumbai

Job Id:Job 010119002267 Id: 010119002267

Location: Location: Neemrana Neemrana

Job Id:Job 201218002695 Id: 201218002695

Job Id:Job 251217001743 Id: 251217001743

Apply Apply for these for these Jobs Jobs 1. Login 1. Login to www.naukri.com to www.naukri.com 2. Type 2. Type the Job theID Job in ID thein‘Search the ‘Search Jobs’ Jobs’ Box Box 3. Click 3. Click the ‘Search’ the ‘Search’ button button

5,00,000 5,00,000 JOBSJOBS NAUKRI NAUKRI ON MOBILE ON MOBILE


National Roundup

Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)

“Security Link India” payable at New Delhi dated__________

* Please subscribe through admin@securitylinkindia.com

WE ARE UPDATING OUR DATABASE For free listing in Database:

For

Advertisement Contact: editor@securitylinkindia.com

* Send your detail to admin@securitylinkindia.com

Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 100

SecurityLink India ■ March 2019


RNI No.: DELENG/2016/68892 POSTAL No.: DL(S)-17/3502/2019-21

PUBLISHING DATE: 1 POSTING DATE: 9 & 10

Profile for Security Link India

SecurityLink India Magazine March 2019  

SecurityLink India Magazine March 2019  

Advertisement